Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing

作者: Francesca Cuomo , Pietro Spadaccino

DOI:

关键词:

摘要: Key components of current cybersecurity methods are the Intrusion Detection Systems (IDSs) were different techniques and architectures are applied to detect intrusions. IDSs can …

参考文章(130)
Ammar Alazab, Michael Hobbs, Jemal Abawajy, Ansam Khraisat, Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware Advances in security of information and communication networks. First International Conference , SecNet 2013 Cairo, Egypt, September Proceedings. pp. 177- 184 ,(2013) , 10.1007/978-3-642-40597-6_15
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004
Chandrashekhar Azad, , Vijay Kumar Jha, Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System International Journal of Computer Network and Information Security. ,vol. 7, pp. 56- 71 ,(2015) , 10.5815/IJCNIS.2015.08.07
N. Pandeeswari, Ganesh Kumar, Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN Mobile Networks and Applications. ,vol. 21, pp. 494- 505 ,(2016) , 10.1007/S11036-015-0644-X
Brian Caswell, Ryan Russell, Jay Beale, Jeffrey Posluns, James C. Foster, Snort 2.0 Intrusion Detection ,(2003)
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
Sumeet Dua, Xian Du, None, Data Mining and Machine Learning in Cybersecurity Auerbach Publications. ,(2011) , 10.1201/B10867
Theodoros Evgeniou, Massimiliano Pontil, Support vector machines: theory and applications Lecture Notes in Computer Science. pp. 249- 257 ,(2001) , 10.1007/3-540-44673-7_12
Manjiri V. Kotpalliwar, Rakhi Wajgi, Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP'99 IDS Database international conference on communication systems and network technologies. pp. 987- 990 ,(2015) , 10.1109/CSNT.2015.185
Bahareh Abolhasanzadeh, Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features conference on information and knowledge technology. pp. 1- 5 ,(2015) , 10.1109/IKT.2015.7288799