Intrusion detection systems for IoT: Opportunities and challenges offered by edge computing

نویسندگان

چکیده

Key components of current cybersecurity methods are the Intrusion Detection Systems (IDSs), where different techniques and architectures applied to detect intrusions. IDSs can be based either on cross-checking monitored events with a database known intrusion experiences, as signature-based, or learning normal behavior system reporting whether anomalous occur, named anomaly-based. This work is dedicated application IDS Internet Things (IoT) networks, also edge computing used support implementation. Specific attention given which leverage device classification at edge. New challenges that arise when deploying an in scenario identified remedies proposed.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Novel opportunities and challenges offered by nanobiomaterials in tissue engineering

Over the last decades, tissue engineering has demonstrated an unquestionable potential to regenerate damaged tissues and organs. Some tissue-engineered solutions recently entered the clinics (eg, artificial bladder, corneal epithelium, engineered skin), but most of the pathologies of interest are still far from being solved. The advent of stem cells opened the door to large-scale production of ...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

Intrusion Detection Systems: Definition, Need and Challenges

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

متن کامل

Intrusion Detection Systems: Definition, Need and Challenges

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ITU journal

سال: 2022

ISSN: ['2616-8375']

DOI: https://doi.org/10.52953/wnvi5792