Abstract—Different trust models have been developed for deal-ing with possible dishonest behavior and attacks from malicious peer Intrusion Detection Systems (IDSs) in a collaborative In-trusion Detection Network (IDN). For evaluating and comparing these models, this paper introduces a simulation framework that incorporates different components namely expertise model, deception model, attack model, and evaluation metrics. The proposed framework offers flexibility for users to adjust the simulation parameters according to their needs. We then compare three existing trust models in this domain to demonstrate the effectiveness of our framework when used in analyzing their efficiency, robustness and scalability. I
The architecture of certain class of services, such as distributed computing, distributed storages o...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
Computer networks are now relied on more than ever before for gathering information and performing e...
Part 2: Full PapersInternational audienceNetwork intrusions are becoming more and more sophisticated...
Abstract. The accuracy of detecting an intrusion within a network of intrusion detection systems (ID...
Abstract The accuracy of detecting an intrusion within a network of intrusion detection systems (IDS...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
Reputation management (RM) is employed in distributed and peer-to-peer networks to help users comput...
In distributed environments, where interactions involve unknown entities, intelligent techniques for...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
Abstract—Traditional intrusion detection systems (IDSs) work in isolation and are not effective to d...
This paper presents distributed algorithms used by a peer to reason about trustworthiness of other p...
Recently, trust establishment is recognized as an important approach to defend distributed networks,...
The architecture of certain class of services, such as distributed computing, distributed storages o...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
Computer networks are now relied on more than ever before for gathering information and performing e...
Part 2: Full PapersInternational audienceNetwork intrusions are becoming more and more sophisticated...
Abstract. The accuracy of detecting an intrusion within a network of intrusion detection systems (ID...
Abstract The accuracy of detecting an intrusion within a network of intrusion detection systems (IDS...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
Reputation management (RM) is employed in distributed and peer-to-peer networks to help users comput...
In distributed environments, where interactions involve unknown entities, intelligent techniques for...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
Abstract—Traditional intrusion detection systems (IDSs) work in isolation and are not effective to d...
This paper presents distributed algorithms used by a peer to reason about trustworthiness of other p...
Recently, trust establishment is recognized as an important approach to defend distributed networks,...
The architecture of certain class of services, such as distributed computing, distributed storages o...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
Computer networks are now relied on more than ever before for gathering information and performing e...