A novel intrusion detection system for internet of things devices and data

نویسندگان

چکیده

Abstract As we enter the new age of Internet Things (IoT) and wearable gadgets, sensors, embedded devices are extensively used for data aggregation its transmission. The extent processed by IoT networks makes it vulnerable to outside attacks. Therefore, is important design an intrusion detection system (IDS) that ensures security, integrity, confidentiality their data. State-of-the-art IDSs have poor capabilities incur high communication device overhead, which not ideal applications requiring secured real-time processing. This research presents a teaching-learning-based optimization enabled (TLBO-IDS) effectively protects from attacks also low overhead at same time. proposed TLBO-IDS can detect analysis attacks, fuzzing shellcode worms, denial service (Dos) exploits, backdoor tested performance compared with state-of-the-art algorithms. In particular, outperforms bat algorithm genetic (GA) 22.2% 40% respectively.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

A survey of intrusion detection in Internet of Things

Internet of Things (IoT) is a new paradigm that integrates the Internet and physical objects belonging to different domains such as home automation, industrial process, human health and environmental monitoring. It deepens the presence of Internet-connected devices in our daily activities, bringing, in addition to many benefits, challenges related to security issues. For more than two decades, ...

متن کامل

SVELTE: Real-time intrusion detection in the Internet of Things

In the Internet of Things (IoT), resource-constrained things are connected to the unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are secured with encryption and authentication, these things are exposed both to wireless attacks from inside the 6LoWPAN network and from the Internet. Since these attacks may succeed, Intrusion Detection Systems (IDS) are necessary. ...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Bayesian Modeling Based on Data from the Internet of Things

The Internet of Things is suggested as the upcoming revolution in the Information and communication technology due to its very high capability of making various businesses and industries more productive and efficient. This productivity comes from the emergence of innovation and the introduction of new capabilities for businesses. Different industries have shown varying reactions to IOT, but wha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Networks

سال: 2023

ISSN: ['2366-1186', '2366-1445']

DOI: https://doi.org/10.1007/s11276-023-03435-0