2022
DOI: 10.1007/978-981-16-6407-6_18
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Network Intrusion Detection System Using Artificial Intelligence: Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 28 publications
0
3
0
2
Order By: Relevance
“…Nakkeeran and Mathi [ 122 ] provided a framework for end-to-end IoT sensor and device solutions and a detection method for identifying suspicious and anomalous network behaviour through cross-layer analysis. Maidamwar et al [ 124 ] reviewed the design of an intrusion detection framework for the WSN-based IoT, which they described as being able to increase confidence in the reliability of IoT networks and contain network intrusions. Raimundo and Rosário [ 125 ] filled a gap in the research on cybersecurity risks in the IoT domain by discussing the existing solutions and cyberthreats in the industrial Internet of Things (IIoT), based on a literature review.…”
Section: Cybersecurity In Smart Citiesmentioning
confidence: 99%
“…Nakkeeran and Mathi [ 122 ] provided a framework for end-to-end IoT sensor and device solutions and a detection method for identifying suspicious and anomalous network behaviour through cross-layer analysis. Maidamwar et al [ 124 ] reviewed the design of an intrusion detection framework for the WSN-based IoT, which they described as being able to increase confidence in the reliability of IoT networks and contain network intrusions. Raimundo and Rosário [ 125 ] filled a gap in the research on cybersecurity risks in the IoT domain by discussing the existing solutions and cyberthreats in the industrial Internet of Things (IIoT), based on a literature review.…”
Section: Cybersecurity In Smart Citiesmentioning
confidence: 99%
“…With the rise of the Internet of Things (IoT), the number and diversity of threats to the security of computer networks are increasing [1]. Thus, detecting attacks and protecting the network has become a very challenging task for security mechanisms, such as the Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) [2]. The main challenges faced in monitoring and preventing these attacks are the large amount of data generated by the IoT devices and the costs and time of analysis and processing involved.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, it is not only relevant to detect malicious activity on the network but it is also crucial to identify and classify the attacks. According to the specific type of attack identified, various actions can be taken to stop and prevent the future occurrence of this attack [2].…”
Section: Introductionmentioning
confidence: 99%
“…No cenário atual, cresce cada vez mais a quantidade e diversidade de ameac ¸as à seguranc ¸a das redes de computadores [Liang and Kim 2021]. Assim, detectar ataques e proteger a rede tem se tornado uma tarefa muito desafiadora para os mecanismos de seguranc ¸a, como Sistema de Detecc ¸ão de Intrusão (Intrusion Detection System -IDS) e Sistema de Prevenc ¸ão de Intrusão (Intrusion Prevention System -IPS) [Maidamwar et al 2022]. Os principais desafios enfrentados no monitoramento e prevenc ¸ão de ataques são a grande quantidade de dados e os custos e tempo da análise e do processamento envolvidos.…”
Section: Introduc ¸ãOunclassified
“…Além disso, é importante não apenas detectar a ocorrência de uma ac ¸ão maliciosa na rede, mas também conseguir caracterizar e classificar os ataques de forma correta. De acordo com o tipo específico de ataque identificado, pode-se tomar decisões e ac ¸ões distintas nas redes buscando interromper o ataque em andamento e prevenir a ocorrência futura deste ataque [Maidamwar et al 2022].…”
Section: Introduc ¸ãOunclassified