2020
DOI: 10.30534/ijatcse/2020/0191.52020
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection in the Internet of Things

Abstract: The IoT has been booming in recent years and is evolving rapidly, but attacks against it are also continuing to evolve in a worrying way. In order to take full advantage of these systems, it is worth securing them. Among the greatest security tools to defend IoT against attacks that threaten these low-resource systems (processor, memory, storage, ...), we find Intrusion Detection Systems (IDS). The objective of this paper is to provide a general study on IoT IDS and implementation techniques based on IDS speci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…The goal is to warn users of various attacks threatening their IoT networks, whether internal or external. Internal when the attacker is part of this network, while external when he is outside of it [22].…”
Section: B Intrusion Detection Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…The goal is to warn users of various attacks threatening their IoT networks, whether internal or external. Internal when the attacker is part of this network, while external when he is outside of it [22].…”
Section: B Intrusion Detection Systemmentioning
confidence: 99%
“…To build an IDS, it is necessary to develop three modules: the monitoring module, which monitors system resources and network traffic; the analysis and detection module, which corresponds to the core of the IDS and its role is to find attacks based on a; finally, the alarm module informs users of the presence of attacks [23]. The detection module is based on the following detection algorithms [22]: Anomaly, signature, specification, and hybrid approaches.…”
Section: B Intrusion Detection Systemmentioning
confidence: 99%
“…In the case of action strategy S ad = ðS A , S C Þ, the attacker obtains the highest benefit in the mobile network. In action strategy S ad = ðS P , S D Þ, the intrusion detection system is beneficial to the attacker when the attacker attacks the moving body [10,11]. If an attacker wants to attack a moving body on the network, the intrusion detection system will take preventive measures.…”
Section: Iot Performance Monitoringmentioning
confidence: 99%