مقاله انگلیسی رایگان در مورد سیستم های تشخیص نفوذ در اینترنت اشیا – الزویر 2019

 

مشخصات مقاله
ترجمه عنوان مقاله سیستم های تشخیص نفوذ در اینترنت اشیا: یک تحقیق جامع
عنوان انگلیسی مقاله Intrusion detection systems in the Internet of things: A comprehensive investigation
انتشار مقاله سال 2019
تعداد صفحات مقاله انگلیسی 27 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه الزویر
نوع نگارش مقاله
مقاله مروری (Review Article)
مقاله بیس این مقاله بیس میباشد
نمایه (index) Scopus – Master Journals List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
4.205 در سال 2019
شاخص H_index 119 در سال 2020
شاخص SJR 0.592 در سال 2019
شناسه ISSN 1389-1286
شاخص Quartile (چارک) Q1 در سال 2019
مدل مفهومی دارد
پرسشنامه ندارد
متغیر ندارد
رفرنس دارد
رشته های مرتبط کامپیوتر، مهندسی فناوری اطلاعات
گرایش های مرتبط امنیت اطلاعات، مهندسی نرم افزار، اینترنت و شبکه های گسترده، شبکه های کامپیوتری
نوع ارائه مقاله
ژورنال
مجله  شبکه های کامپیوتری – Computer Networks
دانشگاه Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran
کلمات کلیدی اینترنت اشیا، تشخیص نفوذ، حمله داخلی، تشخیص ناهنجاری، امضا و توزیع
کلمات کلیدی انگلیسی Internet of things، Intrusion detection، Internal attack، Anomaly detection، Signature، Distribution
شناسه دیجیتال – doi
https://doi.org/10.1016/j.comnet.2019.05.014
کد محصول E13333
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract

1- Introduction

2- Related work

3- Backgrounds

4- Systematic literature review

5- Intrusion detection systems

6- Discussion

7- Open issues and future trends

8- Limitation

9- Summary and conclusion

References

بخشی از متن مقاله:

Abstract

Recently, a new dimension of intelligent objects has been provided by reducing the power consumption of electrical appliances. Daily physical objects have been upgraded by electronic devices over the Internet to create local intelligence and make communication with cyberspace. Internet of things (IoT) as a new term in this domain is used for realizing these intelligent objects. Since the objects in the IoT are directly connected to the unsafe Internet, the resource constraint devices are easily accessible by the attacker. Such public access to the Internet causes things to become vulnerable to the intrusions. The purpose is to categorize the attacks that do not explicitly damage the network, but by infecting the internal nodes, they are ready to carry out the attacks on the network, which are named as internal attacks. Therefore, the significance of Intrusion Detection Systems (IDSs) in the IoT is undeniable. However, despite the importance of this topic, there is not any comprehensive and systematic review about discussing and analyzing its significant mechanisms. Therefore, in the current paper, a Systematic Literature Review (SLR) of the IDSs in the IoT environment has been presented. Then detailed categorizations of the IDSs in the IoT (anomaly-based, signature-based, specification-based, and hybrid), (centralized, distributed, hybrid), (simulation, theoretical), (denial of service attack, Sybil attack, replay attack, selective forwarding attack, wormhole attack, black hole attack, sinkhole attack, jamming attack, false data attack) have also been provided using common features. Then the advantages and disadvantages of the selected mechanisms are discussed. Finally, the examination of the open issues and directions for future trends are also provided.

Introduction

Connectivity of physical things to the Internet makes it possible to control and manage them from a distance [1]. These devices sense and record client activities, forecast their future actions and give him/her the useful services [2]. It is anticipated that, in the next decade, the Internet will be a seamless fabrication of common networks and related objects [3]. The IoT [4] as a new term in data and information age was originally introduced by the MIT Auto-ID Center in 1998 [5]. It represents a vision where objects are exclusively identified and available over the Internet [4,6,7]. Also, the real world can be more available through personal computers and networked devices over the IoT and Internet [8,9]. US National Intelligence Council (NIC) believes that IoT has a potential effect on US national power. So, they have decided to put it on the list of six disruptive civil technologies [10,11].

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا