2012
DOI: 10.1007/978-3-642-35197-6_29
|View full text |Cite
|
Sign up to set email alerts
|

A Brief Introduction to Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…In the IoT environment, most of the data interaction occurs in the network layer and the perceptual layer, and the distribution of the IoT facilities is complex and scattered. The centralized IDS can therefore not effectively detect intrusions of IoT devices [18].…”
Section: Placement Strategymentioning
confidence: 99%
See 1 more Smart Citation
“…In the IoT environment, most of the data interaction occurs in the network layer and the perceptual layer, and the distribution of the IoT facilities is complex and scattered. The centralized IDS can therefore not effectively detect intrusions of IoT devices [18].…”
Section: Placement Strategymentioning
confidence: 99%
“…The primary advantage is high scalability, which means it can be adapted to future IoT environments. The disadvantage is that the resource consumption and communication costs can be high [18].…”
Section: Placement Strategymentioning
confidence: 99%
“…In order to counter those attacks, Intrusion Detection System (IDS) Sharafaldin [1] has been working as a defense line to detect system abnormality, including network anomaly or activities with unauthorized access into the network system. IDS can be classified into network-based IDS (NIDS) [2] and host-based IDS (HIDS) [3] in terms of architecture, or signature-based IDS [4] and anomaly-based IDS [5] in terms of detection techniques. NIDS plays a crucial role in the network defense process by raising alerts for network administrators about on-going abnormal activities, provoked by intrusion, attack or malware.…”
Section: Introductionmentioning
confidence: 99%
“…Yang et al [26] developed a system to secure the IoT in the healthcare environment; it controlled traffic and made the healthcare environment smarter. Furthermore, security methods have been developed for IoT systems, as described in [27][28][29]. Other algorithms applied as solutions for the security of DNP3 traffic include statistical approaches and machine learning [30,31].…”
Section: Introductionmentioning
confidence: 99%