Designing collaborative blockchained signature-based intrusion detection in IoT environments

W Li, S Tug, W Meng, Y Wang - Future Generation Computer Systems, 2019 - Elsevier
With the rapid development of Internet-of-Things (IoT), there is an increasing demand for
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …

Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems

Y Wang, W Meng, W Li, Z Liu, Y Liu… - … Practice and Experience, 2019 - Wiley Online Library
To protect assets and resources from being hacked, intrusion detection systems are widely
implemented in organizations around the world. However, false alarms are one challenging …

On blockchain architectures for trust-based collaborative intrusion detection

N Kolokotronis, S Brotsis, G Germanos… - 2019 IEEE world …, 2019 - ieeexplore.ieee.org
This paper considers the use of novel technologies for mitigating attacks that aim at
compromising intrusion detection systems (IDSs). Solutions based on collaborative intrusion …

Towards blockchained challenge-based collaborative intrusion detection

W Li, Y Wang, J Li, MH Au - … and Network Security Workshops: ACNS 2019 …, 2019 - Springer
To protect distributed network resources and assets, collaborative intrusion detection
systems/networks (CIDSs/CIDNs) have been widely deployed in various organizations with …

Practical Bayesian poisoning attacks on challenge-based collaborative intrusion detection networks

W Meng, W Li, L Jiang, KKR Choo, C Su - … 27, 2019, Proceedings, Part I 24, 2019 - Springer
As adversarial techniques constantly evolve to circumvent existing security measures, an
isolated, stand-alone intrusion detection system (IDS) is unlikely to be efficient or effective …

Methods for applying of scheme of packet filtering rules

Y Bakhodir, N Nurbek, Z Odiljon - International Journal of Innovative …, 2019 - elibrary.ru
This article is devoted to research methods for applying of scheme of packet filtering rules.
The scheme of the Firewall is developed on corporate network to allow protect the network …

DVF-fog: distributed virtual firewall in fog computing based on risk analysis

F Kamoun-Abid, A Meddeb-Makhlouf… - … Journal of Sensor …, 2019 - inderscienceonline.com
To eliminate network saturation during data exchanges, fog computing is deployed as the
technology that benefits from both cloud computing and internet of things (IoT) paradigms …

Method of constucting packet filtering rules

KM Malikovich, GS Rajaboevich… - 2019 International …, 2019 - ieeexplore.ieee.org
This article discusses existing problems and solutions in developing methods and models
for packet filtering rules. In addition, an optimal method of constructing filtering rules in …