CBSigIDS: towards collaborative blockchained signature-based intrusion detection

S Tug, W Meng, Y Wang - … on Internet of Things (iThings) and …, 2018 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) are one of the most important security mechanisms that
help identify various attacks. To enhance the detection performance of a single IDS …

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

W Li, W Meng, LF Kwok, HHS Ip - Cluster Computing, 2018 - Springer
Traditionally, an isolated intrusion detection system (IDS) is vulnerable to various types of
attacks. In order to enhance IDS performance, collaborative intrusion detection networks …

Towards securing challenge-based collaborative intrusion detection networks via message verification

W Li, W Meng, Y Wang, J Han, J Li - Information Security Practice and …, 2018 - Springer
With the increasing number of Internet-of-Things (IoT) devices, intrusion detection systems
(IDSs) have been widely deployed in a distributed or collaborative setting, in which a …

Identifying passive message fingerprint attacks via honey challenge in collaborative intrusion detection networks

W Li, W Meng, Y Wang, LF Kwok… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
To enhance the detection capability of a single intrusion detection system (IDS),
collaborative intrusion detection networks (CIDNs) have been exploited and developed via …

Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA

D Madsen, W Li, W Meng, Y Wang - … 15-17, 2018, Proceedings, Part IV 18, 2018 - Springer
Cyber attacks are greatly expanding in both size and complexity. To handle this issue,
research has been focused on collaborative intrusion detection networks (CIDNs), which …

[PDF][PDF] Privacy protection of encrypted medical data over multi-authority cloud system

M Ahmed, TS Shavali - 2018 - oaijse.com
In the present-day cloud computing Private sensitive data service utilization of independent
and corporate needs enormous computational power and scalability over data storage …