2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference O 2020
DOI: 10.1109/cscloud-edgecom49738.2020.00025
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Architecture for Secured Cyber-Attack Features Exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Blockchain technology also enhances security in small businesses by mitigating the risk of data breaches and unauthorized access. Unlike traditional centralized databases, which are vulnerable to cyberattacks and insider threats, blockchain operates on a distributed network of nodes, each with its copy of the ledger (Ajayi, and Saadawi, 2020;Singh, et al, 2021). This redundancy ensures that even if some nodes fail or are compromised, the network as a whole remains operational.…”
Section: How Blockchain Enhances Security In Small Businessesmentioning
confidence: 99%
“…Blockchain technology also enhances security in small businesses by mitigating the risk of data breaches and unauthorized access. Unlike traditional centralized databases, which are vulnerable to cyberattacks and insider threats, blockchain operates on a distributed network of nodes, each with its copy of the ledger (Ajayi, and Saadawi, 2020;Singh, et al, 2021). This redundancy ensures that even if some nodes fail or are compromised, the network as a whole remains operational.…”
Section: How Blockchain Enhances Security In Small Businessesmentioning
confidence: 99%
“…In [16], the authors identify false data injection attack (FDIA) in the microgrid mechanism, Hilbert-Huang transforms technique, along with BC-related ledger technology, was employed to scale up the security in smart direct current (DC)-microgrids by evaluating the voltage and current signals in controller and smart sensor nodes by deriving signal information. Ajayi et al [17] devised a BCrelated solution that guarantees the consistency and integrity of attack features shared in a cooperative ID mechanism. The modelled structure attains by preventing and identifying compromised intrusion detection system (IDS) nodes and fake feature injection.…”
Section: Related Workmentioning
confidence: 99%
“…Gaps and contributions: Blockchain technology is often organized by linear programming, which allows data communication among the interconnected nodes. However, there is no way to ensure the trustworthiness of the shared data in a cooperative IDS [23]. The existing gap is the lack of learning from different trends in data transmission and malware detection.…”
Section: Machine Learning-based Idsmentioning
confidence: 99%