From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation

S Ebrahimi, P Hassanizadeh - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Remote attestation (RA) protocols have been widely used to evaluate the integrity of
software on remote devices. Currently, the state-of-the-art RA protocols lack a crucial …

Blockchain based intrusion detection in agent-driven flight operations

A Qasim, M Bilal, A Munawar… - Multiagent and Grid …, 2024 - content.iospress.com
Security and protection of the data is the core objective of every organization, but since
cyber-attacks got more advanced than ever before, the data is compromised more often …

Network Intrusion Detection Using Genetic Algorithm and Predictive Rule Mining

U Sinha, A Gupta, DK Sharma, A Goel… - Cognitive Informatics and …, 2021 - Springer
In the modern digital world, there are over 4.3 billion Internet users contributing to the ever-
increasing network traffic. With the huge network traffic growth, there is an increase in …

Query-crafting DoS threats against internet DNS

SY Chang, Y Park, NV Kengalahalli… - 2020 IEEE Conference …, 2020 - ieeexplore.ieee.org
Domain name system (DNS) resolves the IP addresses of domain names and is critical for IP
networking. Recent denial-of-service (DoS) attacks on Internet targeted the DNS system (eg …

TRIDEnT: towards a decentralized threat indicator marketplace

N Alexopoulos, E Vasilomanolakis, SL Roux… - Proceedings of the 35th …, 2020 - dl.acm.org
Sophisticated mass attacks, especially when exploiting zero-day vulnerabilities, have the
potential to cause destructive damage to organizations and critical infrastructure. To timely …

Developing a blockchain-enabled collaborative intrusion detection system: an exploratory study

D Laufenberg, L Li, H Shahriar, M Han - … Proceedings of the 2020 Future of …, 2020 - Springer
Abstract A Collaborative Intrusion Detection System (CIDS) is a system which a set of IDS
work together to defend the computer networks against increasingly sophisticated cyber …

[图书][B] Intrusion detection using machine learning algorithms

DH Lakshminarayana - 2019 - search.proquest.com
There is an immense explosion of data everywhere, from keeping our word documents,
excel worksheets to the data owned and operated by industries, banking/financial sectors …

The impact of blockchain on cybersecurity management

RE Sibai, K Challita, JB Abdo, J Demerjian - Advances in cybersecurity …, 2021 - Springer
Blockchain is a disruptive technology that impacted businesses, industries, and economies.
Blockchain's success is mainly due to its multi-role technology that can be applied to a wide …

Collaborative intrusion detection system in blockchain: A review

H Boukhriss, O Boutkhoum, A Arqane… - AIP Conference …, 2023 - pubs.aip.org
Regarding the ever-growing danger of malicious incidents and attacks on the Internet,
researchers on Intrusion Detection System (IDS) are moving towards more collaborative …

Evaluating a blockchain-based network performance for the intrusion detection system

IA Burmaka, VV Lytvynov, IS Skiter… - … машины и системы, 2020 - cyberleninka.ru
Intrusion detection systems are the important part of every corporate network. But current
amount of network traffic in corporate network is so big that centralized intrusion detection …