Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis

Wenjuan Li1, Lam For Kwok1
1Department of Computer Science, City University of Hong Kong, Hong Kong

Tài liệu tham khảo

Aditham, 2018, A system architecture for the detection of insider attacks in big data systems, IEEE Trans Dependable Sec Comput, 15, 974, 10.1109/TDSC.2017.2768533 Cho J. H., Chan K., Adali S. A survey on trust modeling. ACM Comput Surv 48(2). Article 28, 40 pages (October 2015). Douceur, 2002, The sybil attack, 2429 Duma, 2006, A trust-aware, p2p-based overlay for intrusion detection, 692 Fung, 2008, Trust management for host-based collaborative intrusion detection, 5273, 109 Fung, 2009, Robust and scalable trust management for collaborative intrusion detection, 33 Fung, 2013, Design and management of collaborative intrusion detection networks, 955 Gong, 2003 Li, 2013, Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges, 518 Li, 2014, Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks, 430, 61 Li, 2016, Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks, Inf Comput Secur, 24, 265, 10.1108/ICS-12-2014-0077 Li, 2016, PMFA: toward passive message fingerprint attacks on challenge-based collaborative intrusion detection networks, 433 Li, 2017, Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model, J Netw Comput. Appl, 77, 135, 10.1016/j.jnca.2016.09.014 Li, 2017, SOOA: exploring special on-off attacks on challenge-based collaborative intrusion detection networks, 402 Li, 2018, Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks, Futur Internet, 10, 10.3390/fi10010006 Li, 2018, Identifying passive message fingerprint attacks via honey challenge in collaborative intrusion detection networks, 1208 Li, 2018, Towards securing challenge-based collaborative intrusion detection networks via message verification, 313 Li, 2019, Designing collaborative blockchained signature-based intrusion detection in IoT environments, Future Gener. Comput. Syst., 96, 481, 10.1016/j.future.2019.02.064 Liang, 2018, Building packet length covert channel over mobile voIP traffics, J Netw Comput Appl, 118, 144, 10.1016/j.jnca.2018.06.012 Liang, 2018, A payload-dependent packet rearranging covert channel for mobile voIP traffic, Inf Sci, 465, 162, 10.1016/j.ins.2018.07.011 Madsen, 2018, Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA, 481 Meng, 2017, 78, 162 Meng, 2018, Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data, IEEE Access, 6, 7234, 10.1109/ACCESS.2017.2772294 Meng, 2018, Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks, IEEE Trans Netw Serv Manag, 15, 761, 10.1109/TNSM.2018.2815280 Meng, 2018, Intrusion detection in the era of Iot: building trust via traffic filtering and sampling, IEEE Comput, 51, 36, 10.1109/MC.2018.3011034 Meng W., Li W., Wang Y., Au M.H. Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. In: Future generation computer systems. In Press, Elsevier. DOI: https://doi.org/10.1016/j.future.2018.06.007. Perrone, 2006, A study of on-off attack models for wireless ad hoc networks, 1 Scarfone, 2007, Guide to intrusion detection and prevention systems (IDPS), 800 Snort: An an open source network intrusion prevention and detection system (IDS/IPS). Homepage: http://www.snort.org/. Tabash, 2018, Insider-threat detection using gaussian mixture models and sensitivity profiles, Comput Secur, 77, 838, 10.1016/j.cose.2018.03.006 Wang Y., Meng W., Li W., Liu Z., Liu Y., Xue H. Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems. In: Concurrency and computation: practice and experience. In Press, Wiley. DOI: https://doi.org/10.1002/cpe.5101. Wu, 2003, Collaborative intrusion detection system (CIDS): aframework for accurate and efficient IDS, 234