مشخصات مقاله | |
انتشار | مقاله سال 2017 |
تعداد صفحات مقاله انگلیسی | 6 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه IEEE |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Intrusion detection in Cloud Internet of Things Environment |
ترجمه عنوان مقاله | تشخیص نفوذ در محیط ابری اینترنت اشیا |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی فناوری اطلاعات، مهندسی کامپیوتر |
گرایش های مرتبط | اینترنت و شبکه های گسترده، رایانش ابری |
مجله | کنفرانس بین المللی ریاضیات و فناوری اطلاعات – International Conference on Mathematics and Information Technology |
دانشگاه | University of Mustapha Stambouli – ALGERIA LRSBG Laboratory – TVIM Group |
کلمات کلیدی | اینترنت اشیا، IoT ابری، سیستم تشخیص نفوذ، مشخصات زمانی، مشخصات فضایی |
کلمات کلیدی انگلیسی | Internet of Things, CloudIoT, Intrusion Detection System, Temporal Profile, Spatial profile |
کد محصول | E6157 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
I. INTRODUCTION
The Internet of Things is going to be the next evolution in the era of Internet Technology, where the main concept about this new paradigm is to allow connectivity anywhere and at anytime by allowing objects to abstract information and share it without human interfering [1]. By using the RFID (Radio Frequency Identification) [1], we can make objects actually connect with each other and share information in order to make life a better place. The main problems with the Internet of Things project are the objects themselves: for example, the lack of storage space for each individual object while we have billions of objects, and the processing performance of each object, the maintaining of a durable communication between the objects, the security as well as the confidentiality of them and also the information collected by each one. Therefore, CloudIoT is a fusion between two different aspects: Cloud Computing and the Internet of Things [2]. Cloud provides the unlimited capacity of storage and the highest possible speed and performance of execution. It also provides the durably required communication. The only problem is how to guarantee the security and the confidentiality of both the information and the whole Internet of Things system. We are, therefore, led to a different aspect consisting in the IDS (Intrusion Detection System) [3]: which is probably the most convincing solution to maintain such complicated system secured. So, an IDS must be installed inside the CloudIoT to keep full control on the information from one side and the requests/responses transaction between the CloudIoT and the clients from the other side. IDS can control the circulation of information which means it may influence the confidentiality of clients. This explains why only few IDS were made for a CloudIoT project. As a solution to such problem, we propose an IDS that can detect intrusion based on the Requests details, and User’s profile using the data provided by the execution of requested on the CloudIoT servers without checking the information circulating in the system, but by checking the user’s profile, it detects intrusion by a suspected behavior of each client. |