Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,970 Hits in 5.2 sec

A Survey on Multi-Agent Based Collaborative Intrusion Detection Systems

Nassima Bougueroua, Smaine Mazouzi, Mohamed Belaoued, Noureddine Seddari, Abdelouahid Derhab, Abdelghani Bouras
2021 Journal of Artificial Intelligence and Soft Computing Research  
Likewise, MAS have been used in cyber-security, to build more efficient Intrusion Detection Systems (IDS), namely Collaborative Intrusion Detection Systems (CIDS).  ...  This work presents a taxonomy for classifying the methods used to design intrusion detection systems, and how such methods were used alongside with MAS in order to build IDS that are deployed in distributed  ...  [125] proposed a distributed deep belief network (DBN) approach for collaborative detection of abnormal behavior in large-scale networks.  ... 
doi:10.2478/jaiscr-2021-0008 fatcat:gfud4kx7crah5fgi5aq2qdn5gm

Collaborative Intrusion Detection Networks and Insider Attacks

Carol J. Fung
2011 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
A Collaborative Intrusion Detection Network (CIDN) consists in a set of cooperating IDSs which use collective knowledge and experience to achieve improved intrusion detection accuracy.  ...  A stand alone IDS does not have complete information or knowledge to detect intrusions.  ...  DOMINO DOMINO [12] is an IDS collaboration system which aims at monitoring Internet outbreaks for a large scale network.  ... 
doi:10.22667/jowua.2011.03.31.063 dblp:journals/jowua/Fung11 fatcat:nb7nz63orbejlkgxolcfjkhity

An Architecture for Federated Learning Enabled Collaborative Intrusion Detection System

Caitlin L. McOsker, Michael Steven Handlin, Lei Li, Hossain Shahriar, Liang Zhao
2021 Americas Conference on Information Systems  
In a collaborative IDS, multiple IDSs work together to effectively detect large scaled and across platforms or operating systems attacks.  ...  Intrusion Detection Systems (IDSs) are essential part of a security solution to monitor the network traffics and detect malicious attacks.  ...  A collaborative IDS which multiple IDSs working together can be effectively detect large scaled and across platforms attacks.  ... 
dblp:conf/amcis/McOskerHLSZ21 fatcat:x7trary3p5gcfn4az5u2y2fuy4

Taxonomy and Survey of Collaborative Intrusion Detection

Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer
2015 ACM Computing Surveys  
The entire framework of requirements, building blocks, and attacks as introduced is then used for a comprehensive analysis of the state of the art in collaborative intrusion detection, including a detailed  ...  Intrusion Detection Systems (IDSs) are a key component of the corresponding defense measures; they have been extensively studied and utilized in the past.  ...  Zhou et al. describe Large Scale Intrusion Detection (LarSID), a P2Pbased CIDS based on a publish-subscribe mechanism [Zhou et al. 2007 [Zhou et al. , 2005 .  ... 
doi:10.1145/2716260 fatcat:zjddnmo4jngpbhux6kaeur7by4

Collaborative Security

Guozhu Meng, Yang Liu, Jie Zhang, Alexander Pokluda, Raouf Boutaba
2015 ACM Computing Surveys  
Thus far, collaboration has been used in many domains such as intrusion detection, spam filtering, botnet resistance, and vulnerability detection.  ...  We then present a comprehensive study with respect to their analysis target, timeliness of analysis, architecture, network infrastructure, initiative, shared information and interoperability.  ...  -A botnet comprises of a large number of connected computers, which can launch other attacks in a large scale.  ... 
doi:10.1145/2785733 fatcat:mu6hd7jk4vgjxhdhkpvjuose4e

Security against probe-response attacks in collaborative intrusion detection

Vitaly Shmatikov, Ming-Hsiu Wang
2007 Proceedings of the 2007 workshop on Large scale attack defense - LSAD '07  
Probe-response attacks are a new threat for collaborative intrusion detection systems.  ...  We then design and evaluate a collaborative detection system which provides protection against probe-response attacks.  ...  This material is based upon work supported by the National Science Foundations under grants CNS-0509033 and IIS-0534198, and by the Department of Defense under Contract No. H98230-05-C-1650.  ... 
doi:10.1145/1352664.1352673 fatcat:6sbzhk7npvbhbf2mhfplguew3y

Evaluating a blockchain-based network performance for the intrusion detection system

I.A. Burmaka, Chernihiv National University of Technology, V.V. Lytvynov, I.S. Skiter, S.V. Lytvyn, Chernihiv National University of Technology, Institute of Mathematical Machines and Systems Problems National Academy of Science of Ukraine, Chernihiv National University of Technology
2020 Mathematical machines and systems  
In this paper, the results of the modeling of blockchain-based network to evaluate performance for a collaborative intrusion detection system are presented.  ...  A blockchain can be used as such kind of mechanism, but most of working blockchains use cases are related to cryptocurrencies, where blockchain is successfully used as a decentralized database which saves  ...  One of the earliest prototypes for a collaborative intrusion detection was a distributed intrusion detection system (DIDS) [6] .  ... 
doi:10.34121/1028-9763-2020-1-99-109 fatcat:s5j7mpsb5nehhhzrel3ophadhq

Relieving hot spots in collaborative intrusion detection systems during worm outbreaks

Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie
2008 NOMS 2008 - 2008 IEEE Network Operations and Management Symposium  
Collaborative intrusion detection systems (CIDSs) have therefore been proposed to address this coordinated defense challenge by correlating patterns of suspicious activity based on the source addresses  ...  In this paper, we propose a load balancing scheme for a CIDS to evenly distribute the workload to avoid hot-spots during worm outbreaks.  ...  We would also like to thank the Internet Storm Center for providing us with the DShield Dataset, and Vinod Yegneswaran from SRI International for his help with the DShield Dataset.  ... 
doi:10.1109/noms.2008.4575116 dblp:conf/noms/ZhouKL08 fatcat:hyfcrrctjjaknpkdzdonx7776u

A Systematic State-of-The-Art Analysis of Multi-Agent Intrusion Detection

I. A. Saeed, A. Selamat, M. Rohani, O. Krejcar, J. Chaudhry
2020 IEEE Access  
It has also been found that new measurement metrics are required for evaluating multi-agent IDS architectures.  ...  However, it has been found that there are several issues in the current multi-agent IDS architectures that may degrade the accuracy and response time of intrusions and attacks detection.  ...  Education Malaysia for the completion of the research.  ... 
doi:10.1109/access.2020.3027463 fatcat:vaudgewisnhihghc4f3xa3otby

Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale [chapter]

Mirco Marchetti, Michele Messori, Michele Colajanni
2009 Lecture Notes in Computer Science  
We present a novel distributed system where each component collaborates to the intrusion and malware detection and to the dissemination of the local analyses.  ...  The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense.  ...  Acknowledgments This research has been funded by the IST-225407 EU FP7 project CoMiFin (Communication Middleware for Monitoring Financial Critical Infrastructures).  ... 
doi:10.1007/978-3-642-04474-8_37 fatcat:2ytrbjpxsfehte25fevnarjkkq

Dynamic Trust Management

Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee
2009 Computer  
Therefore, we believe that the GIG architecture is a useful platform and opportunity for studying trust in large-scale computing in general, not just in the military and government.  ...  These problems occur in any large-scale system based on a rapidly changing, potentially unreliable network framework such as the Internet.  ...  CooperaTIve polICy evaluaTIon wITh feeDbaCk To evaluate dynamic policies, we are designing and implementing novel mechanisms for collaborative decentralized policy enforcement.  ... 
doi:10.1109/mc.2009.51 fatcat:po2ntel4nngnlc2rtzuxrszja4

Collaborative Detection of Fast Flux Phishing Domains

Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera
2009 Journal of Networks  
We also show how our correlation scheme can be implemented on a large scale by using a decentralized publish-subscribe correlation model called LarSID, which is more scalable than a fully centralized architecture  ...  Phishing is a significant security threat to users of Internet services.  ...  ACKNOWLEDGMENT We thank the Laboratory of Dependable Distributed Systems in the University Mannheim, Germany for making their Fast Flux data available.  ... 
doi:10.4304/jnw.4.1.75-84 fatcat:ofcwr2yasveibklkaeeerjipea

2019 Index IEEE Transactions on Computational Social Systems Vol. 6

2019 IEEE Transactions on Computational Social Systems  
., +, TCSS Aug. 2019 739-748 Intrusion detection A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells.  ...  ., +, TCSS Dec. 2019 1147-1155 Computer architecture A Novel Intrusion Detection and Prevention Scheme for Network Cod- ing-Enabled Mobile Small Cells.  ... 
doi:10.1109/tcss.2020.2973787 fatcat:avfkhqjr3vgdvnwjey5jcgrgvq

Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges

Elena Fedorchenko, Evgenia Novikova, Anton Shulepov
2022 Algorithms  
Another benefit of the usage of federated learning for intrusion detection is its ability to support collaboration between entities that could not share their dataset for confidential or other reasons.  ...  The paper analyzes the architecture of the proposed intrusion detection systems and the approaches used to model data partition across the clients.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/a15070247 fatcat:fr7wbjns2fhllprc534q2s46pi

A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modeling

Hao Chen, Yu Chen
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
However, most of the reported collaborative schemes for distributed defense are application specific.  ...  In this paper explores properties of general collaborative defense strategies from the perspective of complex system. A three layered network modeling platform has been developed.  ...  They merged multi-dimensional correlation for collaborative intrusion detection [33] , and developed a self-protecting and self-healing collaborative intrusion detection architecture for the trace-back  ... 
doi:10.4108/icst.collaboratecom.2010.31 dblp:conf/colcom/ChenC10 fatcat:ve2lbkek2zfr3e3nykaylvs4kq
« Previous Showing results 1 — 15 out of 3,970 results