Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN
暂无分享,去创建一个
[1] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[2] Qingju Wang,et al. When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.
[3] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[4] Young-Sik Jeong,et al. DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.
[5] Alex Pentland,et al. Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.
[6] Raouf Boutaba,et al. Trust Management for Host-Based Collaborative Intrusion Detection , 2008, DSOM.
[7] Chunhua Su,et al. Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems , 2018, IEEE Access.
[8] Saurabh Bagchi,et al. Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[9] Radu State,et al. ChainGuard — A firewall for blockchain applications using SDN with OpenFlow , 2017, 2017 Principles, Systems and Applications of IP Telecommunications (IPTComm).
[10] Wenjuan Li,et al. Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection , 2012, ISMIS.
[11] Yan Chen,et al. Towards scalable and robust distributed intrusion alert fusion with good load balancing , 2006, LSAD '06.
[12] Nahid Shahmehri,et al. A Trust-Aware, P2P-Based Overlay for Intrusion Detection , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).
[13] Cesare Pautasso,et al. The Blockchain as a Software Connector , 2016, 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA).
[14] Trinh Anh Tuan. A Game-Theoretic Analysis of Trust Management in P2P Systems , 2006, 2006 First International Conference on Communications and Electronics.
[15] Wenjuan Li,et al. Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[16] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[17] Lam-for Kwok,et al. Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection , 2013, Int. J. Comput. Intell. Syst..
[18] Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.
[19] Yuval Elovici,et al. CIoTA: Collaborative IoT Anomaly Detection via Blockchain , 2018, ArXiv.