Designing collaborative blockchained signature-based intrusion detection in IoT environments

W Li, S Tug, W Meng, Y Wang - Future Generation Computer Systems, 2019 - Elsevier
With the rapid development of Internet-of-Things (IoT), there is an increasing demand for
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …

A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

Augmenting zero trust architecture to endpoints using blockchain: A state‐of‐the‐art review

L Alevizos, VT Ta, M Hashem Eiza - Security and privacy, 2022 - Wiley Online Library
With the purpose of defending against lateral movement in today's borderless networks, zero
trust architecture (ZTA) adoption is gaining momentum. With a full‐scale ZTA …

[PDF][PDF] Blockchain for Internet of Things (IoT) research issues challenges & future directions: A review

M Alamri, NZ Jhanjhi… - Int. J. Comput. Sci. Netw …, 2019 - expert.taylors.edu.my
Summary Internet of Things (IoT) becomes vital source of converting things into smart,
including smart homes, smart cities, smart industries etc. Internet of things have the ability to …

Blockchain solutions for forensic evidence preservation in IoT environments

S Brotsis, N Kolokotronis, K Limniotis… - … IEEE Conference on …, 2019 - ieeexplore.ieee.org
The technological evolution brought by the Internet of things (IoT) comes with new forms of
cyber-attacks exploiting the complexity and heterogeneity of IoT networks, as well as, the …

Distributed intrusion detection system using blockchain and cloud computing infrastructure

M Kumar, AK Singh - … 4th international conference on trends in …, 2020 - ieeexplore.ieee.org
Intrusion Detection System is a well-known term in the domain of Network and Information
Security. It's one of the important components of the Network and Information Security …

SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation

G Liu, Z Yan, W Feng, X Jing, Y Chen, M Atiquzzaman - Information Fusion, 2021 - Elsevier
In order to evaluate network trust, different intrusion detection methods have been proposed.
However, it is difficult for a single detection node to collect massive data and perform …

Blockchain-based decentralized replay attack detection for large-scale power systems

P Ramanan, D Li, N Gebraeel - IEEE Transactions on Systems …, 2021 - ieeexplore.ieee.org
Large-scale power systems are composed of regional utilities with assets that stream sensor
readings in real time. In order to detect cyberattacks, the globally acquired, real-time sensor …

Blockchain-enabled intrusion detection and prevention system of APTs within zero trust architecture

L Alevizos, MH Eiza, VT Ta, Q Shi, J Read - Ieee Access, 2022 - ieeexplore.ieee.org
In a world where organisations are embracing new IT working models such as Bring Your
Own Device (BYOD) and remote working, the traditional mindset of defending the network …

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

W Meng, W Li, LT Yang, P Li - International Journal of Information Security, 2020 - Springer
Due to the rapid growth of computer networks, intrusions have become more complicated
and devastating. As an important solution, collaborative intrusion detection networks or …