2019 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&amp 2019
DOI: 10.1109/itqmis.2019.8928442
|View full text |Cite
|
Sign up to set email alerts
|

Organization of Information Security in Industrial Internet of Things Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Samsonov et al [19] presented various approaches to provide security in IIoT environments. They employed edge and fog computing technologies, various data transmission technologies, cryptographic techniques, IIoT device protection, and blockchain technology to secure IIoT systems.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Samsonov et al [19] presented various approaches to provide security in IIoT environments. They employed edge and fog computing technologies, various data transmission technologies, cryptographic techniques, IIoT device protection, and blockchain technology to secure IIoT systems.…”
Section: Literature Reviewmentioning
confidence: 99%
“…IDSisusedformonitoringthemaliciousattackintheinterconnectednetworkornode.Itactsasthe maliciousactivityisdefinedastheintrusionthatisdestructivetosensornodes.TheIDSsystemcan behardwareorsoftwaretools.IDScanexaminetheuseractionsthatdeterminetheknownattacks andidentifiesmaliciousnetworkbehaviour.Itanalysestheactivityofnodesandnetworkswiththe determinationofvariousintrusionsandalertstheusersafterdetectingtheintrusions.Anintrusion detectionsystem(IDS)isoftenusedtodetectsuspiciousassaultsinanetworkconnectornode.It protectsthenodeornetworksbyactingasalinedefenseagainstintruders (Isbell,et al,2019;Yu& Guo,2019;Yeasmin&Baig,2020).Aninvasionthatleadssensornodestomisbehaveisclassifiedas illicitbehavior.BothhardwareandsoftwarecomponentscanindeedbefoundinanIntrusiondetection systemcanmonitoruseractivitytoidentifyknownrisksandanticipatepotentiallydangerousnetwork connections.Itmonitorsnodeaswellasnetflowtodetectdifferentbreachesandalertscustomers whenbreacheshavebeendiscovered.Asaresult,it'sknownasanalertornetworkingobservation.It preventsthenetworksfrombeingharmedthroughunauthorisedassaultsviageneratingalerts.IAas wellasEAcouldbothbedetectedbytheIntrusiondetectionsystem.Attackernodeinsomekindof alinkednetworkcreateIAs.ThirdpartycandidatescreateEAs,whichhavebeenobtainedthroughan exteriorframework.TheIDStechnologymonitorsnetworkdatatodeterminewhetherthey'refrom illegalorlegitimateindividuals.Observation,inquiry,andalarmarethe3partsofIDS.Thenetworking behaviors,traffic,andassetsareallmonitoredbythemonitoringcomponent.Theresearchisindeedthe majorelementthatusesthedefinedmethodologytoidentifyinvasions.Wheneverintrudershavebeen detected,theWarningcomponenttriggersanalarm.Thereare3typesofIDSs,whicharediscussed beneath (Niedermaier,et al,2019))Host-basedIDSSystem(HIDS):HIDScalculatesdatafroma singleormorehost,suchasarchitecture,systemsoftware,andprogramdocuments.Suchsystem detectsuseractionsandsystemprogrammeoperationsbycollectinginformationfromindividual sourcematerialsandtransferringitovertoaprocessorjustatoperatingnetworklevel.Enhanced recuperation,informativelogs,reducedfalsepositiverate,andunfamiliarattackforecastingwere allbenefitsofthesystem.Indecipherabledata,totalexposure,obliquedata,strangers,andhosting influencearesomeofthedownsides.2)Anomaly-basedIntrusionDetectionSystem(AIDS):Such structureisalsoknownasanomaly-basedvulnerabilityscanning.Thisanalysestheoccurrenceto discovermaliciousactivity.Thisbeginsbydescribingtheattack'stypicalactions.Whenevertheactions differfromwhathasbeenexpected,itisreferredtoasanincursion.3)NIDS(Network-basedIntrusion DetectionSystem):Thismethodrecognizesbreachesviaroutingtrafficvianetworkinterfacecards, gateways,andswitches.Informationisretrievedmostlybystandardnetworkstreamssuchasweb packet.NIDScouldrecognizevariousassaultsintheLocalareanetworkaswellasidentifyintrusions thathost-basedIDScouldn'tidentify.Theeaseofhandling,affordability,detectionlimit,forensic consistency,aswellasidentificationofalleffortsallseemtobebenefitsofNIDS.Degradationat wirespeed,directassaultvulnerability,unintelligiblepackets,andthedifficultyoffullcoveragehave allbeennegatives (Saksonov,et al,2019;AlAbdullatif,et al,2019;Puri,et al,2020).…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…Digital technologies affect business development, and also act as the main condition for survival in the fierce competition in the cargo transportation market. Thanks to them, it is possible to offer a more competitive product, not only making it more convenient for the consumer, but also reducing its cost [8].…”
Section: Fig 1 Digital Technologies At Russian Railwaysmentioning
confidence: 99%