[PDF][PDF] Collaborative Intrusion Detection leveraging Blockchain and Pluggable Authentication Modules.

V Kanth, A McAbee, M Tummala, JC McEachen - HICSS, 2020 - core.ac.uk
As the threat of cyber attack grows ever larger, new approaches to security are required.
While there are several different types of intrusion detection systems (IDS), collaborative IDS …

A secure and efficient IIoT anomaly detection approach using a hybrid deep learning technique

BR Konatham - 2023 - corescholar.libraries.wright.edu
Abstract The Industrial Internet of Things (IIoT) refers to a set of smart devices, ie, actuators,
detectors, smart sensors, and autonomous systems connected throughout the Internet to …

Credible Link Flooding Attack Detection and Mitigation: A Blockchain-Based Approach

X Jiang, Q Shi, H Miao, W Cao, H He… - … on Network and …, 2024 - ieeexplore.ieee.org
Due to the concentrated distribution of network traffic, the Internet is highly vulnerable to link
flooding attack in Distributed Denial-of-Service attacks (DDoS-LFA), which utilizes the …

A Secured Intrusion Detection System for Mobile Edge Computing

K Alsubhi - Applied Sciences, 2024 - mdpi.com
With the proliferation of mobile devices and the increasing demand for low-latency and high-
throughput applications, mobile edge computing (MEC) has emerged as a promising …

Anomaly detection in blockchain using machine learning

G Sanjay Rai, SB Goyal, P Chatterjee - Computational Intelligence for …, 2023 - Springer
With the increasing use of Blockchain, community has become increasingly worried about its
security, that has led to substantial research by academics, with anomaly detection being a …

Machine learning for alternative mining in pow-based blockchains: Theory, implications and applications

H Baniata, R Prodan, A Kertesz - Authorea Preprints, 2023 - techrxiv.org
Blockchain (BC) technology provides a secure distributed transactional database, that can
enhance the security and privacy of decentralized systems and applications, eg distributed …

A collaborative intrusion detection approach based on deep learning and blockchain

C Hazman, S Amaouche, M Abdedaime… - … and machine learning …, 2024 - taylorfrancis.com
Intrusion detection systems developed in the past few years could identify a wide range of
harmful network assaults using a number of monitoring methodologies. Still, existing …

Collaborative Cybersecurity Using Blockchain: A Survey

L Miller, MO Pahl - arXiv preprint arXiv:2403.04410, 2024 - arxiv.org
Collaborative cybersecurity relies on organizations sharing information to boost security, but
trust management is a key concern. Decentralized solutions like distributed ledgers …

Proof of stake for blockchain based distributed intrusion detecting system

I Burmaka, N Stoianov, V Lytvynov, M Dorosh… - International scientific …, 2020 - Springer
One of the most important component of each corporate network is an intrusion detecting
system. But it is a problem to find a mechanism for setting a trust between the nodes in a big …

FBA-SDN: a federated byzantine approach for blockchain-based collaborative intrusion detection in edge SDN

J Hayes, A Aneiba, M Gaber, MS Islam… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
This paper presents FBA-SDN, a novel Stellar Consensus Protocol (SCP)-based Federated
Byzantine Agreement System (FBAS) approach to trustworthy Collaborative Intrusion …