تشخیص نفوذ در محیط ابری اینترنت اشیا / Intrusion detection in Cloud Internet of Things Environment

تشخیص نفوذ در محیط ابری اینترنت اشیا Intrusion detection in Cloud Internet of Things Environment

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • ناشر : IEEE
  • چاپ و سال / کشور: 2018

توضیحات

رشته های مرتبط مهندسی فناوری اطلاعات، مهندسی کامپیوتر
گرایش های مرتبط اینترنت و شبکه های گسترده، رایانش ابری
مجله کنفرانس بین المللی ریاضیات و فناوری اطلاعات – International Conference on Mathematics and Information Technology
دانشگاه University of Mustapha Stambouli – ALGERIA LRSBG Laboratory – TVIM Group

منتشر شده در نشریه IEEE
کلمات کلیدی انگلیسی Internet of Things, CloudIoT, Intrusion Detection System, Temporal Profile, Spatial profile

Description

I. INTRODUCTION The Internet of Things is going to be the next evolution in the era of Internet Technology, where the main concept about this new paradigm is to allow connectivity anywhere and at anytime by allowing objects to abstract information and share it without human interfering [1]. By using the RFID (Radio Frequency Identification) [1], we can make objects actually connect with each other and share information in order to make life a better place. The main problems with the Internet of Things project are the objects themselves: for example, the lack of storage space for each individual object while we have billions of objects, and the processing performance of each object, the maintaining of a durable communication between the objects, the security as well as the confidentiality of them and also the information collected by each one. Therefore, CloudIoT is a fusion between two different aspects: Cloud Computing and the Internet of Things [2]. Cloud provides the unlimited capacity of storage and the highest possible speed and performance of execution. It also provides the durably required communication. The only problem is how to guarantee the security and the confidentiality of both the information and the whole Internet of Things system. We are, therefore, led to a different aspect consisting in the IDS (Intrusion Detection System) [3]: which is probably the most convincing solution to maintain such complicated system secured. So, an IDS must be installed inside the CloudIoT to keep full control on the information from one side and the requests/responses transaction between the CloudIoT and the clients from the other side. IDS can control the circulation of information which means it may influence the confidentiality of clients. This explains why only few IDS were made for a CloudIoT project. As a solution to such problem, we propose an IDS that can detect intrusion based on the Requests details, and User’s profile using the data provided by the execution of requested on the CloudIoT servers without checking the information circulating in the system, but by checking the user’s profile, it detects intrusion by a suspected behavior of each client.
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری