2022
DOI: 10.1186/s13677-022-00338-x
|View full text |Cite
|
Sign up to set email alerts
|

Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations

Abstract: A datacentre stores information and manages data access in fast and reliable manner. Failure of datacentre operation is not an option and can be catastrophic. Internet of things (IoT) devices in datacentre can automate management tasks and reduce human intervention and error. IoT devices can be used to manage many datacentre routine tasks such as monitoring physical infrastructure, updating software and configuration, monitoring network traffic, and automating alerting reports to respective authorities. The ph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 114 publications
0
3
0
Order By: Relevance
“…However, these protocols also introduce some communication costs and may require some level of coordination between untrusting parties. [18]- [20] Zero-knowledge proofs are cryptographic procedures which let one party to prove to the other party that he knows particular knowledge without need to reveal the knowledge items. It allows performing authentication and verification procedures without the need to transmit any sensitive data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, these protocols also introduce some communication costs and may require some level of coordination between untrusting parties. [18]- [20] Zero-knowledge proofs are cryptographic procedures which let one party to prove to the other party that he knows particular knowledge without need to reveal the knowledge items. It allows performing authentication and verification procedures without the need to transmit any sensitive data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A rules engine is adopted by many IoT edge frameworks to enable the autonomous and dynamic operation of various service scenarios in the IoT edge platforms [20][21][22][23]. As a rule-based system, the CEP filters incoming events from sensors to trigger actions according to the defined rules.…”
Section: Related Workmentioning
confidence: 99%
“…Bashlite (also called Gafgyt) and its successor Mirai are examples of botnets that have recently caused large-scale DDoS attacks by exploiting IoT devices. Due to the open source codes of these botnets, attackers managed to create many novel variations [3,4].…”
Section: Introductionmentioning
confidence: 99%