In an attempt to cope with the increased number of cyberattacks, research in Intrusion Detection Systems (IDSs) is moving towards more collaborative mechanisms. Collaborative IDSs (CIDSs) are such an approach; they combine the knowledge of a plethora of monitors to generate a holistic picture of the monitored network. Despite the research done in this field, CIDSs still face a number of fundamental challenges, especially regarding maintaining trust among the collaborating parties. Recent advances in distributed ledger technologies, e.g. various implementations of blockchain protocols, are a good fit to the problem of enhancing trust in collaborative environments. This paper touches the intersection of CIDSs and blockchains. Particularly, it...
This paper presents FBA-SDN, a novel Stellar Consensus Protocol (SCP)-based Federated Byzantine Agre...
This article aims to study intrusion attacks and then develop a novel cyberattack detection framewor...
One effective way of detecting malicious traffic in computer networks is intrusion detection systems...
Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against ...
With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (I...
As the threat of cyber attack grows ever larger, new approaches to security are required. While the...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share reso...
An Intrusion Detection System (IDS) aims to alert users of incoming attacks by deploying a detector ...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
Collaborative intrusion detection approach uses the shared detection signature between the collabora...
As the threat of cyber attack grows ever larger, new approaches to security are required. While ther...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
Multimicrogrid (MMG) systems have the potential to play an increasingly important role in the transf...
When people interact with each other, it is often fruitful to cooperate. Cooperation is however not ...
This paper presents FBA-SDN, a novel Stellar Consensus Protocol (SCP)-based Federated Byzantine Agre...
This article aims to study intrusion attacks and then develop a novel cyberattack detection framewor...
One effective way of detecting malicious traffic in computer networks is intrusion detection systems...
Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against ...
With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (I...
As the threat of cyber attack grows ever larger, new approaches to security are required. While the...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share reso...
An Intrusion Detection System (IDS) aims to alert users of incoming attacks by deploying a detector ...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
Collaborative intrusion detection approach uses the shared detection signature between the collabora...
As the threat of cyber attack grows ever larger, new approaches to security are required. While ther...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
Multimicrogrid (MMG) systems have the potential to play an increasingly important role in the transf...
When people interact with each other, it is often fruitful to cooperate. Cooperation is however not ...
This paper presents FBA-SDN, a novel Stellar Consensus Protocol (SCP)-based Federated Byzantine Agre...
This article aims to study intrusion attacks and then develop a novel cyberattack detection framewor...
One effective way of detecting malicious traffic in computer networks is intrusion detection systems...