Robust and scalable trust management for collaborative intrusion detection

@article{Fung2009RobustAS,
  title={Robust and scalable trust management for collaborative intrusion detection},
  author={Carol J. Fung and Jie Zhang and Issam Aib and Raouf Boutaba},
  journal={2009 IFIP/IEEE International Symposium on Integrated Network Management},
  year={2009},
  pages={33-40}
}
The accuracy of detecting intrusions within an Intrusion Detection Network (IDN) depends on the efficiency of collaboration between the peer Intrusion Detection Systems (IDSes) as well as the security itself of the IDN against insider threats. In this paper, we study host-based IDNs and introduce a Dirichlet-based model to measure the level of trustworthiness among peer IDSes according to their mutual experience. The model has strong scalability properties and is robust against common insider… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 44 CITATIONS

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks

  • 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
  • 2018
VIEW 10 EXCERPTS
CITES RESULTS, BACKGROUND & METHODS
HIGHLY INFLUENCED

Cyberspace Safety and Security

  • Lecture Notes in Computer Science
  • 2017
VIEW 10 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments

  • IEEE Transactions on Network and Service Management
  • 2017
VIEW 10 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Bayesian decision aggregation in collaborative intrusion detection networks

  • 2010 IEEE Network Operations and Management Symposium - NOMS 2010
  • 2010
VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS

Design of a Simulation Framework to Evaluate Trust Models for Collaborative Intrusion Detection

  • 2009 International Conference on Network and Service Security
  • 2009
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS

Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study

  • GLOBECOM 2017 - 2017 IEEE Global Communications Conference
  • 2017
VIEW 18 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 13 REFERENCES

A trust - aware , p 2 p - based overlay for intrusion detection

O. Baysal Fung, J. Zhang, I. Aib, R. Boutaba
  • DEXA Workshops
  • 2006

A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks

  • Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications
  • 2006
VIEW 1 EXCERPT

A trust-aware

C. Duma, M. Karresand, N. Shahmehri, G. Caronni
  • p2p-based overlay for intrusion detection. In DEXA Workshops
  • 2006
VIEW 2 EXCERPTS

Trust Evaluation in Anarchy: A Case Study on Autonomous Networks

  • Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications
  • 2006
VIEW 1 EXCERPT

Indra: a peer-to-peer approach to network intrusion detection and prevention

  • WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.
  • 2003
VIEW 1 EXCERPT