2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS) 2018
DOI: 10.1109/ctems.2018.8769135
|View full text |Cite
|
Sign up to set email alerts
|

Raspberry Pi as an Intrusion Detection System, a Honeypot and a Packet Analyzer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 8 publications
0
6
0
3
Order By: Relevance
“…However, NetGaurd is nothing different to a traditional IDS and just provides privacy by hiding the IP of the monitoring source, as an extra feature. There are few other similar implementations like [23,24]. The mere purpose of these implementation is to install and test IDS software on Raspberry Pi for various purposes.…”
Section: Iot Based Ids Implementationsmentioning
confidence: 99%
“…However, NetGaurd is nothing different to a traditional IDS and just provides privacy by hiding the IP of the monitoring source, as an extra feature. There are few other similar implementations like [23,24]. The mere purpose of these implementation is to install and test IDS software on Raspberry Pi for various purposes.…”
Section: Iot Based Ids Implementationsmentioning
confidence: 99%
“…For example, Kutukian (2016) implements the network monitoring tools on Raspberry Pi 3 to enable network admin to get fully monitoring access against networking hardware such as router, firewall and core switch. Several studies focus in intrusion detection system using Raspberry Pi for network monitoring and security were established (Osman et al, 2016;Tripathi & Kumar, 2018;Sumanth & Bhanu, 2020).…”
Section: Related Workmentioning
confidence: 99%
“…The IDS studies [5,[19][20][21][22][23][24][25][26][27] also have proposed attack detection based on Raspberry Pi. In the work of [18], the anomaly-based detection method was proposed by capturing the previous traffic patterns asbenign data for attack detection system construction.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%