2019 IEEE World Congress on Services (SERVICES) 2019
DOI: 10.1109/services.2019.00019
|View full text |Cite
|
Sign up to set email alerts
|

On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection

Abstract: This paper considers the use of novel technologies for mitigating attacks that aim at compromising intrusion detection systems (IDSs). Solutions based on collaborative intrusion detection networks (CIDNs) could increase the resilience against such attacks as they allow IDS nodes to gain knowledge from each other by sharing information. However, despite the vast research in this area, trust management issues still pose significant challenges and recent works investigate whether these could be addressed by relyi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 36 publications
(15 citation statements)
references
References 19 publications
0
15
0
Order By: Relevance
“…The report emphasized that all teams and their members automatically adhere to company governance, compliance, and data-centric privacy and security policies upon creation. In such instances, a trust-based blockchain can be a good solution to protect the integrity of the information shared among the collaborative network peers, increasing their liability, and protecting their association by thwarting insider attacks [75]. Intrusion detection system (IDS) deployment can also become vulnerable to insider threats due to its interconnected and distributed nature [76].…”
Section: Collaborative Insider Threatmentioning
confidence: 99%
“…The report emphasized that all teams and their members automatically adhere to company governance, compliance, and data-centric privacy and security policies upon creation. In such instances, a trust-based blockchain can be a good solution to protect the integrity of the information shared among the collaborative network peers, increasing their liability, and protecting their association by thwarting insider attacks [75]. Intrusion detection system (IDS) deployment can also become vulnerable to insider threats due to its interconnected and distributed nature [76].…”
Section: Collaborative Insider Threatmentioning
confidence: 99%
“…Blockchain can be seen as the key technology to provide the fundamental security enhancements to secure the smart home ecosystem and diminish the security concerns regarding the authorisation and authentication, integrity and confidentiality of IoT data, as well as, the single point of failure. However, an essential challenge for the integration of the blockchain technology to the smart home ecosystem is the reliability and the trustworthiness of the IoT data [99,169]. Due to the immutability of blockchains, if the IoT data that are being stored to the blockchain are already corrupted, then they will remain corrupted.…”
Section: Security Requirementsmentioning
confidence: 99%
“…Therefore, applications of blockchain towards enhancing the security and privacy of the IoT have received great attention due to its capacity in providing a fundamentally di erent approach as a distributed, transparent and accountable sys-tem [54,100,169]. Examples of application areas include identity security [24], intrusion detection systems and mitigation of distributed denial-of-service attacks [15,99], data security and digital forensic evidence preservation [2,38], as well as privacy enhancement and management [70,102]. Specifically for the IoT, the security through transparency approach in public blockchains has in many cases clear advantages compared to the usual security through obscurity model.…”
Section: Introductionmentioning
confidence: 99%
“…These issues may be addressed while using clear and simple semantics. As trust management mechanisms have been widely studied in various research fields [21], it is now commonly accepted that the seamless integration of trust management mechanisms in IoT is needed [22,23]. The recommendation and standardization of a well-defined trust negotiation language supporting the semantic interoperability of IoT context is a challenging and open IoT-trust modelling and management topic [24,25].…”
Section: Virtual Entities: Iot Management and Trustful Interactionsmentioning
confidence: 99%