2016
DOI: 10.1016/j.adhoc.2016.08.014
|View full text |Cite
|
Sign up to set email alerts
|

FACID: A trust-based collaborative decision framework for intrusion detection networks

Abstract: Computer systems evolve to be more complex and vulnerable. Cyber attacks have also grown to be more sophisticated and harder to detect. Intrusion detection is the process of monitoring and identifying unauthorized system access or manipulation. It becomes increasingly difficult for a single intrusion detection system (IDS) to detect all attacks due to limited knowledge about attacks. Collaboration among intrusion detection devices can be used to gain higher detection accuracy and cost efficiency as compared to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 42 publications
(22 citation statements)
references
References 32 publications
(55 reference statements)
0
22
0
Order By: Relevance
“…Samples for both benign and malicious activities are extracted from the CICIDS2017 dataset. 23 This scenario is similar to the collaborative IDS proposed by Fung and Zhu, 20 except for the analyzed attacks and features.…”
Section: Scenario 3: Expert Detectors Cooperationmentioning
confidence: 86%
See 1 more Smart Citation
“…Samples for both benign and malicious activities are extracted from the CICIDS2017 dataset. 23 This scenario is similar to the collaborative IDS proposed by Fung and Zhu, 20 except for the analyzed attacks and features.…”
Section: Scenario 3: Expert Detectors Cooperationmentioning
confidence: 86%
“…Finally, Fung and Zhu 20 propose a collaborative IDS, which deploys IDSs in different parts of the network. IDSs with different specialties or training datasets can consult each other.…”
Section: Collaborative Architecturesmentioning
confidence: 99%
“…It became significantly more difficult for a traditional single intrusion detection system, whether it is network-based, hypervisor-based, or VM-based, to detect all attacks, due to limited knowledge about attacks. Collaboration among intrusion detection systems (IDSs) can be exploited to gain higher detection accuracy as compared to traditional single IDS [1]. Through collaboration, IDSs in different regions, and possibly, belonging to different Cloud Providers (CPs) can cooperate in such a way that makes them utilize the expertise of each other to cover and identify unknown attack patterns.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, they do not need a database of known attacks. However, the shortcoming of using anomalybased detection is the relative high false positive rate compared to the signature-based technique [1]. IDSs may adopt both techniques to have improved detection accuracy.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation