Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max
Steghöfer, Jan-Philipp ; Esfandiari, Babak (eds.) (2017):
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
In: Trust Management XI, pp. 94-109,
Springer, 11th International Conference on Trust Management (IFIPTM 2017), Gothenburg, Sweden, 12.-16.06., ISBN 978-3-319-59170-4,
DOI: 10.1007/978-3-319-59171-1_8,
[Conference or Workshop Item]
Abstract
Collaborative Intrusion Detection Systems (CIDSs) are an<br />emerging field in cyber-security. In such an approach, multiple sensors<br />collaborate by exchanging alert data with the goal of generating a complete<br />picture of the monitored network. This can provide significant improvements<br />in intrusion detection and especially in the identification of<br />sophisticated attacks. However, the challenge of deciding to which extend<br />a sensor can trust others, has not yet been holistically addressed<br />in related work. In this paper, we firstly propose a set of requirements<br />for reliable trust management in CIDSs. Afterwards, we carefully investigate<br />the most dominant CIDS trust schemes. The main contribution of<br />the paper is mapping the results of the analysis to the aforementioned<br />requirements, along with a comparison of the state of the art. Furthermore,<br />this paper identifies and discusses the research gaps and challenges<br />with regard to trust and CIDSs.
Item Type: | Conference or Workshop Item |
---|---|
Erschienen: | 2017 |
Editors: | Steghöfer, Jan-Philipp ; Esfandiari, Babak |
Creators: | Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max |
Title: | Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions |
Language: | English |
Abstract: | Collaborative Intrusion Detection Systems (CIDSs) are an<br />emerging field in cyber-security. In such an approach, multiple sensors<br />collaborate by exchanging alert data with the goal of generating a complete<br />picture of the monitored network. This can provide significant improvements<br />in intrusion detection and especially in the identification of<br />sophisticated attacks. However, the challenge of deciding to which extend<br />a sensor can trust others, has not yet been holistically addressed<br />in related work. In this paper, we firstly propose a set of requirements<br />for reliable trust management in CIDSs. Afterwards, we carefully investigate<br />the most dominant CIDS trust schemes. The main contribution of<br />the paper is mapping the results of the analysis to the aforementioned<br />requirements, along with a comparison of the state of the art. Furthermore,<br />this paper identifies and discusses the research gaps and challenges<br />with regard to trust and CIDSs. |
Book Title: | Trust Management XI |
Publisher: | Springer |
ISBN: | 978-3-319-59170-4 |
Uncontrolled Keywords: | SPIN: Smart Protection in Infrastructures and Networks |
Divisions: | 20 Department of Computer Science 20 Department of Computer Science > Telecooperation Profile Areas Profile Areas > Cybersecurity (CYSEC) |
Event Title: | 11th International Conference on Trust Management (IFIPTM 2017) |
Event Location: | Gothenburg, Sweden |
Event Dates: | 12.-16.06. |
Date Deposited: | 07 Jun 2018 14:48 |
DOI: | 10.1007/978-3-319-59171-1_8 |
Additional Information: | IFIP Advances in Information and Communication Technology, vol 505 |
Identification Number: | TUD-CS-2017-0058 |
PPN: | |
Corresponding Links: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
![]() |
Send an inquiry |
Options (only for editors)
![]() |
Show editorial Details |