Intrusion Detection in the Era of loT: Building Trust via Traffic Filtering and Sampling

被引:53
作者
Meng, Weizhi [1 ]
机构
[1] Tech Univ Denmark, Lyngby, Denmark
关键词
Cybertrust in the IoT Age; Internet of Things; Internet/Web technologies; IoT; IoT devices; IoT security; security; smart devices; smart objects; traffic filtering; traffic sampling;
D O I
10.1109/MC.2018.3011034
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet of Things (loT) era, the number of connected devices and subnets of devices is rapidly increasing. Yet, it remains a challenge for intrusion detection mechanisms to build a trust map among various loT devices because of the devices' large quantity and dynamic nature. Through a case study, the author highlights the importance of traffic filtration and sampling in evaluating trustworthiness among loT devices.
引用
收藏
页码:36 / 43
页数:8
相关论文
共 15 条
[1]   Improving network anomaly detection via selective flow-based sampling [J].
Androulidakis, G. ;
Papavassiliou, S. .
IET COMMUNICATIONS, 2008, 2 (03) :399-409
[2]  
[Anonymous], 2013, PROC INT C NETW SYST
[3]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[4]   Event-based trust framework model in wireless sensor networks [J].
Chen, Haiguang ;
Wu, Huafeng ;
Hu, Jinchu ;
Gao, Chuanshan .
PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, :359-+
[5]  
CLAFFY KC, 1993, P ACM SIGCOMM, P13
[6]  
Junqi Zhang, 2010, Proceedings 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010), P484, DOI 10.1109/EUC.2010.80
[7]   Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data [J].
Meng, Weizhi ;
Li, Wenjuan ;
Su, Chunhua ;
Zhou, Jianying ;
Lu, Rongxing .
IEEE ACCESS, 2018, 6 :7234-7243
[8]   Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection [J].
Meng, Yuxin ;
Kwok, Lam-For .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 39 :83-92
[9]  
Papadogiannakis A., 2010, P EUROSEC
[10]   Dendron: Genetic trees driven rule induction for network intrusion detection systems [J].
Papamartzivanos, Dimitrios ;
Gomez Marmol, Felix ;
Kambourakis, Georgios .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 :558-574