Journal article 54 views 18 downloads
Intrusion detection and prevention system for an IoT environment
Digital Communications and Networks, Volume: 8, Issue: 4, Pages: 540 - 551
Swansea University Author: Cheng Cheng
-
PDF | Version of Record
© 2022 Chongqing University of Posts and Telecommunications. This is an open access article under the CC BY-NC-ND license.
Download (4.55MB)
DOI (Published version): 10.1016/j.dcan.2022.05.027
Abstract
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intru...
Published in: | Digital Communications and Networks |
---|---|
ISSN: | 2352-8648 |
Published: |
Elsevier BV
2022
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa67672 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2024-10-24T14:27:12Z |
---|---|
last_indexed |
2024-10-24T14:27:12Z |
id |
cronfa67672 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0" encoding="utf-8"?><rfc1807 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><bib-version>v2</bib-version><id>67672</id><entry>2024-09-12</entry><title>Intrusion detection and prevention system for an IoT environment</title><swanseaauthors><author><sid>11ddf61c123b99e59b00fa1479367582</sid><ORCID>0000-0003-0371-9646</ORCID><firstname>Cheng</firstname><surname>Cheng</surname><name>Cheng Cheng</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2024-09-12</date><deptcode>MACS</deptcode><abstract>Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol.</abstract><type>Journal Article</type><journal>Digital Communications and Networks</journal><volume>8</volume><journalNumber>4</journalNumber><paginationStart>540</paginationStart><paginationEnd>551</paginationEnd><publisher>Elsevier BV</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>2352-8648</issnPrint><issnElectronic/><keywords>IDS and IPS; Cloud; Firewall; Denial of service; Smart environment; Internet of things; NBIPS</keywords><publishedDay>1</publishedDay><publishedMonth>8</publishedMonth><publishedYear>2022</publishedYear><publishedDate>2022-08-01</publishedDate><doi>10.1016/j.dcan.2022.05.027</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm>Another institution paid the OA fee</apcterm><funders>This research received no specific grant from any funding agency in public, commercial or not-for-profit sectors.</funders><projectreference/><lastEdited>2024-10-24T15:29:36.4819123</lastEdited><Created>2024-09-12T14:50:16.2140940</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Ajay</firstname><surname>Kumar</surname><orcid>0000-0001-6712-6490</orcid><order>1</order></author><author><firstname>K.</firstname><surname>Abhishek</surname><orcid>0000-0001-6825-2392</orcid><order>2</order></author><author><firstname>M.R.</firstname><surname>Ghalib</surname><orcid>0000-0002-2786-3370</orcid><order>3</order></author><author><firstname>A.</firstname><surname>Shankar</surname><orcid>0000-0003-3165-3293</orcid><order>4</order></author><author><firstname>Cheng</firstname><surname>Cheng</surname><orcid>0000-0003-0371-9646</orcid><order>5</order></author></authors><documents><document><filename>67672__32705__df2e7380f41148859dfeb1cc7644b33d.pdf</filename><originalFilename>67672.VoR.pdf</originalFilename><uploaded>2024-10-24T15:27:46.5569217</uploaded><type>Output</type><contentLength>4775211</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>© 2022 Chongqing University of Posts and Telecommunications. This is an open access article under the CC BY-NC-ND license.</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>http://creativecommons.org/licenses/by-nc-nd/4.0/</licence></document></documents><OutputDurs/></rfc1807> |
spelling |
v2 67672 2024-09-12 Intrusion detection and prevention system for an IoT environment 11ddf61c123b99e59b00fa1479367582 0000-0003-0371-9646 Cheng Cheng Cheng Cheng true false 2024-09-12 MACS Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol. Journal Article Digital Communications and Networks 8 4 540 551 Elsevier BV 2352-8648 IDS and IPS; Cloud; Firewall; Denial of service; Smart environment; Internet of things; NBIPS 1 8 2022 2022-08-01 10.1016/j.dcan.2022.05.027 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University Another institution paid the OA fee This research received no specific grant from any funding agency in public, commercial or not-for-profit sectors. 2024-10-24T15:29:36.4819123 2024-09-12T14:50:16.2140940 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Ajay Kumar 0000-0001-6712-6490 1 K. Abhishek 0000-0001-6825-2392 2 M.R. Ghalib 0000-0002-2786-3370 3 A. Shankar 0000-0003-3165-3293 4 Cheng Cheng 0000-0003-0371-9646 5 67672__32705__df2e7380f41148859dfeb1cc7644b33d.pdf 67672.VoR.pdf 2024-10-24T15:27:46.5569217 Output 4775211 application/pdf Version of Record true © 2022 Chongqing University of Posts and Telecommunications. This is an open access article under the CC BY-NC-ND license. true eng http://creativecommons.org/licenses/by-nc-nd/4.0/ |
title |
Intrusion detection and prevention system for an IoT environment |
spellingShingle |
Intrusion detection and prevention system for an IoT environment Cheng Cheng |
title_short |
Intrusion detection and prevention system for an IoT environment |
title_full |
Intrusion detection and prevention system for an IoT environment |
title_fullStr |
Intrusion detection and prevention system for an IoT environment |
title_full_unstemmed |
Intrusion detection and prevention system for an IoT environment |
title_sort |
Intrusion detection and prevention system for an IoT environment |
author_id_str_mv |
11ddf61c123b99e59b00fa1479367582 |
author_id_fullname_str_mv |
11ddf61c123b99e59b00fa1479367582_***_Cheng Cheng |
author |
Cheng Cheng |
author2 |
Ajay Kumar K. Abhishek M.R. Ghalib A. Shankar Cheng Cheng |
format |
Journal article |
container_title |
Digital Communications and Networks |
container_volume |
8 |
container_issue |
4 |
container_start_page |
540 |
publishDate |
2022 |
institution |
Swansea University |
issn |
2352-8648 |
doi_str_mv |
10.1016/j.dcan.2022.05.027 |
publisher |
Elsevier BV |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
document_store_str |
1 |
active_str |
0 |
description |
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol. |
published_date |
2022-08-01T15:29:34Z |
_version_ |
1813805976311037952 |
score |
11.037581 |