Proceedings of the 35th Annual ACM Symposium on Applied Computing 2020
DOI: 10.1145/3341105.3373867
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced network intrusion detection system protocol for internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…NIDS is set up at a selected point as a sub-net within the network to examine and match the passing traffic. Then it analyzes the pacts and raises an alert if violated [21]. These sensors activate the interfaces for managing, controlling, and receiving alerts and then forward the same to the central server.…”
Section: Ids For Iotsmentioning
confidence: 99%
See 2 more Smart Citations
“…NIDS is set up at a selected point as a sub-net within the network to examine and match the passing traffic. Then it analyzes the pacts and raises an alert if violated [21]. These sensors activate the interfaces for managing, controlling, and receiving alerts and then forward the same to the central server.…”
Section: Ids For Iotsmentioning
confidence: 99%
“…These sensors activate the interfaces for managing, controlling, and receiving alerts and then forward the same to the central server. NIDS applications are attached to the network with two interfaces, one monitors the network conversation, and the other control and generate a report of the activity [21]. Table 2.…”
Section: Ids For Iotsmentioning
confidence: 99%
See 1 more Smart Citation
“…A witness or guarantor mediates between a sender and receiver to monitor and validate exchanged communication between the pair. The validation is performed in a non-involved manner [ 29 ]. In other words, no processing or communication is delegated to the witnesses to be performed on behalf of the communicating entities.…”
Section: A Review Of Resource-aiding Modesmentioning
confidence: 99%
“…As a result, variety of malware variants and threats are newly emerging at a faster pace. [2][3][4] Attacks against IoT include theft of sensitive data or disrupting the functions of the network which include, Brute Force, Port Scanning, Denial of Service (DoS), Remote to Local (R2L), Probing (Probe), User to Root (U2R) attacks, etc., These attacks are affect the real-time applications such as transport and network protocols such as HTTP, TCP, SMTP, UDP, FTP, ICMP, etc [5][6][7]. In contrast, anomaly-based detection is used to detect either known or unknown attacks [8,9].…”
Section: Introductionmentioning
confidence: 99%