2018
DOI: 10.3390/fi10010006
|View full text |Cite
|
Sign up to set email alerts
|

Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

Abstract: Abstract:Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing intrusion detection system (IDS) nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3
1

Relationship

3
7

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 24 publications
(46 reference statements)
0
12
0
Order By: Relevance
“…Wherefore, current methods of the network defense are using, such as antivirus, firewalls and "Intrusion Detection system (IDS)" is a technique to detect any indications of unusual activity across many systems or networks and which the most popular security method [25], [28]. IDS were divided into two types: Host-based IDSs (HIDSs) and network-based IDSs (NIDSs) and divided into three classes: signature, anomaly, and hybrid detection, signature detection systems can detect attacks by using pattern matching and a list of the attack patterns, anomaly detection employs machine learning and data mining algorithms to attacks detection and Hybrid IDS uses both signature and anomaly detection [29], [30]. In addition, the attack can be mitigated by using encryption algorithms in order to secure the mobility of data [31].…”
Section: Figure 1 Users Reaching Google Services Over Ipv6mentioning
confidence: 99%
“…Wherefore, current methods of the network defense are using, such as antivirus, firewalls and "Intrusion Detection system (IDS)" is a technique to detect any indications of unusual activity across many systems or networks and which the most popular security method [25], [28]. IDS were divided into two types: Host-based IDSs (HIDSs) and network-based IDSs (NIDSs) and divided into three classes: signature, anomaly, and hybrid detection, signature detection systems can detect attacks by using pattern matching and a list of the attack patterns, anomaly detection employs machine learning and data mining algorithms to attacks detection and Hybrid IDS uses both signature and anomaly detection [29], [30]. In addition, the attack can be mitigated by using encryption algorithms in order to secure the mobility of data [31].…”
Section: Figure 1 Users Reaching Google Services Over Ipv6mentioning
confidence: 99%
“…They further proposed a machine learning-based approach in automatically allocating the values of intrusion sensitivity in real-world applications [31]. Several other related studies regarding IDS improvement can be referred to [32][33][34][35][36][37][38][39][40][41][42][43].…”
Section: Challenge-based Intrusion Detection Mechanism (Shortly Challmentioning
confidence: 99%
“…They introduced a passive message fingerprint attack (PMFA), which enable malicious nodes sending malicious feedback to only normal request and their trust values. They also developed a special On-Off attack (called SOOA) [23], in which malicious nodes could keep responding normally to one node while acting abnormally to another node. In addition, how to reduce the overload in communication is a critical issue for challenge mechanisms in different scenarios, e.g., healthcare [21,34].…”
Section: Related Workmentioning
confidence: 99%