{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T22:46:13Z","timestamp":1773787573929,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030299583","type":"print"},{"value":"9783030299590","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29959-0_24","type":"book-chapter","created":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T23:04:10Z","timestamp":1568502250000},"page":"493-511","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks"],"prefix":"10.1007","author":[{"given":"Weizhi","family":"Meng","sequence":"first","affiliation":[]},{"given":"Wenjuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lijun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,15]]},"reference":[{"key":"24_CR1","unstructured":"Chun, B., Lee, J., Weatherspoon, H., Chun, B.N.: Netbait: a Distributed Worm Detection Service. Technical Report IRB-TR-03-033, Intel Research Berkeley (2003)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Duma, C., Karresand, M., Shahmehri, N., Caronni, G.: A trust-aware, P2P-based overlay for intrusion detection. In: DEXA Workshop, pp. 692\u2013697 (2006)","DOI":"10.1109\/DEXA.2006.21"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cose.2014.09.006","volume":"48","author":"I Friedberg","year":"2015","unstructured":"Friedberg, I., Skopik, F., Settanni, G., Fiedler, R.: Combating advanced persistent threats: from network event correlation to incident detection. Comput. Secur. 48, 35\u201357 (2015)","journal-title":"Comput. Secur."},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-87353-2_9","volume-title":"Managing Large-Scale Service Deployment","author":"CJ Fung","year":"2008","unstructured":"Fung, C.J., Baysal, O., Zhang, J., Aib, I., Boutaba, R.: Trust management for host-based collaborative intrusion detection. In: De Turck, F., Kellerer, W., Kormentzas, G. (eds.) DSOM 2008. LNCS, vol. 5273, pp. 109\u2013122. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87353-2_9"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Fung, C.J., Zhang. J., Aib, I., Boutaba, R.: Robust and scalable trust management for collaborative intrusion detection. In: Proceedings of the 11th IFIP\/IEEE International Conference on Symposium on Integrated Network Management (IM), pp. 33\u201340 (2009)","DOI":"10.1109\/INM.2009.5188784"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Fung, C.J.; Zhu, Q., Boutaba, R., Basar, T.: Bayesian decision aggregation in collaborative intrusion detection networks. In: NOMS, pp. 349\u2013356 (2010)","DOI":"10.1109\/NOMS.2010.5488489"},{"key":"24_CR8","unstructured":"Fung, C.J., Boutaba, R.: Design and management of collaborative intrusion detection networks. In: Proceedings of the 2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 955\u2013961 (2013)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Gou, Z., Ahmadon, M.A.B., Yamaguchi, S., Gupta, B.B.: A petri net-based framework of intrusion detection systems. In: Proceedings of the 4th IEEE Global Conference on Consumer Electronics, pp. 579\u2013583 (2015)","DOI":"10.1109\/GCCE.2015.7398575"},{"key":"24_CR10","unstructured":"Huebsch, R., et al.: The architecture of PIER: an internet-scale query processor. In: Proceedings of the 2005 Conference on Innovative Data Systems Research (CIDR), pp. 28\u201343 (2005)"},{"issue":"5","key":"24_CR11","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/3232848","volume":"51","author":"C Kiennert","year":"2018","unstructured":"Kiennert, C., Ismail, Z., Debar, H., Leneutre, J.: A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Comput. Surv. (CSUR) 51(5), 90 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Li, Z., Chen, Y., Beach, A.: Towards scalable and robust distributed intrusion alert fusion with good load balancing. In: Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense (LSAD), pp. 115\u2013122 (2006)","DOI":"10.1145\/1162666.1162669"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, Y., Kwok, L.-F.: Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges. In: Proceedings of the 9th International Conference on Computational Intelligence and Security (CIS), pp. 518\u2013522. IEEE (2013)","DOI":"10.1109\/CIS.2013.115"},{"key":"24_CR14","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-662-43813-8_5","volume-title":"Trust Management VIII","author":"W Li","year":"2014","unstructured":"Li, W., Meng, W., Kwok, L.-F.: Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks. In: Zhou, J., Gal-Oz, N., Zhang, J., Gudes, E. (eds.) IFIPTM 2014. IAICT, vol. 430, pp. 61\u201376. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43813-8_5"},{"issue":"3","key":"24_CR15","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1108\/ICS-12-2014-0077","volume":"24","author":"W Li","year":"2016","unstructured":"Li, W., Meng, W.: Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inf. Comput. Secur. 24(3), 265\u2013276 (2016)","journal-title":"Inf. Comput. Secur."},{"key":"24_CR16","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-319-46298-1_28","volume-title":"Network and System Security","author":"Wenjuan Li","year":"2016","unstructured":"Li, W., Meng, W., Kwok, L.-F., Ip, H.H.S.: PMFA: toward passive message fingerprint attacks on challenge-based collaborative intrusion detection networks. In: Proceedings of the 10th International Conference on Network and System Security (NSS), pp. 433\u2013449 (2016)"},{"key":"24_CR17","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-319-57186-7_30","volume-title":"Green, Pervasive, and Cloud Computing","author":"Wenjuan Li","year":"2017","unstructured":"Li, W., Meng, W., Kwok, L.F.: SOOA: exploring special on-off attacks on challenge-based collaborative intrusion detection networks. In: Proceedings of GPC, pp. 402\u2013415 (2017)"},{"issue":"4","key":"24_CR18","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1080\/18756891.2013.802114","volume":"6","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Kwok, L.F.: Enhancing false alarm reduction using voted ensemble selection in intrusion detection. Int. J. Comput. Intell. Syst. 6(4), 626\u2013638 (2013)","journal-title":"Int. J. Comput. Intell. Syst."},{"issue":"17","key":"24_CR19","doi-asserted-by":"publisher","first-page":"3630","DOI":"10.1016\/j.comnet.2013.08.009","volume":"57","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Li, W., Kwok, L.F.: Towards Adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection. Comput. Netw. 57(17), 3630\u20133640 (2013)","journal-title":"Comput. Netw."},{"key":"24_CR20","first-page":"465","volume-title":"Lecture Notes in Computer Science","author":"Weizhi Meng","year":"2014","unstructured":"Meng, W., Li, W., Kwok, L.-F.: An evaluation of single character frequency-based exclusive signature matching in distinct IDS environments. In: Proceedings of the 17th International Conference on Information Security (ISC), pp. 465\u2013476 (2014)"},{"key":"24_CR21","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.cose.2014.02.006","volume":"43","author":"W Meng","year":"2014","unstructured":"Meng, W., Li, W., Kwok, L.-F.: EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43, 189\u2013204 (2014)","journal-title":"Comput. Secur."},{"issue":"18","key":"24_CR22","doi-asserted-by":"publisher","first-page":"3883","DOI":"10.1002\/sec.1307","volume":"8","author":"W Meng","year":"2015","unstructured":"Meng, W., Li, W., Kwok, L.-F.: Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection. Secur. Commun. Netw. 8(18), 3883\u20133895 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Meng, W., Luo, X., Li, W., Li, Y.: Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice. In: Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1061\u20131068 (2016)","DOI":"10.1109\/TrustCom.2016.0176"},{"issue":"1","key":"24_CR24","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1109\/TNSM.2017.2664893","volume":"14","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Kwok, L.-F.: Towards effective trust-based packet filtering in collaborative network environments. IEEE Trans. Netw. Serv. Manage. 14(1), 233\u2013245 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Mishra, A., Gupta, B.B., Joshi, R.C.: A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques. In: Proceedings of the 2011 European Intelligence and Security Informatics Conference, pp. 286\u2013289 (2011)","DOI":"10.1109\/EISIC.2011.15"},{"issue":"4","key":"24_CR26","doi-asserted-by":"publisher","first-page":"3369","DOI":"10.1109\/COMST.2018.2854724","volume":"20","author":"A Nisioti","year":"2018","unstructured":"Nisioti, A., Mylonas, A., Yoo, P.D., Katos, V.: From intrusion detection to attacker attribution: a comprehensive survey of unsupervised methods. IEEE Commun. Surv. Tutorials 20(4), 3369\u20133388 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Papadopoulos, C., Lindell, R., Mehringer, J., Hussain, A., Govindan, R.: COSSACK: coordinated suppression of simultaneous attacks. In: Proceedings of the 2003 DARPA Information Survivability Conference and Exposition (DISCEX), pp. 94\u201396 (2003)","DOI":"10.1109\/DISCEX.2003.1194932"},{"key":"24_CR28","unstructured":"Porras, P.A., Neumann, P.G.: Emerald: event monitoring enabling responses to anomalous live disturbances. In: Proceedings of the 20th National Information Systems Security Conference, pp. 353\u2013365 (1997)"},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94 (2007)","DOI":"10.6028\/NIST.SP.800-94"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Shekari, T., Bayens, C., Cohen, M., Graber, L., Beyah, R.: RFDIDS: radio frequency-based distributed intrusion detection system for the power grid. In: Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS) (2019)","DOI":"10.14722\/ndss.2019.23462"},{"key":"24_CR31","unstructured":"Snapp, S.R., et al.: DIDS (Distributed Intrusion Detection System) - motivation, architecture, and an early prototype. In: Proceedings of the 14th National Computer Security Conference, pp. 167\u2013176 (1991)"},{"key":"24_CR32","unstructured":"Snort: An an open source network intrusion prevention and detection system (IDS\/IPS). http:\/\/www.snort.org\/"},{"issue":"2","key":"24_CR33","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"Y Sun","year":"2006","unstructured":"Sun, Y., Yu, W., Han, Z., Liu, K.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 305\u2013317 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"24_CR34","doi-asserted-by":"crossref","unstructured":"Tuan, T.A.: A game-theoretic analysis of trust management in P2P systems. In: Proceedings of ICCE, pp. 130\u2013134 (2006)","DOI":"10.1109\/CCE.2006.350832"},{"key":"24_CR35","unstructured":"Wu, Y.-S., Foo, B., Mei, Y., Bagchi, S.: Collaborative Intrusion Detection System (CIDS): a framework for accurate and efficient IDS. In: Proceedings of the 2003 Annual Computer Security Applications Conference (ACSAC), pp. 234\u2013244 (2003)"},{"key":"24_CR36","unstructured":"Yegneswaran, V., Barford, P., Jha, S.: Global intrusion detection in the DOMINO overlay system. In: Proceedings of the 2004 Network and Distributed System Security Symposium (NDSS), pp. 1\u201317 (2004)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29959-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:06:50Z","timestamp":1726358810000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29959-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030299583","9783030299590"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29959-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.laas.fr\/esorics\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"344","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}