2017
DOI: 10.1109/tnsm.2017.2664893
|View full text |Cite
|
Sign up to set email alerts
|

Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments

Abstract:  Users may download and print one copy of any publication from the public portal for the purpose of private study or research.  You may not further distribute the material or use it for any profit-making activity or commercial gain  You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 45 publications
(32 citation statements)
references
References 33 publications
0
32
0
Order By: Relevance
“…In challenge-based CIDNs, the trustworthiness of a node is mainly determined by challenges, whereas it may still leave a chance for attackers. To further increase the robustness of CIDNs, additional measures can be used to calculate the trust values of a node, like packet-level trust [26]. -Scalability.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In challenge-based CIDNs, the trustworthiness of a node is mainly determined by challenges, whereas it may still leave a chance for attackers. To further increase the robustness of CIDNs, additional measures can be used to calculate the trust values of a node, like packet-level trust [26]. -Scalability.…”
Section: Discussionmentioning
confidence: 99%
“…They also studied how to apply intrusion sensitivity for aggregating alarms and defending against pollution attacks, in which a group of malicious peers collaborate together by providing false alarm rankings [15]. Some other related work regarding how to enhance the performance of IDSs can be referred to [4,5,10,[19][20][21][22][23][24][25][26][27][28][29]…”
Section: Related Workmentioning
confidence: 99%
“…The IDSaaS was developed to monitor and log suspicious network behaviors between virtual machines and within a Virtual Private Cloud (VPC). Several research papers regarding cloud security and IDSs can refer to other works …”
Section: Related Workmentioning
confidence: 99%
“…Then, Vieira et al 45 [49][50][51][52][53][54][55][56] It is easily visible that the cloud environment can offer great and sufficient computing resources to an IDS, while an IDS can provide indispensable protection to safeguard the cloud environment. In this work, we focus on improving the performance of an IDS by means of cloud computing in the particular fields of adaptive false alarm reduction.…”
Section: Cloud-based Intrusion Detectionmentioning
confidence: 99%
“…Figure 9 shows the scheme of management of firewall. Depending on the type of managed computer connection, the administrator will be able to access the WEB-Interface management or the toolkit interface [26]- [27]. The access level through the team interface is high.…”
Section: Registration Of Packetsmentioning
confidence: 99%