یک تحقیق جامع در مورد سیستم های تشخیص نفوذ
ترجمه نشده

یک تحقیق جامع در مورد سیستم های تشخیص نفوذ

عنوان فارسی مقاله: سیستم های تشخیص نفوذ در اینترنت اشیا: یک تحقیق جامع
عنوان انگلیسی مقاله: Intrusion detection systems in the Internet of things: A comprehensive investigation
مجله/کنفرانس: شبکه های کامپیوتری - Computer Networks
رشته های تحصیلی مرتبط: کامپیوتر، مهندسی فناوری اطلاعات
گرایش های تحصیلی مرتبط: امنیت اطلاعات، مهندسی نرم افزار، اینترنت و شبکه های گسترده، شبکه های کامپیوتری
کلمات کلیدی فارسی: اینترنت اشیا، تشخیص نفوذ، حمله داخلی، تشخیص ناهنجاری، امضا و توزیع
کلمات کلیدی انگلیسی: Internet of things، Intrusion detection، Internal attack، Anomaly detection، Signature، Distribution
نوع نگارش مقاله: مقاله مروری (Review Article)
نمایه: Scopus - Master Journals List - JCR
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.comnet.2019.05.014
دانشگاه: Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran
صفحات مقاله انگلیسی: 27
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2019
ایمپکت فاکتور: 4/205 در سال 2019
شاخص H_index: 119 در سال 2020
شاخص SJR: 0/592 در سال 2019
شناسه ISSN: 1389-1286
شاخص Quartile (چارک): Q1 در سال 2019
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: بله
آیا این مقاله مدل مفهومی دارد: دارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
کد محصول: E13333
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست مطالب (انگلیسی)

Abstract

1- Introduction

2- Related work

3- Backgrounds

4- Systematic literature review

5- Intrusion detection systems

6- Discussion

7- Open issues and future trends

8- Limitation

9- Summary and conclusion

References

بخشی از مقاله (انگلیسی)

Abstract

Recently, a new dimension of intelligent objects has been provided by reducing the power consumption of electrical appliances. Daily physical objects have been upgraded by electronic devices over the Internet to create local intelligence and make communication with cyberspace. Internet of things (IoT) as a new term in this domain is used for realizing these intelligent objects. Since the objects in the IoT are directly connected to the unsafe Internet, the resource constraint devices are easily accessible by the attacker. Such public access to the Internet causes things to become vulnerable to the intrusions. The purpose is to categorize the attacks that do not explicitly damage the network, but by infecting the internal nodes, they are ready to carry out the attacks on the network, which are named as internal attacks. Therefore, the significance of Intrusion Detection Systems (IDSs) in the IoT is undeniable. However, despite the importance of this topic, there is not any comprehensive and systematic review about discussing and analyzing its significant mechanisms. Therefore, in the current paper, a Systematic Literature Review (SLR) of the IDSs in the IoT environment has been presented. Then detailed categorizations of the IDSs in the IoT (anomaly-based, signature-based, specification-based, and hybrid), (centralized, distributed, hybrid), (simulation, theoretical), (denial of service attack, Sybil attack, replay attack, selective forwarding attack, wormhole attack, black hole attack, sinkhole attack, jamming attack, false data attack) have also been provided using common features. Then the advantages and disadvantages of the selected mechanisms are discussed. Finally, the examination of the open issues and directions for future trends are also provided.

Introduction

Connectivity of physical things to the Internet makes it possible to control and manage them from a distance [1]. These devices sense and record client activities, forecast their future actions and give him/her the useful services [2]. It is anticipated that, in the next decade, the Internet will be a seamless fabrication of common networks and related objects [3]. The IoT [4] as a new term in data and information age was originally introduced by the MIT Auto-ID Center in 1998 [5]. It represents a vision where objects are exclusively identified and available over the Internet [4,6,7]. Also, the real world can be more available through personal computers and networked devices over the IoT and Internet [8,9]. US National Intelligence Council (NIC) believes that IoT has a potential effect on US national power. So, they have decided to put it on the list of six disruptive civil technologies [10,11].