2014 Sixth International Conference on Measuring Technology and Mechatronics Automation 2014
DOI: 10.1109/icmtma.2014.57
|View full text |Cite
|
Sign up to set email alerts
|

Design of Complex Event-Processing IDS in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 78 publications
(46 citation statements)
references
References 12 publications
0
46
0
Order By: Relevance
“…We believe the dynamic nature of the IoT systems makes the challenge of multi-stage attack detection non-trivial requiring explicit efforts to address it. Jun and Chi [20] represent one of the initial effort which recognize and explicitly seek to detect relationships between different malicious incidents. However, it represents a limited effort and further work is required to address detection and protection against multi-stage attacks within the IoT systems.…”
Section: ) Constrained Resources: a Typical Iot Device Hasmentioning
confidence: 99%
“…We believe the dynamic nature of the IoT systems makes the challenge of multi-stage attack detection non-trivial requiring explicit efforts to address it. Jun and Chi [20] represent one of the initial effort which recognize and explicitly seek to detect relationships between different malicious incidents. However, it represents a limited effort and further work is required to address detection and protection against multi-stage attacks within the IoT systems.…”
Section: ) Constrained Resources: a Typical Iot Device Hasmentioning
confidence: 99%
“…Jun and Chi [91] proposed an IDS integrated with complex event-processing (CEP) technology. The benefit of CEP technology is the ability to identify complex patterns via real-time data processing.…”
Section: Idss Designed For Iot Systemsmentioning
confidence: 99%
“…An architecture to protect against DoS attacks within 6LoWPANs has been presented in [35] where the system uses network-level traffic and attack signature to identify malicious traffic. Moreover, Jun and Chi addressed the problem of processing a significant volume of alerts and network traffic as a part of intrusion detection in [36]. The authors identified the challenge of a significant volume of network traffic within a limited time to be processed by an intrusion detection module and proposed to use established Complex Event Processing (CEP) techniques to address this challenge.…”
Section: Intrusion Detection Within Iot Systemsmentioning
confidence: 99%