The destructive effects of cyber-attacks demand more proactive security approaches. One such promising approach is the idea of Collaborative Intrusion Detection Systems (CIDSs). These systems combine the knowledge of multiple sensors (e.g., intrusion detection systems, honeypots or firewalls) to create a holistic picture of a monitored network. Sensors monitor parts of a network and exchange alert data to learn from each other, improve their detection capabilities and ultimately identify sophisticated attacks. Nevertheless, if one or a group of sensors is unreliable (due to incompetence or malice), the system might miss important information needed to detect attacks. In this article, we propose Sphinx, an evidence-based trust mechanism capa...
The IT infrastructure of today needs to be ready to defend against massive cyber-attacks which often...
Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intru...
Abstract. The accuracy of detecting an intrusion within a network of intrusion detection systems (ID...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
In distributed and collaborative attack detection systems decisions are made on the basis of the eve...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our ...
Part 2: Full PapersInternational audienceNetwork intrusions are becoming more and more sophisticated...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
ABSTRACT: The sophistication of the recent cloud computing systems has made them more vulnerable to ...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Abstract The accuracy of detecting an intrusion within a network of intrusion detection systems (IDS...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
The IT infrastructure of today needs to be ready to defend against massive cyber-attacks which often...
Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intru...
Abstract. The accuracy of detecting an intrusion within a network of intrusion detection systems (ID...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
In distributed and collaborative attack detection systems decisions are made on the basis of the eve...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our ...
Part 2: Full PapersInternational audienceNetwork intrusions are becoming more and more sophisticated...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
ABSTRACT: The sophistication of the recent cloud computing systems has made them more vulnerable to ...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Abstract The accuracy of detecting an intrusion within a network of intrusion detection systems (IDS...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
The IT infrastructure of today needs to be ready to defend against massive cyber-attacks which often...
Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intru...
Abstract. The accuracy of detecting an intrusion within a network of intrusion detection systems (ID...