2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) 2019
DOI: 10.1109/iemcon.2019.8936231
|View full text |Cite
|
Sign up to set email alerts
|

Countermeasure of Attack Vectors using Signature-Based IDS in IoT Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…In another categorization performed depending on the type of intrusions, the IDSs are categorised into four, namely, IDS based on signature, IDS based on anomaly [18], IDS based on specifcation [19,20], and hybrid approachbased IDS [21]. In IDS based on signatures [22], for each attack to be detected, it describes the attack pattern. In this scheme, a trigger message is raised when the attack matches the described pattern.…”
Section: Introductionmentioning
confidence: 99%
“…In another categorization performed depending on the type of intrusions, the IDSs are categorised into four, namely, IDS based on signature, IDS based on anomaly [18], IDS based on specifcation [19,20], and hybrid approachbased IDS [21]. In IDS based on signatures [22], for each attack to be detected, it describes the attack pattern. In this scheme, a trigger message is raised when the attack matches the described pattern.…”
Section: Introductionmentioning
confidence: 99%
“…It is well known for its flexibility to customize feature. However, it has some limitations such as the difficulty of deployment [35].…”
Section: Zeek (Formally "Bro")mentioning
confidence: 99%
“…It can be either host-based (HIDS) or network-based (NIDS) and is integral for IoT systems as it can detect variations in sensor readings, network abnormality, and so on [ 24 , 25 ]. Intrusion detection systems are categorized into three types: signature-based, anomaly-based, and stateful protocol [ 26 , 27 ]. Additionally, IDS methods can be implemented in three ways: supervised, unsupervised, or semi-supervised, which can be implemented through AI, statistical modeling, and so on [ 28 ].…”
Section: Introductionmentioning
confidence: 99%