Trustworthy placements: Improving quality and resilience in collaborative attack detection
Tài liệu tham khảo
Zhou, 2010, A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, 29, 124, 10.1016/j.cose.2009.06.008
Salah, 2013, A model-based survey of alert correlation techniques, Computer Networks, 57, 1289, 10.1016/j.comnet.2012.10.022
Fung, 2011, Trust management and admission control for host-based collaborative intrusion detection, Journal of Network and Systems Management, 19, 257, 10.1007/s10922-010-9176-7
M. Gil Pérez, F. Gómez Mármol, G. Martínez Pérez, A.F. Gómez Skarmeta, Mobility in collaborative alert systems: building trust through reputation, NETWORKING 2011 Workshops, Workshop on Wireless Cooperative Network Security, Lecture Notes in Computer Science, May 2011, vol. 6827, pp. 251–262, http://dx.doi.org/10.1007/978-3-642-23041-7_24.
Sabater, 2005, Review on computational trust and reputation models, Artificial Intelligence Review, 24, 33, 10.1007/s10462-004-0041-5
Dohi, 2012, An adaptive mode control algorithm of a scalable intrusion tolerant architecture, Journal of Computer and System Sciences, 78, 1751, 10.1016/j.jcss.2011.10.022
Mukherjee, 2011, Comparing reputation schemes for detecting malicious nodes in sensor networks, The Computer Journal, 54, 482, 10.1093/comjnl/bxq035
Wu, 2010, The use of computational intelligence in intrusion detection systems: a review, Applied Soft Computing, 10, 1, 10.1016/j.asoc.2009.06.019
Sourcefire, Inc., “Snort: an open source network intrusion prevention and detection system,” <http://www.snort.org>.
Spathoulas, 2010, Reducing false positives in intrusion detection systems, Computers & Security, 29, 35, 10.1016/j.cose.2009.07.008
Oh, 2007, Detection of DDoS and IDS evasion attacks in a high-speed networks environment, International Journal of Computer Science and Network Security, 7, 124
Gen, 2008
J.E. Tapiador, J.A. Clark, Learning autonomic security reconfiguration policies, in: Proceedings of the 10th IEEE International Conference on Computer and Information Technology, June 2010, pp. 902–909, http://dx.doi.org/10.1109/CIT.2010.168.
De Catanzaro, 1996, The scaling of dispersion and correlation: a comparison of least-squares and absolute-deviation statistics, British Journal of Mathematical and Statistical Psychology, 49, 171, 10.1111/j.2044-8317.1996.tb01081.x
Sun, 2008, Defense of trust management vulnerabilities in distributed networks, IEEE Communications Magazine, 46, 112, 10.1109/MCOM.2008.4473092
T.D. Huynh, Trust and Reputation in Open Multi-Agent Systems, Ph.D. Thesis, University of Southampton, Electronics and Computer Science, June 2006.
J.A. Clark, J.L. Jacob, Two-stage optimisation in the design of boolean functions, in: Proceedings of the 5th Australasian Conference on Information Security and Privacy, Lecture Notes in Computer Science, July 2000, vol. 1841, pp. 242–254, http://dx.doi.org/10.1007/10718964_20.
J.E. Tapiador, J.A. Clark, and J.C. Hernández-Castro, Non-linear cryptanalysis revisited: heuristic search for approximations to S-boxes, in: Proceedings of the 11th IMA International Conference on Cryptography and Coding, Lecture Notes in Computer Science, December 2007, vol. 4887, pp. 99–117, http://dx.doi.org/10.1007/978-3-540-77272-9_7.
Kirkpatrick, 1983, Optimization by simulated annealing, Science, 220, 671, 10.1126/science.220.4598.671
Tapiador, 2009, Highly entangled multi-qubit states with simple algebraic structure, Journal of Physics A: Mathematical and Theoretical, 42, 415301, 10.1088/1751-8113/42/41/415301
Gamer, 2012, Collaborative anomaly-based detection of large-scale internet attacks, Computer Networks, 56, 169, 10.1016/j.comnet.2011.08.015
S.R. Snapp, J. Brentano, G.V. Dias, T.L. Goan, L.T. Heberlein, C.-L. Ho, K.N. Levitt, B. Mukherjee, S.E. Smaha, T. Grance, D.M. Teal, D. Mansur, DIDS (Distributed Intrusion Detection System) – motivation architecture, and an early prototype, in: Proceedings of the 14th National Computer Security Conference, October 1991, pp. 167–176.
SANS Internet Storm Center, DShield, <http://www.dshield.org>.
R.A. Kemmerer, NSTAT: a model-based real-time network intrusion detection system, Technical Report 1997-18, University of California, Santa Barbara, November 1998.
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, D. Zerkle, GrIDS – a graph-based intrusion detection system for large networks, in: Proceedings of the 19th National Information Systems Security Conference, October 1996, pp. 361–370.
P.A. Porras, P.G. Neumann, EMERALD: event monitoring enabling responses to anomalous live disturbances, in: Proceedings of the 20th National Information Systems Security Conference, October 1997, pp. 353–365.
Ganame, 2008, A global security architecture for intrusion detection on computer networks, Computers & Security, 27, 30, 10.1016/j.cose.2008.03.004
V. Yegneswaran, P. Barford, S. Jha, Global intrusion detection in the DOMINO overlay system, in: Proceedings of Network and Distributed Security Symposium, February 2004.
M.E. Locasto, J.J. Parekh, A.D. Keromytis, S.J. Stolfo, Towards collaborative security and P2P intrusion detection, in: Proceedings of the 6th Annual IEEE SMC on Information Assurance Workshop, June 2005, pp. 333–339, http://dx.doi.org/10.1109/IAW.2005.1495971.
G. Garrison, R.L. Wakefield, X. Xu, S.H. Kim, Globally Distributed Teams: The Effect of Diversity on Trust, Cohesion and Individual Performance, ACM SIGMIS Database, vol. 41, no. 3, pp. 27–48, August 2010, http://dx.doi.org/10.1145/1851175.1851178.
Liang, 2012, The impact of value diversity on information system development projects, International Journal of Project Management, 30, 731, 10.1016/j.ijproman.2011.11.006
E. Totel, F. Majorczyk, L. Mé, COTS diversity based intrusion detection and application to web servers, Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol. 3858, September 2005, pp. 43–62, http://dx.doi.org/10.1007/11663812_3.
K. Bartos, M. Rehak, Trust-based solution for robust self-configuration of distributed intrusion detection systems, in: Proceedings of the 20th European Conference on Artificial Intelligence, August 2012, pp. 121–126, http://dx.doi.org/10.3233/978-1-61499-098-7-121.
Jøsang, 2007, A survey of trust and reputation systems for online service provision, Decision Support Systems, 43, 618, 10.1016/j.dss.2005.05.019
H. Chen, Y.B. Al-Nashif, Q. Guangzhi, S. Hariri, Self-configuration of network security, in: Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference, October 2007, pp. 97–110, http://dx.doi.org/10.1109/EDOC.2007.45.
V. Stankovic, L. Strigini, A Survey on Online Monitoring Approaches of Computer-Based Systems, Technical Report, Centre for Software Reliability, City University London, London, UK, June 2009.
Distributed Management Task Force, Inc., Web-Based Enterprise Management (WBEM), <http://www.dmtf.org/standards/wbem>.
I. Brahmi, S.B. Yahia, P. Poncelet, A Snort-based mobile agent for a distributed intrusion detection system, in: Proceedings of the 2011 International Conference on Security and Cryptography, July 2011, pp. 198–207.
Gómez Mármol, 2010, Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems, Computer Standards & Interfaces, 32, 185, 10.1016/j.csi.2010.01.003
Gil Pérez, 2013, RepCIDN: a reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms, Journal of Network and Systems Management, 21, 128, 10.1007/s10922-012-9230-8