Author:
Pietro Spadaccino ,Francesca Cuomo
Abstract
Key components of current cybersecurity methods are the Intrusion Detection Systems (IDSs), where different techniques and architectures are applied to detect intrusions. IDSs can be based either on cross-checking monitored events with a database of known intrusion experiences, known as signature-based, or on learning the normal behavior of the system and reporting whether anomalous events occur, named anomaly-based. This work is dedicated to the application of IDS to the Internet of Things (IoT) networks, where also edge computing is used to support IDS implementation. Specific attention is given to IDSs which leverage device classification at the edge. New challenges that arise when deploying an IDS in an edge scenario are identified and remedies are proposed.
Publisher
International Telecommunication Union
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IoT Cyber Attacks Detection - Survey;2024 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI);2024-06-27
2. Multi-agent Reinforcement Learning-based Network Intrusion Detection System;NOMS 2024-2024 IEEE Network Operations and Management Symposium;2024-05-06
3. Toward Improving Internet of Things (IoT) Networks Security Using Machine Learning Based Intrusion Detection System;2023 International Conference on Digital Age & Technological Advances for Sustainable Development (ICDATA);2023-05-03