Green Intrusion Detection Systems: A Comprehensive Review and Directions

被引:0
作者
Roy, Swapnoneel [1 ]
Sankaran, Sriram [2 ]
Zeng, Mini [3 ]
机构
[1] Univ North Florida, Sch Comp, Jacksonville, FL 32224 USA
[2] Amrita Vishwa Vidyapeetham, Ctr Cybersecur Syst & Networks, Amritapuri 690525, Kerala, India
[3] Jacksonville Univ, Comp Sci, Jacksonville, FL 32211 USA
关键词
energy optimization; intrusion detection; cybersecurity; anomaly detection; DETECTION FRAMEWORK; ANOMALY DETECTION; DETECTION ENGINE; INTERNET; IDS; LIGHTWEIGHT; NETWORKS; SENSORS; HYBRID; THINGS;
D O I
10.3390/s24175516
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Intrusion detection systems have proliferated with varying capabilities for data generation and learning towards detecting abnormal behavior. The goal of green intrusion detection systems is to design intrusion detection systems for energy efficiency, taking into account the resource constraints of embedded devices and analyzing energy-performance-security trade-offs. Towards this goal, we provide a comprehensive survey of existing green intrusion detection systems and analyze their effectiveness in terms of performance, overhead, and energy consumption for a wide variety of low-power embedded systems such as the Internet of Things (IoT) and cyber physical systems. Finally, we provide future directions that can be leveraged by existing systems towards building a secure and greener environment.
引用
收藏
页数:23
相关论文
共 103 条
  • [1] Abduvaliyev A., 2010, 2010 International Conference on Electronics and Information Engineering (ICEIE 2010), P25, DOI 10.1109/ICEIE.2010.5559708
  • [2] Intrusion detection in sensor networks: A non-cooperative game approach
    Agah, A
    Das, SK
    Basu, K
    Asadi, M
    [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 343 - 346
  • [3] Al Ahmad Mahmoud, 2020, Progress in Computing, Analytics and Networking. Proceedings of ICCAN 2019. Advances in Intelligent Systems and Computing (AISC 1119), P567, DOI 10.1007/978-981-15-2414-1_57
  • [4] Energy Efficient Virtual Machines Placement Over Cloud-Fog Network Architecture
    Alharbi, Hatem A.
    Elgorashi, Taisir E. H.
    Elmirghani, Jaafar M. H.
    [J]. IEEE ACCESS, 2020, 8 (08): : 94697 - 94718
  • [5] Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.167, 10.1109/ICMLA.2016.0040]
  • [6] A Novel Coding Scheme to Implement Signature based IDS in IP based Sensor Networks
    Amin, Syed Obaid
    Siddiqui, Muhammad Shoaib
    Hong, Choong Seon
    Choe, Jongwon
    [J]. 2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT - WORKSHOPS, 2009, : 269 - +
  • [7] Amiri M., 2010, Ph.D. Thesis
  • [8] Anita SC, 2015, 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), P190, DOI 10.1109/ICGCIoT.2015.7380455
  • [9] [Anonymous], 2005, P 1 ACM INT WORKSH Q
  • [10] [Anonymous], 2007, P 4 WORKSH EMB NETW