Toward a blockchain-based framework for challenge-based collaborative intrusion detection

W Li, Y Wang, J Li, MH Au - International Journal of Information Security, 2021 - Springer
Network intrusions are a big threat to network and system assets, which have become more
complex to date. To enhance the detection performance, collaborative intrusion detection …

ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review

M Tayyab, B Belaton, M Anbar - IEEE Access, 2020 - ieeexplore.ieee.org
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …

SOChain: a privacy-preserving DDoS data exchange service over SOC consortium blockchain

LY Yeh, PJ Lu, SH Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
IoT devices provide a significant medium for distributed denial-of-service (DDoS) attacks. In
2016, a large-scale DDoS attack, named Dyn, caused massive damage to several well …

On blockchain architectures for trust-based collaborative intrusion detection

N Kolokotronis, S Brotsis, G Germanos… - 2019 IEEE world …, 2019 - ieeexplore.ieee.org
This paper considers the use of novel technologies for mitigating attacks that aim at
compromising intrusion detection systems (IDSs). Solutions based on collaborative intrusion …

BlockCSDN: towards blockchain-based collaborative intrusion detection in software defined networking

W Li, Y Wang, W Meng, J Li, C Su - IEICE TRANSACTIONS on …, 2022 - search.ieice.org
To safeguard critical services and assets in a distributed environment, collaborative intrusion
detection systems (CIDSs) are usually adopted to share necessary data and information …

MetaCIDS: Privacy-preserving collaborative intrusion detection for metaverse based on blockchain and online federated learning

VT Truong, LB Le - IEEE Open Journal of the Computer Society, 2023 - ieeexplore.ieee.org
Metaverse is expected to rely on massive Internet of Things (IoT) connections so it inherits
various security threats from the IoT network and also faces other sophisticated attacks …

Blockchain for cybersecurity: systematic literature review and classification

M Liu, W Yeoh, F Jiang, KKR Choo - Journal of Computer …, 2022 - Taylor & Francis
Blockchain has transitioned beyond the hype to reality, as evidenced by the amount of
research it has attracted and by its commercial applications. One popular application of …

A distributed collaborative entrance Defense framework against DDoS attacks on satellite internet

W Guo, J Xu, Y Pei, L Yin, C Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Satellite Internet (SI) dramatically expanded the ground-based Internet, and it is also the
future direction of 6G. However, due to limited computing power and bandwidth resources …

Dynamic distributed honeypot based on blockchain

L Shi, Y Li, T Liu, J Liu, B Shan, H Chen - IEEE Access, 2019 - ieeexplore.ieee.org
Honeypot technology can be applied to efficiently attract attackers and exhaust their
resources. However, the traditional static honeypot is easy to be recognized by anti …

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey

S Ali, Q Li, A Yousafzai - Ad Hoc Networks, 2024 - Elsevier
The industrial internet of things (IIoT) is an evolutionary extension of the traditional Internet of
Things (IoT) into processes and machines for applications in the industrial sector. The IIoT …