{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T23:26:36Z","timestamp":1764458796636,"version":"3.41.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:00:00Z","timestamp":1496188800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10586-017-0955-8","type":"journal-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T06:15:05Z","timestamp":1496211305000},"page":"299-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks"],"prefix":"10.1007","volume":"21","author":[{"given":"Wenjuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Lam-For","family":"Kwok","sequence":"additional","affiliation":[]},{"given":"Horace H. S.","family":"Ip","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"955_CR1","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, W., Kwok, L.F., Ip, H.H.S.: PMFA: toward passive message fingerprint attacks on challenge-based collaborative intrusion detection networks. In: Proceedings of the 10th International Conference on Network and System Security (NSS 2016), pp. 433\u2013449 (2016)","DOI":"10.1007\/978-3-319-46298-1_28"},{"key":"955_CR2","unstructured":"Chun, B., Lee, J., Weatherspoon, H., Chun, B.N.: Netbait: a distributed worm detection service. Technical Report IRB-TR-03-033, Intel Research Berkeley (2003)"},{"key":"955_CR3","doi-asserted-by":"crossref","unstructured":"Douceur, J.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"955_CR4","doi-asserted-by":"crossref","unstructured":"Duma, C., Karresand, M., Shahmehri, N., Caronni, G.: A trust-aware, P2P-based overlay for intrusion detection. In: DEXA Workshop, pp. 692\u2013697 (2006)","DOI":"10.1109\/DEXA.2006.21"},{"key":"955_CR5","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.cose.2014.09.006","volume":"48","author":"I Friedberg","year":"2015","unstructured":"Friedberg, I., Skopik, F., Settanni, G., Fiedler, R.: Combating advanced persistent threats: from network event correlation to incident detection. Comput. Secur. 48, 35\u201357 (2015)","journal-title":"Comput. Secur."},{"key":"955_CR6","doi-asserted-by":"crossref","unstructured":"Fung, C.J., Baysal, O., Zhang, J., Aib, I., Boutaba, R.: Trust management for host-based collaborative intrusion detection. In: De Turck, F., Kellerer, W. Kormentzas, G. (eds.) DSOM 2008. LNCS, vol. 5273, pp. 109\u2013122 (2008)","DOI":"10.1007\/978-3-540-87353-2_9"},{"key":"955_CR7","doi-asserted-by":"crossref","unstructured":"Fung, C.J., Zhang. J., Aib, I., Boutaba, R.: Robust and scalable trust management for collaborative intrusion detection. In: Proceedings of the 11th IFIP\/IEEE International Conference on Symposium on Integrated Network Management (IM), pp. 33\u201340 (2009)","DOI":"10.1109\/INM.2009.5188784"},{"key":"955_CR8","doi-asserted-by":"crossref","unstructured":"Fung, C.J., Zhu, Q., Boutaba, R., Basar, T.: Bayesian decision aggregation in collaborative intrusion detection networks. In: NOMS, pp. 349\u2013356 (2010)","DOI":"10.1109\/NOMS.2010.5488489"},{"key":"955_CR9","unstructured":"Fung, C.J., Boutaba, R.: Design and management of collaborative intrusion detection networks. In: Proceedings of the 2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 955\u2013961 (2013)"},{"key":"955_CR10","unstructured":"Gong, F.: Next Generation Intrusion Detection Systems (IDS). McAfee Network Security Technologies Group (2003)"},{"key":"955_CR11","doi-asserted-by":"crossref","unstructured":"Gou, Z., Ahmadon, M.A.B., Yamaguchi, S., Gupta, B.B.: A Petri Net-based Framework of Intrusion Detection Systems. In: Proceedings of the 4th IEEE Global Conference on Consumer Electronics, pp. 579\u2013583 (2015)","DOI":"10.1109\/GCCE.2015.7398575"},{"key":"955_CR12","unstructured":"Huebsch, R., Chun, B.N., Hellerstein, J.M., Loo, B.T., Maniatis, P., Roscoe, T., Shenker, S., Stoica, I., Yumerefendi, A.R.: The architecture of PIER: an internet-scale query processor. In: Proceedings of the 2005 Conference on Innovative Data Systems Research (CIDR), pp. 28\u201343 (2005)"},{"key":"955_CR13","doi-asserted-by":"crossref","unstructured":"Li, Z., Chen, Y., Beach, A.: Towards scalable and robust distributed intrusion alert fusion with good load balancing. In: Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense (LSAD), pp. 115\u2013122 (2006)","DOI":"10.1145\/1162666.1162669"},{"key":"955_CR14","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, Y., Kwok, L.-F.: Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges. In: Proceedings of the 9th International Conference on Computational Intelligence and Security (CIS), pp. 518\u2013522. IEEE, Piscataway (2013)","DOI":"10.1109\/CIS.2013.115"},{"key":"955_CR15","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, Y., Kwok, L.-F.: Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks. In: Proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM), pp. 61\u201376. Springer, New York (2014)","DOI":"10.1007\/978-3-662-43813-8_5"},{"issue":"3","key":"955_CR16","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1108\/ICS-12-2014-0077","volume":"24","author":"W Li","year":"2016","unstructured":"Li, W., Meng, W.: Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inform. Comput. Secur. 24(3), 265\u2013276 (2016)","journal-title":"Inform. Comput. Secur."},{"issue":"4","key":"955_CR17","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1080\/18756891.2013.802114","volume":"6","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Kwok, L.F.: Enhancing false alarm reduction using voted ensemble selection in intrusion detection. Int. J. Comput. Intell. Syst. 6(4), 626\u2013638 (2013)","journal-title":"Int. J. Comput. Intell. Syst."},{"issue":"17","key":"955_CR18","doi-asserted-by":"crossref","first-page":"3630","DOI":"10.1016\/j.comnet.2013.08.009","volume":"57","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Li, W., Kwok, L.F.: Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection. Comput. Netw. 57(17), 3630\u20133640 (2013)","journal-title":"Comput. Netw."},{"key":"955_CR19","doi-asserted-by":"crossref","unstructured":"Meng, W., Li, W., Kwok, L.-F.: An evaluation of single character frequency-based exclusive signature matching in distinct IDS environments. In: Proceedings of the 17th International Conference on Information Security (ISC), pp. 465\u2013476 (2014)","DOI":"10.1007\/978-3-319-13257-0_29"},{"key":"955_CR20","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.cose.2014.02.006","volume":"43","author":"W Meng","year":"2014","unstructured":"Meng, W., Li, W., Kwok, L.F.: EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43, 189\u2013204 (2014)","journal-title":"Comput. Secur."},{"issue":"18","key":"955_CR21","doi-asserted-by":"crossref","first-page":"3883","DOI":"10.1002\/sec.1307","volume":"8","author":"W Meng","year":"2015","unstructured":"Meng, W., Li, W., Kwok, L.F.: Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection. Secur. Commun. Netw. 8(18), 3883\u20133895 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"955_CR22","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.jnca.2016.11.012","volume":"78","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Xiang, Y., Choo, K.K.R.: A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78, 162\u2013169 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"955_CR23","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TNSM.2017.2664893","volume":"14","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Kwok, L.-F.: Towards effective trust-based packet filtering in collaborative network environments. IEEE Trans. Netw. Serv. Manag. 14(1), 233\u2013245 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"955_CR24","doi-asserted-by":"crossref","unstructured":"Mishra, A., Gupta, B.B., Joshi, R.C.: A comparative study of distributed Denial of service attacks, intrusion tolerance and mitigation techniques. In: Proceedings of the 2011 European Intelligence and Security Informatics Conference, pp. 286\u2013289 (2011)","DOI":"10.1109\/EISIC.2011.15"},{"key":"955_CR25","doi-asserted-by":"crossref","unstructured":"Papadopoulos, C., Lindell, R., Mehringer, J., Hussain, A., Govindan, R.: COSSACK: coordinated suppression of simultaneous attacks. In: Proceedings of the 2003 DARPA Information Survivability Conference and Exposition (DISCEX), pp. 94\u201396 (2003)","DOI":"10.1109\/DISCEX.2003.1194932"},{"key":"955_CR26","unstructured":"Porras, P.A., Neumann, P.G.: Emerald: event monitoring enabling responses to anomalous live disturbances. In: Proceedings of the 20th National Information Systems Security Conference, pp. 353\u2013365 (1997)"},{"key":"955_CR27","doi-asserted-by":"crossref","unstructured":"Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94 (2007)","DOI":"10.6028\/NIST.SP.800-94"},{"key":"955_CR28","unstructured":"Snapp, S.R., et al.: DIDS (distributed intrusion detection system)\u2014motivation, architecture, and an early prototype. In: Proceedings of the 14th National Computer Security Conference, pp. 167\u2013176 (1991)"},{"key":"955_CR29","unstructured":"Snort: An an open source network intrusion prevention and detection system (IDS\/IPS). Homepage. http:\/\/www.snort.org\/"},{"key":"955_CR30","doi-asserted-by":"crossref","unstructured":"Tuan, T.A.: A game-theoretic analysis of trust management in P2P systems. In: Proceedings of ICCE, pp. 130\u2013134 (2006)","DOI":"10.1109\/CCE.2006.350832"},{"key":"955_CR31","unstructured":"Wu, Y.-S., Foo, B., Mei, Y., Bagchi, S.: Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS. In: Proceedings of the 2003 Annual Computer Security Applications Conference (ACSAC), pp. 234\u2013244 (2003)"},{"key":"955_CR32","unstructured":"Yegneswaran, V., Barford, P., Jha, S.: Global intrusion detection in the DOMINO overlay system. In: Proceedings of the 2004 Network and Distributed System Security Symposium (NDSS), pp. 1\u201317 (2004)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0955-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0955-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0955-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:37:18Z","timestamp":1750282638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0955-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,31]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["955"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0955-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2017,5,31]]}}}