Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts
G Spathoulas, G Theodoridis, GP Damiris - International Journal of …, 2021 - Springer
… exchange data, such as network traffic or intrusion detection alerts, due to privacy reasons.
… for attack detection is proposed in this paper. Specifically, homomorphic encryption is used to …
… for attack detection is proposed in this paper. Specifically, homomorphic encryption is used to …
Privacy preserving intrusion detection via homomorphic encryption
… In particular, this paper proposes a novel Intrusion Detection System (IDS) architecture that
using Homomorphic Encryption allows a privacy preserving security monitoring. To the best …
using Homomorphic Encryption allows a privacy preserving security monitoring. To the best …
Intrusion detection system using homomorphic encryption
A Singh, P Kitawat, S Kejriwal, S Kurhade - … Technologies and Internet of …, 2022 - Springer
… RA Popat implements three different algorithms in encryption … secure encryption we have
seen is Homomorphic encryption… using such models for intrusion detection purposes. We can …
seen is Homomorphic encryption… using such models for intrusion detection purposes. We can …
[HTML][HTML] Intrusion detection framework based on homomorphic encryption in AMI network
J Wang, Z Xia, Y Chen, C Hu, F Yu - Frontiers in Physics, 2022 - frontiersin.org
… -party computation, and homomorphic encryption. For federated … intrusion detection
concurrently, this paper proposes a privacy protection method using homomorphic CKKS encryption. …
concurrently, this paper proposes a privacy protection method using homomorphic CKKS encryption. …
Intrusion detection over encrypted network data
… [25] (SEAL) is used in this work as a stateof-the-art homomorphic encryption solution.
SEAL has been publicly released and can be downloaded for experimentation and research …
SEAL has been publicly released and can be downloaded for experimentation and research …
Enhancing Intrusion Detection through Federated Learning with Enhanced Ghost_BiNet and Homomorphic Encryption
OK ChandraUmakantham, S Gajendran… - IEEE …, 2024 - ieeexplore.ieee.org
… Homomorphic encryption is applied to encrypt the local model updates, enhancing data …
intrusion detection, ensuring the confidentiality of sensitive data while improving detection …
intrusion detection, ensuring the confidentiality of sensitive data while improving detection …
A systematic review on the status and progress of homomorphic encryption technologies
… methods for Intrusion Detection Systems (… intrusion detection mechanism against security
attacks. The proposed solution achieved an overall accuracy of 99.43% with 99.92% detection …
attacks. The proposed solution achieved an overall accuracy of 99.43% with 99.92% detection …
A cloud computing security solution based on fully homomorphic encryption
F Zhao, C Li, CF Liu - 16th international conference on …, 2014 - ieeexplore.ieee.org
… At the application end, we need to establish security precautions in worm containment and
intrusion detection against virus, worm, and distributed DoS (DDoS) attacks. We also need to …
intrusion detection against virus, worm, and distributed DoS (DDoS) attacks. We also need to …
Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking
HA Babaeer, SA Al-Ahmadi - IEEE Access, 2020 - ieeexplore.ieee.org
… [16] proposed an Intrusion Detection System to detect sinkhole … runs the intrusion detection
agent by calculating the intrusion ratio of … Comparing the intrusion ratio with a threshold value …
agent by calculating the intrusion ratio of … Comparing the intrusion ratio with a threshold value …
Security and privacy-aware artificial intrusion detection system using federated machine learning
… In this case, the Paillier homomorphic encryption's role is to encrypt the data which is ready
for communication. Hence it is clear that in each iteration of the training process, the cloud …
for communication. Hence it is clear that in each iteration of the training process, the cloud …
相关搜索
- fully homomorphic encryption
- intrusion detection system
- homomorphic encryption data aggregation
- homomorphic encryption cloud computing
- homomorphic encryption federated learning
- homomorphic encryption techniques
- homomorphic encryption data security
- homomorphic encryption intrusion detection alerts
- intrusion detection framework
- homomorphic encryption vulnerability detection
- homomorphic encryption sinkhole detection
- intrusion detection encrypted network data
- intrusion detection encrypted network traffic
- partially homomorphic encryption algorithm
- hybrid homomorphic encryption scheme
- cryptanalysis of a homomorphic encryption scheme