مشخصات مقاله | |
ترجمه عنوان مقاله | سیستم های تشخیص نفوذ در اینترنت اشیا: یک تحقیق جامع |
عنوان انگلیسی مقاله | Intrusion detection systems in the Internet of things: A comprehensive investigation |
انتشار | مقاله سال 2019 |
تعداد صفحات مقاله انگلیسی | 27 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله مروری (Review Article) |
مقاله بیس | این مقاله بیس میباشد |
نمایه (index) | Scopus – Master Journals List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
4.205 در سال 2019 |
شاخص H_index | 119 در سال 2020 |
شاخص SJR | 0.592 در سال 2019 |
شناسه ISSN | 1389-1286 |
شاخص Quartile (چارک) | Q1 در سال 2019 |
مدل مفهومی | دارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | کامپیوتر، مهندسی فناوری اطلاعات |
گرایش های مرتبط | امنیت اطلاعات، مهندسی نرم افزار، اینترنت و شبکه های گسترده، شبکه های کامپیوتری |
نوع ارائه مقاله |
ژورنال |
مجله | شبکه های کامپیوتری – Computer Networks |
دانشگاه | Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran |
کلمات کلیدی | اینترنت اشیا، تشخیص نفوذ، حمله داخلی، تشخیص ناهنجاری، امضا و توزیع |
کلمات کلیدی انگلیسی | Internet of things، Intrusion detection، Internal attack، Anomaly detection، Signature، Distribution |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.comnet.2019.05.014 |
کد محصول | E13333 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
1- Introduction 2- Related work 3- Backgrounds 4- Systematic literature review 5- Intrusion detection systems 6- Discussion 7- Open issues and future trends 8- Limitation 9- Summary and conclusion References |
بخشی از متن مقاله: |
Abstract Recently, a new dimension of intelligent objects has been provided by reducing the power consumption of electrical appliances. Daily physical objects have been upgraded by electronic devices over the Internet to create local intelligence and make communication with cyberspace. Internet of things (IoT) as a new term in this domain is used for realizing these intelligent objects. Since the objects in the IoT are directly connected to the unsafe Internet, the resource constraint devices are easily accessible by the attacker. Such public access to the Internet causes things to become vulnerable to the intrusions. The purpose is to categorize the attacks that do not explicitly damage the network, but by infecting the internal nodes, they are ready to carry out the attacks on the network, which are named as internal attacks. Therefore, the significance of Intrusion Detection Systems (IDSs) in the IoT is undeniable. However, despite the importance of this topic, there is not any comprehensive and systematic review about discussing and analyzing its significant mechanisms. Therefore, in the current paper, a Systematic Literature Review (SLR) of the IDSs in the IoT environment has been presented. Then detailed categorizations of the IDSs in the IoT (anomaly-based, signature-based, specification-based, and hybrid), (centralized, distributed, hybrid), (simulation, theoretical), (denial of service attack, Sybil attack, replay attack, selective forwarding attack, wormhole attack, black hole attack, sinkhole attack, jamming attack, false data attack) have also been provided using common features. Then the advantages and disadvantages of the selected mechanisms are discussed. Finally, the examination of the open issues and directions for future trends are also provided. Introduction Connectivity of physical things to the Internet makes it possible to control and manage them from a distance [1]. These devices sense and record client activities, forecast their future actions and give him/her the useful services [2]. It is anticipated that, in the next decade, the Internet will be a seamless fabrication of common networks and related objects [3]. The IoT [4] as a new term in data and information age was originally introduced by the MIT Auto-ID Center in 1998 [5]. It represents a vision where objects are exclusively identified and available over the Internet [4,6,7]. Also, the real world can be more available through personal computers and networked devices over the IoT and Internet [8,9]. US National Intelligence Council (NIC) believes that IoT has a potential effect on US national power. So, they have decided to put it on the list of six disruptive civil technologies [10,11]. |