Cids: collaborative intrusion detection system using blockchain technology

G Gurung, G Bendiab, M Shiaele… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Due to the colossal advancement of cyber security threats and attacks, intrusion detection
system (IDS) seems to shift their culture toward more collaborative working methods. An …

A collaborative intrusion detection system using deep blockchain framework for securing cloud networks

O Alkadi, N Moustafa, B Turnbull - Intelligent Systems and Applications …, 2021 - Springer
Security solutions, especially intrusion detection and blockchain, have been individually
employed in the cloud for detecting cyber threats and preserving private data. Both solutions …

Method, apparatus, and system for blockchain consensus

W Zhuang - US Patent 11,010,369, 2021 - Google Patents
A blockchain consensus method may comprise: acquiring transaction data; and distributing,
according to a preset distribution rule, the transaction data to at least one consensus unit in …

[HTML][HTML] Distributed watchdogs based on blockchain for securing industrial internet of things

JH Lee, T Kwon - Sensors, 2021 - mdpi.com
The Industrial Internet of Things (IIoT) could enhance automation and analytics in industrial
environments. Despite the promising benefits of IIoT, securely managing software updates is …

Blockchain-based collaborative intrusion detection scheme

T Dang, G Tian, J Wei, S Liu - International Journal of …, 2023 - inderscienceonline.com
The collaborative intrusion detection technique is an effective solution to protect users from
various cyber-attacks, among which the large-scale trusted sharing and real-time updating …

A survey of blockchain applications in IoT systems

DA Noby, A Khattab - 2019 14th International Conference on …, 2019 - ieeexplore.ieee.org
This paper presents an extensive study of the different ways the Internet of Things (IoT)
applications exploit the recently developed blockchain technology. Even though the …

Prioritization and alert fusion in distributed iot sensors using kademlia based distributed hash tables

M Nasir, K Muhammad, P Bellavista, MY Lee… - IEEE …, 2020 - ieeexplore.ieee.org
Distributed intrusion detection systems (IDS) are primarily deployed across the network to
monitor, detect, and report anomalies, as well as to respond in real-time. Predominantly, an …

Blockchain-enabled collaborative intrusion detection in software defined networks

W Fan, Y Park, S Kumar, P Ganta… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Collaborative intrusion detection system (CIDS) shares the critical detection-control
information across the nodes for improved and coordinated defense. Software-defined …

MetaCIDS: A metaverse collaborative intrusion detection system based on blockchain and federated learning

V Truong, LB Le - Authorea Preprints, 2023 - techrxiv.org
Envisioned to be the next-generation Internet, the metaverse faces far more security
challenges due to its large scale, distributed, and decentralized nature. While traditional …

LegIoT: Ledgered trust management platform for IoT

J Neureither, A Dmitrienko, D Koisser, F Brasser… - … –ESORICS 2020: 25th …, 2020 - Springer
We investigate and address the currently unsolved problem of trust establishment in large-
scale Internet of Things (IoT) networks where heterogeneous devices and mutually …