A Lightweight Signature-Based IDS for IoT Environment

11/12/2018
by   Nazim Uddin Sheikh, et al.
0

With the advent of large-scale heterogeneous networks comes the problem of unified network control resulting in security lapses that could have otherwise avoided. A mechanism is needed to detect and deflect intruders to safeguard resource constraint edge devices and networks as well. In this paper we demonstrate the use of an optimized pattern recognition algorithm to detect such attacks. Furthermore, we propose an Intrusion Detection System (IDS) methodology and design architecture for Internet of Things that makes the use of this search algorithm to thwart various security breaches. Numerical results are presented from tests conducted with the aid of NSL KDD cup dataset showing the efficacy the IDS

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/07/2018

AI-based Two-Stage Intrusion Detection for Software Defined IoT Networks

Software Defined Internet of Things (SD-IoT) Networks profits from centr...
research
01/25/2019

An Optimized Pattern Recognition Algorithm for Anomaly Detection in IoT Environment

With the advent of large-scale heterogeneous search engines comes the pr...
research
11/26/2019

Security Framework for IoT Devices against Cyber-Attacks

Internet of Things (IoT) is the interconnection of heterogeneous smart d...
research
03/01/2022

A Method Based on Deep Learning for the Detection and Characterization of Cybersecurity Incidents in Internet of Things Devices

Given the increased growing of Internet of Things networks and their pre...
research
03/28/2023

Clustered Federated Learning Architecture for Network Anomaly Detection in Large Scale Heterogeneous IoT Networks

There is a growing trend of cyberattacks against Internet of Things (IoT...
research
12/02/2020

Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing

Key components of current cybersecurity methods are the Intrusion Detect...
research
07/07/2021

A Dual-Port 8-T CAM-Based Network Intrusion Detection Engine for IoT

This letter presents an energy- and memory-efficient pattern-matching en...

Please sign up or login with your details

Forgot password? Click here to reset