An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach
Hosseinpour, F., Vahdani Amoli, P., Plosila, J., Hämäläinen, T., & Tenhunen, H. (2016). An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach. International Journal of Digital Content Technology and its Applications, 10(5), 34-46. http://www.globalcis.org/jdcta/ppl/JDCTA3775PPL.pdf
Julkaistu sarjassa
International Journal of Digital Content Technology and its ApplicationsTekijät
Päivämäärä
2016Tekijänoikeudet
© the Authors & Advanced Institute of Convergence IT, 2016. This is an open access article published by Convergence Information Society.
The Internet of Things (IoT) is widely used in advanced logistic systems. Safety and security of such systems are utmost important to guarantee the quality of their services. However, such systems are vulnerable to cyber-attacks. Development of lightweight anomaly based intrusion detection systems (IDS) is one of the key measures to tackle this problem. In this paper, we present a new distributed and lightweight IDS based on an Artificial Immune System (AIS). The IDS is distributed in a three-layered IoT structure including the cloud, fog and edge layers. In the cloud layer, the IDS clusters primary network traffic and trains its detectors. In the fog layer, we take advantage of a smart data concept to analyze the intrusion alerts. In the edge layer, we deploy our detectors in edge devices. Smart data is a very promising approach for enabling lightweight and efficient intrusion detection, providing a path for detection of silent attacks such as botnet attacks in IoT-based systems.
...
Julkaisija
Advanced Institute of Convergence ITISSN Hae Julkaisufoorumista
1975-9339
Alkuperäislähde
http://www.globalcis.org/jdcta/ppl/JDCTA3775PPL.pdfJulkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/26490691
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Dynamic Resource Allocation and Computation Offloading for IoT Fog Computing System
Chang, Zheng; Liu, Liqing; Guo, Xijuan; Sheng, Quan (IEEE, 2021)Fog computing system emerges as one of the promising technology for realizing the Internet of Things (IoT). By offloading the computational tasks to the fog node (FN) at the network edge, both the service latency and energy ... -
Incentive Mechanism for Edge Computing-based Blockchain : A Sequential Game Approach
Guo, Wenlong; Chang, Zheng; Guo, Xijuan; Wu, Peiliang; Han, Zhu (Institute of Electrical and Electronics Engineers (IEEE), 2022)The development of the blockchain framework is able to provide feasible solutions for a wide range of Industrial Internet of Things (IIoT) applications. While the IIoT devices are usually resource-limited, how to make sure ... -
Blockchain-Based Resource Trading in Multi-UAV Edge Computing System
Xu, Runchen; Chang, Zheng; Zhang, Xinran; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2024)Unmanned aerial vehicle (UAV) assisted mobile edge computing (MEC) systems have emerged as a promising technology with the capability to expand terrestrial networks. UAVs, working as edge computing nodes and mobile base ... -
Anomaly-based online intrusion detection system as a sensor for cyber security situational awareness system
Kokkonen, Tero (University of Jyväskylä, 2016)Almost all the organisations and even individuals rely on complex structures of data networks and networked computer systems. That complex data ensemble, the cyber domain, provides great opportunities, but at the same ... -
An Efficient Network Log Anomaly Detection System using Random Projection Dimensionality Reduction
Juvonen, Antti; Hämäläinen, Timo (IEEE, 2014)Network traffic is increasing all the time and network services are becoming more complex and vulnerable. To protect these networks, intrusion detection systems are used. Signature-based intrusion detection cannot find ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.