2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV) 2021
DOI: 10.1109/icicv50876.2021.9388377
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Systems for Distributed Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…While cloud-based applications or industrial automation systems possess significant resources for monitoring health and determining their status and correct behavior at runtime, IoT devices operate with limited hardware capabilities and tight resource constraints, making monitoring, analysis, and response activities a challenging endeavor [9]. Depending on the type of security issue, or system state, an analysis may need to be performed locally on the device, or centrally by a higher-level authority [10]. Following the NIST Cybersecurity Framework [11], IoT devices need to identify, protect, detect, respond, and recover from cyber-attacks, unauthorized access, and other threats.…”
Section: Introductionmentioning
confidence: 99%
“…While cloud-based applications or industrial automation systems possess significant resources for monitoring health and determining their status and correct behavior at runtime, IoT devices operate with limited hardware capabilities and tight resource constraints, making monitoring, analysis, and response activities a challenging endeavor [9]. Depending on the type of security issue, or system state, an analysis may need to be performed locally on the device, or centrally by a higher-level authority [10]. Following the NIST Cybersecurity Framework [11], IoT devices need to identify, protect, detect, respond, and recover from cyber-attacks, unauthorized access, and other threats.…”
Section: Introductionmentioning
confidence: 99%