دانلود رایگان مقاله انگلیسی تشخیص نفوذ در محیط ابری اینترنت اشیا - IEEE 2017

عنوان فارسی
تشخیص نفوذ در محیط ابری اینترنت اشیا
عنوان انگلیسی
Intrusion detection in Cloud Internet of Things Environment
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
6
سال انتشار
2017
نشریه
آی تریپل ای - IEEE
فرمت مقاله انگلیسی
PDF
کد محصول
E6157
رشته های مرتبط با این مقاله
مهندسی فناوری اطلاعات، مهندسی کامپیوتر
گرایش های مرتبط با این مقاله
اینترنت و شبکه های گسترده، رایانش ابری
مجله
کنفرانس بین المللی ریاضیات و فناوری اطلاعات - International Conference on Mathematics and Information Technology
دانشگاه
University of Mustapha Stambouli - Mascara - ALGERIA LRSBG Laboratory - TVIM Group
کلمات کلیدی
اینترنت اشیا، IoT ابری، سیستم تشخیص نفوذ، مشخصات زمانی، مشخصات فضایی
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

Abstract


The insufficient amount of storage, the slow speed of data and request manipulation and the guarantee of the whole system’s security. In order to resolve such challenges, the only solution was to integrate the Cloud to the Internet of Things; this gave us the opportunity to achieve an Internet of Things project but not to maintain the security of the whole IoT environment. In this paper, we tackle the problem of the intrusion in this environment. We propose, IoTSecurity, an intrusion detection system based on Signature-based approach. IoTSecurity calculate Temporary and spatial profile of each client based on the data of its request. Temporary and spatial profile are studied and tested to evaluate the proposed model.

نتیجه گیری

V. CONCLUSION AND PERSPECTIVES


Due to the high evolvement of the number of devices connected to the Internet, and the high growing of the Internet Technology itself, we have to develop the whole Internet to another level. On the basis of this idea, the Internet of Things was created: where every object connects and without any human interference while keeping and saving the aspect of ubiquity. We have proposed, IoTSecurity, an intrusion detection system able to detect intrusions based on user profile. We exploited temporal and spatial profile. In the coming work, we intend to study the composition of a set of user profiles and the efficiency of this composition to better detect the intrusion in the CloudIoT environment.


بدون دیدگاه