Movatterモバイル変換


[0]ホーム

URL:


Vistro et al., 2022 - Google Patents

Comparison on Blockchain-based Intrusion Detection Systems for Internet of Things

Vistro et al., 2022

Document ID
15673790137077740020
Author
Vistro D
Abid M
Ahmad M
Ali M
Hassan J
Younas A
Publication year
Publication venue
2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)

External Links

Snippet

The Internet of Things (IoT) is a cutting-edge concept that unites the Internet with actual physical objects from a variety of industries, such as home automation, manufacturing, human health, and environmental monitoring. Users are now able to use gadgets with …
Continue reading atieeexplore.ieee.org (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/141Denial of service attacks against endpoints in a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications

Similar Documents

PublicationPublication DateTitle
Haji et al.Attack and anomaly detection in iot networks using machine learning techniques: A review
Anthi et al.A supervised intrusion detection system for smart home IoT devices
Wani et al.SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)
Koroniotis et al.A holistic review of cybersecurity and reliability perspectives in smart airports
Alguliyev et al.Cyber-physical systems and their security issues
Mohapatra et al.Handling of man-in-the-middle attack in wsn through intrusion detection system
Meng et al.Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities
Rehman et al.RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures
Prazeres et al.Engineering the application of machine learning in an IDS based on IoT traffic flow
Qaddoori et al.An efficient security model for industrial internet of things (IIoT) system based on machine learning principles
Mahor et al.ML techniques for attack and anomaly detection in internet of things networks
Akhtar et al.Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models.
Jawahar et al.DDoS mitigation using blockchain and machine learning techniques
Alrubaiei et al.Internet of Things in Cyber Security Scope
Sharma et al.Bot-iot: Detection of attacks in iot-cybersecurity for smart transportation
RanjithSecurity challenges prospective measures in the current status of internet of things (IoT)
Hromada et al.Security aspects of the internet of things
Soares et al.Intrusion detection systems in VANET: A review on implementation techniques and datasets
Karankar et al.A comprehensive survey on internet of things security: challenges and solutions
Rahim et al.Improving the security of internet of things (iot) using intrusion detection system (ids)
Vistro et al.Comparison on Blockchain-based Intrusion Detection Systems for Internet of Things
Farooq et al.Cyber Attack Detection Using Machine Learning Techniques in IoT Networks
Hassan et al.A survey on blockchain-based intrusion detection systems for iot
Tiwari et al.IoT based Smart Home Cyber-Attack Detection and Defense
Andhare et al.Detecting cybersecurity attacks in industrial internet of things: A systematic literature review

[8]
ページ先頭

©2009-2025 Movatter.jp