IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Censorship resistant peer-to-peer content addressable networks
SODA '02 Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Indra: A peer-to-peer approach to network intrusion detection and prevention
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Combinatorial Designs: Constructions and Analysis
Combinatorial Designs: Constructions and Analysis
A Novel Peer-to-Peer Intrusion Detection System
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Collaborating against common enemies
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Privacy-preserving sharing and correction of security alerts
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Mapping internet sensors with probe response attacks
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Vulnerabilities of passive internet threat monitors
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
Use of Publisher-Subscriber Design Pattern in Infrastructure of Distributed IDS Systems
ICNS '07 Proceedings of the Third International Conference on Networking and Services
Large-scale collection and sanitization of network security data: risks and challenges
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Security against probe-response attacks in collaborative intrusion detection
Proceedings of the 2007 workshop on Large scale attack defense
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
CNSR '08 Proceedings of the Communication Networks and Services Research Conference
ACM Computing Surveys (CSUR)
Design and modeling of collaboration architecture for security
CTS '09 Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems
Privacy Protection in Passive Network Monitoring: An Access Control Approach
WAINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Collaborative Computer Security and Trust Management
Collaborative Computer Security and Trust Management
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
Scribe: a large-scale and decentralized application-level multicast infrastructure
IEEE Journal on Selected Areas in Communications
Collaborative anomaly-based attack detection
IWSOS'07 Proceedings of the Second international conference on Self-Organizing Systems
Hi-index | 0.00 |
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.