Abstract
IoT (Internet of Things) devices have become increasingly popular over the years, providing users with convenience, automation, and control over various aspects of their lives. However, their growing popularity has also made them a target for cybercriminals who seek to exploit their vulnerabilities. The article also highlights the advantages and limitations of each technique and provides examples of their practical applications. The authors emphasize the importance of considering factors, such as resource constraints, network topology, and attack surface, when deploying intrusion detection systems (IDS) in IoT environments. They also discuss various deployment models, such as centralized, distributed, and hybrid models, and the advantages and limitations of each approach. The authors highlight the importance of using realistic and diverse datasets to validate IDS and provide examples of publicly available datasets that can be used for this purpose. The article also covers the various cyber-attacks that can target IoT systems and the challenges associated with detecting and mitigating these attacks using IDS. The authors discuss the need for IDS to detect both known and unknown attacks and the challenges associated with achieving this goal. Overall, this article provides a comprehensive overview of IDS in the context of IoT, covering techniques, attacks, public datasets, and challenges.
| Original language | English |
|---|---|
| Title of host publication | Quality Assessment and Security in Industrial Internet of Things |
| Publisher | CRC Press |
| Pages | 124-148 |
| Number of pages | 25 |
| ISBN (Electronic) | 9781040147993 |
| ISBN (Print) | 9781032538730 |
| DOIs | |
| State | Published - 1 Jan 2024 |
| Externally published | Yes |
Fingerprint
Dive into the research topics of 'IIoT edge network security: Addressing spectrum scarcity through intrusion detection systems – a critical review'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver