2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) 2021
DOI: 10.1109/iceccme52200.2021.9590961
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection and Prevention in Industrial IoT: A Technological Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…In [119], the authors surveyed the different types of attacks that an attacker can launch against IIoT equipment and mentioned ways to mitigate such attacks. In work [120], the authors reviewed intrusion-detection and -prevention mechanisms in the IIoT domain and highlight different protocols, algorithms, and mechanisms. In addition, they compared different mechanisms used to detect, prevent, and secure IIoT systems.…”
Section: Survey Discussionmentioning
confidence: 99%
“…In [119], the authors surveyed the different types of attacks that an attacker can launch against IIoT equipment and mentioned ways to mitigate such attacks. In work [120], the authors reviewed intrusion-detection and -prevention mechanisms in the IIoT domain and highlight different protocols, algorithms, and mechanisms. In addition, they compared different mechanisms used to detect, prevent, and secure IIoT systems.…”
Section: Survey Discussionmentioning
confidence: 99%
“…The security database stores the collected signatures of various attacks, and the data is preprocessed and sent to IDS for detection. IDS and Next Generation Firewall (NGFW) work together to maintain the security of IIoT [2]. Network traffic as a stream of data comes from one or more data sources [3], with high frequency and large data volume, and many data will not be saved.…”
Section: Introductionmentioning
confidence: 99%
“…Introduction: Blockchain technology has drawn more attention in recent years due to its potential applications in various industries, including finance, healthcare, and cybersecurity [1]. In particular, developing Intrusion Detection System (IDS) based on blockchain technology could significantly improve the accuracy of intrusion detection while lowering false alarms and improving scalability [2]. As a result, this research aims to present a novel methodology in this paper that will improve the accuracy of blockchain-based IDS.…”
mentioning
confidence: 99%