A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on Multi-Agent Based Collaborative Intrusion Detection Systems
2021
Journal of Artificial Intelligence and Soft Computing Research
Likewise, MAS have been used in cyber-security, to build more efficient Intrusion Detection Systems (IDS), namely Collaborative Intrusion Detection Systems (CIDS). ...
This work presents a taxonomy for classifying the methods used to design intrusion detection systems, and how such methods were used alongside with MAS in order to build IDS that are deployed in distributed ...
[125] proposed a distributed deep belief network (DBN) approach for collaborative detection of abnormal behavior in large-scale networks. ...
doi:10.2478/jaiscr-2021-0008
fatcat:gfud4kx7crah5fgi5aq2qdn5gm
Collaborative Intrusion Detection Networks and Insider Attacks
2011
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
A Collaborative Intrusion Detection Network (CIDN) consists in a set of cooperating IDSs which use collective knowledge and experience to achieve improved intrusion detection accuracy. ...
A stand alone IDS does not have complete information or knowledge to detect intrusions. ...
DOMINO DOMINO [12] is an IDS collaboration system which aims at monitoring Internet outbreaks for a large scale network. ...
doi:10.22667/jowua.2011.03.31.063
dblp:journals/jowua/Fung11
fatcat:nb7nz63orbejlkgxolcfjkhity
An Architecture for Federated Learning Enabled Collaborative Intrusion Detection System
2021
Americas Conference on Information Systems
In a collaborative IDS, multiple IDSs work together to effectively detect large scaled and across platforms or operating systems attacks. ...
Intrusion Detection Systems (IDSs) are essential part of a security solution to monitor the network traffics and detect malicious attacks. ...
A collaborative IDS which multiple IDSs working together can be effectively detect large scaled and across platforms attacks. ...
dblp:conf/amcis/McOskerHLSZ21
fatcat:x7trary3p5gcfn4az5u2y2fuy4
Taxonomy and Survey of Collaborative Intrusion Detection
2015
ACM Computing Surveys
The entire framework of requirements, building blocks, and attacks as introduced is then used for a comprehensive analysis of the state of the art in collaborative intrusion detection, including a detailed ...
Intrusion Detection Systems (IDSs) are a key component of the corresponding defense measures; they have been extensively studied and utilized in the past. ...
Zhou et al. describe Large Scale Intrusion Detection (LarSID), a P2Pbased CIDS based on a publish-subscribe mechanism [Zhou et al. 2007 [Zhou et al. , 2005 . ...
doi:10.1145/2716260
fatcat:zjddnmo4jngpbhux6kaeur7by4
Collaborative Security
2015
ACM Computing Surveys
Thus far, collaboration has been used in many domains such as intrusion detection, spam filtering, botnet resistance, and vulnerability detection. ...
We then present a comprehensive study with respect to their analysis target, timeliness of analysis, architecture, network infrastructure, initiative, shared information and interoperability. ...
-A botnet comprises of a large number of connected computers, which can launch other attacks in a large scale. ...
doi:10.1145/2785733
fatcat:mu6hd7jk4vgjxhdhkpvjuose4e
Security against probe-response attacks in collaborative intrusion detection
2007
Proceedings of the 2007 workshop on Large scale attack defense - LSAD '07
Probe-response attacks are a new threat for collaborative intrusion detection systems. ...
We then design and evaluate a collaborative detection system which provides protection against probe-response attacks. ...
This material is based upon work supported by the National Science Foundations under grants CNS-0509033 and IIS-0534198, and by the Department of Defense under Contract No. H98230-05-C-1650. ...
doi:10.1145/1352664.1352673
fatcat:6sbzhk7npvbhbf2mhfplguew3y
Evaluating a blockchain-based network performance for the intrusion detection system
2020
Mathematical machines and systems
In this paper, the results of the modeling of blockchain-based network to evaluate performance for a collaborative intrusion detection system are presented. ...
A blockchain can be used as such kind of mechanism, but most of working blockchains use cases are related to cryptocurrencies, where blockchain is successfully used as a decentralized database which saves ...
One of the earliest prototypes for a collaborative intrusion detection was a distributed intrusion detection system (DIDS) [6] . ...
doi:10.34121/1028-9763-2020-1-99-109
fatcat:s5j7mpsb5nehhhzrel3ophadhq
Relieving hot spots in collaborative intrusion detection systems during worm outbreaks
2008
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium
Collaborative intrusion detection systems (CIDSs) have therefore been proposed to address this coordinated defense challenge by correlating patterns of suspicious activity based on the source addresses ...
In this paper, we propose a load balancing scheme for a CIDS to evenly distribute the workload to avoid hot-spots during worm outbreaks. ...
We would also like to thank the Internet Storm Center for providing us with the DShield Dataset, and Vinod Yegneswaran from SRI International for his help with the DShield Dataset. ...
doi:10.1109/noms.2008.4575116
dblp:conf/noms/ZhouKL08
fatcat:hyfcrrctjjaknpkdzdonx7776u
A Systematic State-of-The-Art Analysis of Multi-Agent Intrusion Detection
2020
IEEE Access
It has also been found that new measurement metrics are required for evaluating multi-agent IDS architectures. ...
However, it has been found that there are several issues in the current multi-agent IDS architectures that may degrade the accuracy and response time of intrusions and attacks detection. ...
Education Malaysia for the completion of the research. ...
doi:10.1109/access.2020.3027463
fatcat:vaudgewisnhihghc4f3xa3otby
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
[chapter]
2009
Lecture Notes in Computer Science
We present a novel distributed system where each component collaborates to the intrusion and malware detection and to the dissemination of the local analyses. ...
The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. ...
Acknowledgments This research has been funded by the IST-225407 EU FP7 project CoMiFin (Communication Middleware for Monitoring Financial Critical Infrastructures). ...
doi:10.1007/978-3-642-04474-8_37
fatcat:2ytrbjpxsfehte25fevnarjkkq
Dynamic Trust Management
2009
Computer
Therefore, we believe that the GIG architecture is a useful platform and opportunity for studying trust in large-scale computing in general, not just in the military and government. ...
These problems occur in any large-scale system based on a rapidly changing, potentially unreliable network framework such as the Internet. ...
CooperaTIve polICy evaluaTIon wITh feeDbaCk To evaluate dynamic policies, we are designing and implementing novel mechanisms for collaborative decentralized policy enforcement. ...
doi:10.1109/mc.2009.51
fatcat:po2ntel4nngnlc2rtzuxrszja4
Collaborative Detection of Fast Flux Phishing Domains
2009
Journal of Networks
We also show how our correlation scheme can be implemented on a large scale by using a decentralized publish-subscribe correlation model called LarSID, which is more scalable than a fully centralized architecture ...
Phishing is a significant security threat to users of Internet services. ...
ACKNOWLEDGMENT We thank the Laboratory of Dependable Distributed Systems in the University Mannheim, Germany for making their Fast Flux data available. ...
doi:10.4304/jnw.4.1.75-84
fatcat:ofcwr2yasveibklkaeeerjipea
2019 Index IEEE Transactions on Computational Social Systems Vol. 6
2019
IEEE Transactions on Computational Social Systems
., +, TCSS Aug. 2019 739-748 Intrusion detection A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells. ...
., +, TCSS Dec. 2019
1147-1155
Computer architecture
A Novel Intrusion Detection and Prevention Scheme for Network Cod-
ing-Enabled Mobile Small Cells. ...
doi:10.1109/tcss.2020.2973787
fatcat:avfkhqjr3vgdvnwjey5jcgrgvq
Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges
2022
Algorithms
Another benefit of the usage of federated learning for intrusion detection is its ability to support collaboration between entities that could not share their dataset for confidential or other reasons. ...
The paper analyzes the architecture of the proposed intrusion detection systems and the approaches used to model data partition across the clients. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/a15070247
fatcat:fr7wbjns2fhllprc534q2s46pi
A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modeling
2010
Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing
However, most of the reported collaborative schemes for distributed defense are application specific. ...
In this paper explores properties of general collaborative defense strategies from the perspective of complex system. A three layered network modeling platform has been developed. ...
They merged multi-dimensional correlation for collaborative intrusion detection [33] , and developed a self-protecting and self-healing collaborative intrusion detection architecture for the trace-back ...
doi:10.4108/icst.collaboratecom.2010.31
dblp:conf/colcom/ChenC10
fatcat:ve2lbkek2zfr3e3nykaylvs4kq
« Previous
Showing results 1 — 15 out of 3,970 results