An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure
نویسندگان
چکیده
منابع مشابه
Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining
Advanced metering infrastructure (AMI) is an imperative component of the smart grid, as it is responsible for collecting, measuring, analyzing energy usage data, and transmitting these data to the data concentrator and then to a central system in the utility side. Therefore, the security of AMI is one of the most demanding issues in the smart grid implementation. In this paper, we propose an in...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملAdvanced Intrusion Detection System with Prevention Capabilities
Today, with the advent of internet, everyone can do information exchange and resource sharing. Even business organization and government agencies are not behind in this move to reach users for their decision making and for business strategies. But at the same time, with ease of use and availability of various software tools, breaching and penetrating into other's network and confidential c...
متن کاملAn Agent-Based Intrusion Detection System for Local Area Networks
Since it is impossible to predict and identify all the vulnerabilities of a network beforehand, and penetration into a system by malicious intruders cannot always be prevented, intrusion detection systems (IDSs) are essential entities to ensure the security of a networked system. To be effective in carrying out their functions, the IDSs need to be accurate, adaptive, and extensible. Given these...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iet Information Security
سال: 2022
ISSN: ['1751-8709', '1751-8717']
DOI: https://doi.org/10.1049/ise2.12097