2017
DOI: 10.1016/j.future.2016.06.036
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving trust management for unwanted traffic control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 28 publications
0
15
0
Order By: Relevance
“…Besides deciding to pursue the traditional security warfare, hackers in the cooperative Internet could (1) attack the reputation system to discredit it or (2) target zero‐day vulnerabilities to exploit their victims or to create botnets. We have studied the question of system attacks on robustness of the Internet‐wide reputation system in the previous studies and have analyzed the scope of traditional warfare previously. Thus, we predict that the paradigm of Internet attacks will shift from hackers targeting users in the current Internet to more advanced hackers (that are capable of) targeting zero‐day vulnerabilities on (high value) targets, i.e.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Besides deciding to pursue the traditional security warfare, hackers in the cooperative Internet could (1) attack the reputation system to discredit it or (2) target zero‐day vulnerabilities to exploit their victims or to create botnets. We have studied the question of system attacks on robustness of the Internet‐wide reputation system in the previous studies and have analyzed the scope of traditional warfare previously. Thus, we predict that the paradigm of Internet attacks will shift from hackers targeting users in the current Internet to more advanced hackers (that are capable of) targeting zero‐day vulnerabilities on (high value) targets, i.e.…”
Section: Discussionmentioning
confidence: 99%
“…For the purpose of implementing such a reputation system in the Internet, we propose (1) CES that operates as a cooperative firewall and (2) an Internet‐wide trust management . The Internet‐wide trust management mimics our collective opinion or social memory of other's behavior.…”
Section: Conclusion and Research Challengesmentioning
confidence: 99%
See 2 more Smart Citations
“…Some work applies host-level data (such as application operation logs, equipment operation logs, host behaviors, etc.) to detect network intrusions on hosts [154][155][156][157][158][159] and concerns host data privacy protection during data collection and processing [160]. A comprehensive detection method by applying all four categories of security data still lacks, but highly expected in the literature for detecting all or most security threats for the purpose of network security measurement.…”
Section: A Open Issuesmentioning
confidence: 99%