[go: up one dir, main page]

Devi et al., 2022 - Google Patents

A Review Paper on IDS in Edge Computing or EoT

Devi et al., 2022

View PDF
Document ID
15964232530860988137
Author
Devi R
Kumar A
Kumar V
Saini A
Kumari A
Kumar V
Publication year
Publication venue
2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)

External Links

Snippet

The main intention of edge computing is to improve network performance by storing and computing data at the edge of the network near the end user. However, its rapid development largely ignores security threats in large-scale computing platforms and their …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Gao et al. A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network
Karatas et al. Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset
Belouch et al. A two-stage classifier approach using reptree algorithm for network intrusion detection
Verma et al. Network intrusion detection using clustering and gradient boosting
Abadeh et al. A parallel genetic local search algorithm for intrusion detection in computer networks
Kumar et al. Intrusion Detection System using decision tree algorithm
Devi et al. A Review Paper on IDS in Edge Computing or EoT
Saxena et al. Intrusion detection in KDD99 dataset using SVM-PSO and feature reduction with information gain
Ullah et al. A filter-based feature selection model for anomaly-based intrusion detection systems
Subaira et al. Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey
Rahman et al. Attacks classification in adaptive intrusion detection using decision tree
Hammad et al. T‐SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems
Sivanantham et al. Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network.
Neethu Adaptive intrusion detection using machine learning
Ketepalli et al. Data preparation and pre-processing of intrusion detection datasets using machine learning
Chattopadhyay et al. A comprehensive review and meta-analysis on applications of machine learning techniques in intrusion detection
Yu et al. WEB DDoS attack detection method based on semisupervised learning
Soewu et al. Analysis of Data Mining-Based Approach for Intrusion Detection System
Fathima et al. Improving distributed denial of service attack detection using supervised machine learning
Dharamkar et al. A review of cyber attack classification technique based on data mining and neural network approach
Dharaneish et al. Comparative analysis of deep learning and machine learning models for network intrusion detection
Gosu et al. A hybrid approach for the analysis of feature selection using information gain and BAT techniques on the anomaly detection
Beulah et al. Towards Improved Detection of Intrusions with Constraint-Based Clustering (CBC)
Abbood et al. A survey on intrusion detection system in ad hoc networks based on machine learning
Sozol et al. Anomaly Detection in Cybersecurity with Graph-Based Approaches