As the threat of cyber attack grows ever larger, new approaches to security are required. While there are several different types of intrusion detection systems (IDS), collaborative IDS (CIDS) offers particular promise in identifying distributed, coordinated attacks that might otherwise elude detection. Even for this type of IDS, there are unresolved issues associated with trusting participants and aggregating data. Blockchain technology appears capable of addressing those issues. This thesis is focused on presenting a proof-of-concept experiment leveraging an Ethereum-based private blockchain for a CIDS that uses pluggable authentication modules (PAM) to track login activity toward detection of doorknob rattling attacks.http://archive.org/...
© 2020 IEEE. Cyber-security is indispensable as malicious incidents are ubiquitous on the Internet. ...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
Internet of Things devices are highly susceptible to attack, and owners often fail to realize they h...
As the threat of cyber attack grows ever larger, new approaches to security are required. While the...
One effective way of detecting malicious traffic in computer networks is intrusion detection systems...
Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share reso...
Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against ...
Collaborative intrusion detection approach uses the shared detection signature between the collabora...
In an attempt to cope with the increased number of cyberattacks, research in Intrusion Detection Sys...
With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (I...
The ability of blockchain technology to improve security and transparency across a range of industri...
We designed and developed a novel application that applies blockchain technology in cybersecurity. T...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
An Intrusion Detection System (IDS) aims to alert users of incoming attacks by deploying a detector ...
This article aims to study intrusion attacks and then develop a novel cyberattack detection framewor...
© 2020 IEEE. Cyber-security is indispensable as malicious incidents are ubiquitous on the Internet. ...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
Internet of Things devices are highly susceptible to attack, and owners often fail to realize they h...
As the threat of cyber attack grows ever larger, new approaches to security are required. While the...
One effective way of detecting malicious traffic in computer networks is intrusion detection systems...
Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share reso...
Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against ...
Collaborative intrusion detection approach uses the shared detection signature between the collabora...
In an attempt to cope with the increased number of cyberattacks, research in Intrusion Detection Sys...
With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (I...
The ability of blockchain technology to improve security and transparency across a range of industri...
We designed and developed a novel application that applies blockchain technology in cybersecurity. T...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
An Intrusion Detection System (IDS) aims to alert users of incoming attacks by deploying a detector ...
This article aims to study intrusion attacks and then develop a novel cyberattack detection framewor...
© 2020 IEEE. Cyber-security is indispensable as malicious incidents are ubiquitous on the Internet. ...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
Internet of Things devices are highly susceptible to attack, and owners often fail to realize they h...