Learn More
Distributed and coordinated attacks in computer networks are causing considerable economic losses worldwide in recent years. This is mainly due to the transition of attackers’ operational patterns towards a more sophisticated and more global behavior. This fact is leading current intrusion detection systems to be more likely to generate false alarms. In(More)
Collaborative Intrusion Detection Networks (CIDN) are usually composed by a set of nodes working together to detect distributed intrusions that cannot be easily recognized with traditional intrusion detection architectures. In this approach every node could potentially collaborate to provide its vision of the system and report the alarms being detected at(More)
Social network users can report other users' content as inappropriate by arguing that it encroaches on their privacy rights. Blindly accepting such reports as real evidence of something offensive poses substantial risks; malicious users might report harmless content just to compromise that material. The large number of users who flag content as offensive(More)
In distributed and collaborative attack detection systems decisions are made on the basis of the events reported by many sensors, e.g., Intrusion Detection Systems placed across various network locations. In some cases such events originate at locations over which we have little control, for example because they belong to an organisation that shares(More)
Hierarchical cross-certification fits well within large organizations that want their root CA to have direct control over all subordinate CAs. However, both Peer-to-Peer and Bridge CA cross-certification models suits better than the hierarchical one with organizations where a certain level of flexibility is needed to form and revoke trust relationships with(More)
This paper presents the components and formal information model enabling the dynamic creation and management of secure overlay networks. Special attention will be paid to the solution provided to two important open issues: the definition of a certificate path building and validation algorithm (to ease the trust establishment and negotiation processes) and(More)
—Many critical activities rely on the correct and uninterrupted operation of networked Computer Information Systems (CIS). Such systems are however exposed to many different kinds of risk, and thus many researches have been taking place for enabling them to perform self-monitoring and self-healing to maintain their operation over time as specified by domain(More)
Today trust is a key factor in distributed and collaborative environments aimed to model participating entities' behavior, and to foresee and predict their expected actions in the future. Yet, prior to the first interaction of a new party in the system, trust and reputation models face a great challenge: how to assign an accurate initial reputation score to(More)