Dewids: Dew Computing for Intrusion Detection System in Edge of Things

dc.authorscopusid58836291600
dc.authorscopusid58794166000
dc.authorscopusid59179893400
dc.authorscopusid16177578800
dc.authorscopusid57202686649
dc.contributor.authorDas,S.
dc.contributor.authorNaskar,A.
dc.contributor.authorMajumder,R.
dc.contributor.authorDe,D.
dc.contributor.authorAhmadpour,S.-S.
dc.date.accessioned2024-06-23T21:39:30Z
dc.date.available2024-06-23T21:39:30Z
dc.date.issued2024
dc.departmentKadir Has Universityen_US
dc.department-tempDas S., Department of Computer Science and Engineering, Jadavpur University, 188, Raja Subodh Chandra Mallick Rd, Jadavpur, West Bengal, Kolkata, 700032, India; Naskar A., Department of Computer Science and Engineering, Maulana Abul Kalam Azad University of Technology, Nadia, West Bengal, Haringhata, 741249, India, Advanced Cybersecurity Architect, Honeywell International (Orion Campus), Karnataka, Bangalore, India; Majumder R., Department of Computer Science and Engineering, Maulana Abul Kalam Azad University of Technology, Nadia, West Bengal, Haringhata, 741249, India, Advanced Cybersecurity Architect, Honeywell International (Orion Campus), Karnataka, Bangalore, India; De D., Department of Computer Science and Engineering, Maulana Abul Kalam Azad University of Technology, Nadia, West Bengal, Haringhata, 741249, India, Advanced Cybersecurity Architect, Honeywell International (Orion Campus), Karnataka, Bangalore, India; Ahmadpour S.-S., Department of Computer Engineering, Kadir Has University, Istanbul, Turkeyen_US
dc.description.abstractEdge of Things (EoT) is a network of edge devices in which sensors, networks, electronics, and software are included. EoT enables uninterrupted data transfer from the cloud layer to edge devices through the Internet. In this transmission, there need strong privacy and security concerns. Although day by day throughout the universe the number of devices is increasing with new features, shapes, sizes, usage, protocol, etc., the conventional method of security and privacy systems are not sufficient to control the ubiquitous EoT. The conventional IDS system does not work on unstable Internet so to overcome this issue we will use Dew computing in the IDS system. With the assistance of the dew server, an individual has more control and adaptability to access data in the absence of an unstable Internet connection. IDS is used to detect different kinds of attacks in the edge layer. But sometimes it fails to detect the false alarm, which may create a severe problem. Various types of network attacks like Malware, MITM, Remote Code Execution, etc. in different networks are detected by Intrusion Detection System (IDS) and prevented by Intrusion Prevention System (IPS). At the time of the detection procedure, several alarms are generated, which decreases the effectiveness of IDS. Using an alarm filter can be a better solution to overcome this type of problem. An intelligent alarm filtration mechanism can be designed by a selective machine-learning-based classifier in DewIDS then DewIPS can block the attempted intrusion or remediate the incident after SOC investigation. This work aims to present a comprehensive survey of existing Dew Computing for Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) in Edge of Things. © 2023 The Author(s),. All rights reserved.en_US
dc.identifier.citation1
dc.identifier.doi10.1007/978-981-99-4590-0_7
dc.identifier.endpage148en_US
dc.identifier.issn2199-1073
dc.identifier.scopus2-s2.0-85181520613
dc.identifier.scopusqualityQ1
dc.identifier.startpage133en_US
dc.identifier.urihttps://doi.org/10.1007/978-981-99-4590-0_7
dc.identifier.urihttps://hdl.handle.net/20.500.12469/5890
dc.identifier.volume2024en_US
dc.language.isoenen_US
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.relation.ispartofInternet of Thingsen_US
dc.relation.publicationcategoryKitap Bölümü - Uluslararasıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAlarm filteren_US
dc.subjectDew computingen_US
dc.subjectEdge-of-thingsen_US
dc.subjectInternet of medical thingsen_US
dc.subjectIntrusion detection systemen_US
dc.subjectIntrusion prevention systemen_US
dc.subjectMachine learningen_US
dc.titleDewids: Dew Computing for Intrusion Detection System in Edge of Thingsen_US
dc.typeBook Parten_US
dspace.entity.typePublication

Files