Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li
{"title":"Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems","authors":"Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li","doi":"10.4018/ijdst.307956","DOIUrl":null,"url":null,"abstract":"Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Distributed Syst. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijdst.307956","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.