2020
DOI: 10.33166/aetic.2020.05.004
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Hybrid Intrusion Detection System (IDS) for the Detection of Internet of Things (IoT) Network Attacks

Abstract: Nowadays, IoT has been widely used in different applications to improve the quality of life. However, the IoT becomes increasingly an ideal target for unauthorized attacks due to its large number of objects, openness, and distributed nature. Therefore, to maintain the security of IoT systems, there is a need for an efficient Intrusion Detection System (IDS). IDS implements detectors that continuously monitor the network traffic. There are various IDs methods proposed in the literature for IoT security. How… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 26 publications
(32 reference statements)
0
14
0
Order By: Relevance
“…The Internet of Things devices are small, varied, and lack compatibility (Atlam et al, 2022). These qualities broaden the attack surface and complicate the development of any security solution (Ramadan and Yadav, 2020). Not only are IoT devices susceptible to network attacks (Putra et al, 2020), but also powerful hackers from unauthorized internet users.…”
Section: Figurementioning
confidence: 99%
See 1 more Smart Citation
“…The Internet of Things devices are small, varied, and lack compatibility (Atlam et al, 2022). These qualities broaden the attack surface and complicate the development of any security solution (Ramadan and Yadav, 2020). Not only are IoT devices susceptible to network attacks (Putra et al, 2020), but also powerful hackers from unauthorized internet users.…”
Section: Figurementioning
confidence: 99%
“…Additionally, typical cryptography and IDS approaches may be incompatible with such a network. Moreover, as more people gain access to the Internet, hacking tactics become more sophisticated and accessible (Ramadan and Yadav, 2020). As a result, establishing an efficient monitoring strategy for intrusion detection presents a difficulty.…”
Section: The Motivation For the Present Studymentioning
confidence: 99%
“…HIDS is a system that monitors the most important files in the existing system, while NIDS can analyze the incoming network flows. Other researchers divide IDSs according to the approach of the system, the most known is signature-based detection, which can recognize unknown and bad patterns, and anomalybased detection, which has the capability of detecting deviations from a model of "good" traffic and often relies on artificial intelligence [4].…”
Section: Introductionmentioning
confidence: 99%
“…Centred on this, it is essential to maintain individual privacy along with securing the shared data. Therefore, much attention and research interest have been attracted by privacy and also security in the past 10 years [6]. The data transmitted betwixt the sensor and also the IS must not only be authenticated but also be free from alteration, or else the data shall be tracked or attacked by the users [7].…”
Section: Introductionmentioning
confidence: 99%