2020
DOI: 10.1145/3382159
|View full text |Cite
|
Sign up to set email alerts
|

Edge-Based Intrusion Detection for IoT devices

Abstract: As the Internet of Things (IoT) is estimated to grow to 25 billion by 2021, there is a need for an effective and efficient Intrusion Detection System (IDS) for IoT devices. Traditional network-based IDSs are unable to efficiently detect IoT malware and new evolving forms of attacks like file-less attacks. In this article, we present a system level Device-Edge split IDS for IoT devices. Our IDS profiles IoT devices according to their “behavior” using system-level information like running process parameters and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 22 publications
0
17
0
Order By: Relevance
“…erefore, the single host-based intrusion detection and the network-based intrusion detection technologies have been increasingly unable to meet the security requirements of the current complex and diverse attack behavior recognition. In addition, the IoT devices based on 5G have a primary function for which computation of massive data is required [4]. e high capacity and complexity of safety audit data on large-scale and high-speed networks are overwhelming to the traditional IDS.…”
Section: Introductionmentioning
confidence: 99%
“…erefore, the single host-based intrusion detection and the network-based intrusion detection technologies have been increasingly unable to meet the security requirements of the current complex and diverse attack behavior recognition. In addition, the IoT devices based on 5G have a primary function for which computation of massive data is required [4]. e high capacity and complexity of safety audit data on large-scale and high-speed networks are overwhelming to the traditional IDS.…”
Section: Introductionmentioning
confidence: 99%
“…Second, all attacks were gathered into one group, and significance weights for this group were determined [12]. Create successful strategies for IoT security and detection of denial of service (DoS) attacks using deep machine learning algorithm integrating evaluation of RF, CNN, and MLP algorithms [13]. Hash chains are used to provide a realistic threat model for IoT devices and a secure mechanism for storing and relocating device records; E-Spion uses system information to create 3-layer core profiles with varied overheads for IoT devices and detects intrusions based on anomalous behavior [14][15][16][17][18][19][20].…”
Section: Related Workmentioning
confidence: 99%
“…It is mainly composed of an agent, an analysis engine, and a response module. Several IDS-based security solutions were developed in the previous year [15][16][17][18][19][20][21][22][23][24][25]. But, these IDS-based security solutions cannot cope with the MEC architecture due to the changing behavior of users and devices.…”
Section: Problem Formulationmentioning
confidence: 99%
“…The system's efficiency is high, but combining three different approaches increases the system complexity and the response time. For the IoT infrastructure, device-edge-based IDS has been proposed in [19]. The IDS is made with the help of behavioral profiles and system-level information.…”
Section: Edge Based Intrusion Detecɵon Frameworkmentioning
confidence: 99%