2021
DOI: 10.1109/access.2021.3117938
|View full text |Cite
|
Sign up to set email alerts
|

D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems

Abstract: Collaborative Intrusion Detection Systems are considered an effective defense mechanism for large, intricate, and multilayered Industrial Internet of Things against many cyberattacks. However, while a Collaborative Intrusion Detection System successfully detects and prevents various attacks, it is possible that an inside attacker performs a malicious act and compromises an Intrusion Detection System node. A compromised node can inflict considerable damage on the whole collaborative network. For instance, when … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 39 publications
(37 reference statements)
0
4
0
Order By: Relevance
“…There are pollution attacks in the NC-enabled environment that corrupt packets while they The Chained Secure Mode (CSM) [12] and D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems (D2Gen) [13]. The proposed model is contrasted with the existing models and the results represent that the proposed model performs better in detection of pollution attacks.…”
Section: Resultsmentioning
confidence: 99%
“…There are pollution attacks in the NC-enabled environment that corrupt packets while they The Chained Secure Mode (CSM) [12] and D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems (D2Gen) [13]. The proposed model is contrasted with the existing models and the results represent that the proposed model performs better in detection of pollution attacks.…”
Section: Resultsmentioning
confidence: 99%
“…Instead, if the fake node allows malicious communication into the system, all of the nodes are vulnerable. Hence, Makhdoom et al [13] presented a Digital Genome-based device integrity check mechanism to identify a corrupted network node. The term genome is used in the field of medicine to describe a collection of genetic instructions for constructing and maintaining an organism.…”
Section: Collaborative Intrusion Detection System Successfully Detect...mentioning
confidence: 99%
“…Erroneous decoding will occur as a result of these tampered packets. Bypassing real nodes, polluting even more traffic, the infected packets spread throughout the network [13]. As a result, pinpointing both the infected packets and the malicious users is a top priority.…”
Section: Fig 1: Small Cell Technologymentioning
confidence: 99%