Skip to main content

Table 1. Comparison of surveyed systems with the proposed requirements

From: Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions

Requirement Dirichlet-based approach [4] Trust diversity [9] Trust-aware CIDS [1] Bootstraping approach [8]
Global view
Overhead \(\bullet \bullet \circ \) \(\bullet \bullet \bullet \) \(\bullet \circ \circ \) \(\bullet \bullet \bullet \)
Incentive
Initial trust
Forgetting factor
Performance history