Defense strategies against Byzantine attacks in a consensus-based network intrusion detection system