Art
J-GLOBAL ID:202202263094868622   Reference number:22A0878314

BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking

ブロックCSDN:ソフトウェア定義ネットワーキングにおけるブロックチェーンベース協調侵入検出に向けて
Author (7):
Material:
Volume: E105.D  Issue:Page: 272-279(J-STAGE)  Publication year: 2022 
JST Material Number: U0469A  ISSN: 1745-1361  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: ENGLISH (EN)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

JST classification (1):
JST classification
Category name(code) classified by JST.
Data protection 
Reference (41):
  • [1] W. Li, J. Tan, and Y. Wang, “A framework of blockchain-based collaborative intrusion detection in software defined networking,” Network and System Security, NSS 2020, LNCS 12570, pp.261-276, Springer, 2020. 10.1007/978-3-030-65745-1_15
  • [2] N. Alexopoulos, E Vasilomanolakis, N.R. Ivánkó, and M. Mühlhäuser, “Towards blockchain-based collaborative intrusion detection systems,” Proc. 12th International Conference on Critical Information Infrastructures Security, LNCS 10707, pp.107-118, Springer, 2017. 10.1007/978-3-319-99843-5_10
  • [3] M. Eskandari, Z.H. Janjua, M. Vecchio, and F. Antonelli, “Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices,” IEEE Internet Things J., vol.7, no.8, pp.6882-6897, 2020. 10.1109/jiot.2020.2970501
  • [4] C.J. Fung, O. Baysal, J. Zhang, I. Aib, and R. Boutaba, “Trust management for host-based collaborative intrusion detection,” F. De Turck, W. Kellerer, and G. Kormentzas (eds.), Managing Large-Scale Service Deployment, DSOM 2008, LNCS 5273, pp.109-122, Springer, 2008. 10.1007/978-3-540-87353-2_9
  • [5] T. Golomb, Y. Mirsky, and Y. Elovici, “CIoTA: Collaborative IoT anomaly detection via blockchain,” Proc. Workshop on Decentralized IoT Security and Standards (DISS), pp.1-6, 2018. 10.14722/diss.2018.23003
more...
Terms in the title (4):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page