دانلود رایگان مقاله انگلیسی طراحی و توسعه سیستم تشخیص نفوذ برای اینترنت اشیا - 2017

عنوان فارسی
طراحی و توسعه سیستم تشخیص نفوذ برای اینترنت اشیا
عنوان انگلیسی
Design and Development of Intrusion Detection System for Internet of Things
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
7
سال انتشار
2017
فرمت مقاله انگلیسی
PDF
رفرنس
دارد
کد محصول
E5906
رشته های مرتبط با این مقاله
مهندسی فناوری اطلاعات، مهندسی کامپیوتر
گرایش های مرتبط با این مقاله
اینترنت و شبکه های گسترده، امنیت اطلاعات
مجله
مجله بین المللی تحقیقات نوآورانه در کامپیوتر و مهندسی ارتباطات - International Journal of Innovative Research in Computer and Communication Engineering
دانشگاه
Electronics and Telecommunication - Sinhgad School of Engineering - Pune - India
کلمات کلیدی
اینترنت اشیا، سیستم تشخیص نفوذ، 6LoWPAN، انکار سرویس حمله
چکیده

ABSTRACT


There are currently more objects connected to the Internet than people in the world. This gap will continue to grow, as more objects gain the ability to directly interface with the Internet. Providing security in IoT is challenging as the devices are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies such as RPL and 6LoWPAN. Due to this it is easy to attack in IoT network. The proposed system is a novel intrusion detection system for the IoT, which is capable of detecting dDOS attack and attacker. The proposed methods use the location information of node and neighbor information to identify the attack and received signal strength to identify attacker nodes. Design of such system will help in securing the IoT network and may prevents such attacks. This method is very energy efficient and only takes fixed number of UDP packets for attack detection; hence it is beneficial for resource constrained environment.

نتیجه گیری

VI.CONCLUSION AND FUTURE WORK


Considering the potential applications of the IoT it is important that 6LoWPAN networks are protected against internal and external intrusions. This work concludes that, the proposed novel light weight IDS system is basically designed for resource constrained sensor nodes and able to detect Denial of Service attacks of two kind packet relay and encapsulation. Mostly centralized modules are used for doing heavy processing and Light weight modules run on sensor nodes causing saving of energy on sensor nodes. Adding location information of nodes made system more efficient for detection of wormhole attack with lesser overhead and with high true positive detection rate. This method takes fixed number of UDP packets for attack detection. The RAM/ROM consumption is also very small as compared to total available sizes. The method give 94% detection rate which is very good for resource constrained environment. In future, we expect to complete the implementation of our proposed architecture and test it against different real attacks. Apart from this, the proposed architecture can be further improved by the following: Distributed Approach; To monitor large networks distributed sniffing, detection mechanisms are required. Security Incident and Event management system (SIEM) once the IDS detect some alerts, this raw information can be accessed by certain alert management software. These tools provide effective statistics and various notifying options to the administrators via email, sms, etc. In future, extending support to SIEMs will be considered. Finally, a centralized monitoring system could be designed such that all network management information from ebbits network manager and IDS alerts could be monitored. After detecting a DoS attack, specific mechanisms can be designed to defend the attack i.e., the intrusion prevention systems (IPS).


بدون دیدگاه