scholarly journals MAHIVE: Modular Analysis Hierarchical Intrusion Detection System Visualization Event Cybersecurity Engine for Cyber-Physical Systems and Internet of Things Devices

Author(s):  
Stuart Steiner ◽  
Ibukun Oyewumi ◽  
Daniel Conte De Leon
Author(s):  
R. Sathya Et al.

Cyber physical systems combine both the physical as well as the computation process. Embedded computers and systems monitor to control the physical forms with feedback loops which have an effect on computations and contrariwise. A vast number of failures and cyber-attacks are present in the cyber physical systems, which leads to a limited growth and accuracy in the intrusion detection system and thus implementing the suitable actions which may be taken to reduce the damage to the system. As Cyber-physical systems square measure but to be made public universally, the applying of the instruction detection mechanism remains open presently. As a result, the inconvenience is made to talk about the way to suitably apply the interruption location component to Cyber physical frameworks amid this paper. By analysing the unmistakable properties of Cyber-physical frameworks, it extraordinary to diagram the exact necessities 1st. At that point, the arranging characterize of the intrusion discovery component in Cyber-physical frameworks is introduced in terms of the layers of framework and particular location procedures. At long last, a few imperative investigation issues unit known for edifying the following considers.


Author(s):  
Ege Ciklabakkal ◽  
Ataberk Donmez ◽  
Mert Erdemir ◽  
Emre Suren ◽  
Mert Kaan Yilmaz ◽  
...  

2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Yulong Fu ◽  
Zheng Yan ◽  
Jin Cao ◽  
Ousmane Koné ◽  
Xuefei Cao

Internet of Things (IoT) transforms network communication to Machine-to-Machine (M2M) basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS) is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 1977 ◽  
Author(s):  
Geethapriya Thamilarasu ◽  
Shiven Chawla

Cyber-attacks on the Internet of Things (IoT) are growing at an alarming rate as devices, applications, and communication networks are becoming increasingly connected and integrated. When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. It is imperative to detect attacks on IoT systems in near real time to provide effective security and defense. In this paper, we develop an intelligent intrusion-detection system tailored to the IoT environment. Specifically, we use a deep-learning algorithm to detect malicious traffic in IoT networks. The detection solution provides security as a service and facilitates interoperability between various network communication protocols used in IoT. We evaluate our proposed detection framework using both real-network traces for providing a proof of concept, and using simulation for providing evidence of its scalability. Our experimental results confirm that the proposed intrusion-detection system can detect real-world intrusions effectively.


Sign in / Sign up

Export Citation Format

Share Document