2022
DOI: 10.1186/s13677-022-00305-6
|View full text |Cite
|
Sign up to set email alerts
|

Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities

Abstract: The Internet of things (IoT) is an important technology that is highly beneficial in establishing smart items, connections and cities. However, there are worries regarding security and privacy vulnerabilities in IoT in which some emerge from numerous sources, including cyberattacks, unsecured networks, data, connections or communication. This paper provides an ensemble intrusion strategy based on Cyborg Intelligence (machine learning and biological intelligence) framework to boost security of IoT enabled netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(14 citation statements)
references
References 36 publications
0
14
0
Order By: Relevance
“…Blockchain was first used as the underlying supporting technology for Bitcoin. In essence, it is a distributed shared database that serves as a revolutionary lowcost credit technology solution, and is widely used in resource sharing, data traceability, and access control [33,34]. Ethereum, a decentralized application platform based on the blockchain, provides an Ethereum virtual machine (EVM) [35] environment to support the operation of scripting languages.…”
Section: Blockchainmentioning
confidence: 99%
“…Blockchain was first used as the underlying supporting technology for Bitcoin. In essence, it is a distributed shared database that serves as a revolutionary lowcost credit technology solution, and is widely used in resource sharing, data traceability, and access control [33,34]. Ethereum, a decentralized application platform based on the blockchain, provides an Ethereum virtual machine (EVM) [35] environment to support the operation of scripting languages.…”
Section: Blockchainmentioning
confidence: 99%
“…The necessity of a more reliable cyber security system than IDSs is cemented by the fact that encrypted packets [119] are unseen by IDSs, hence these violations will not be registered earlier on in the process of intrusion, only to be realized when they have penetrated the network much deeply [120]. Subsequently, attackers mainly use them as the pathway to enter systems and networks [121]. Essentially, in such cases, the systems and networks are vulnerable until the issue is resolved.…”
Section: Common Non-artificial Intelligence Based Techniquesmentioning
confidence: 99%
“…From a personal perspective, threat intelligence can serve as an important defense indicator, and attackers also need threat intelligence to update technical means and achieve the goal of hiding their true identity through attack information forgery and intelligence. From the perspective of enterprises, different security companies can exchange different threat intelligence, such as vulnerability information [2]. P reputation information, license list.…”
Section: Introductionmentioning
confidence: 99%