{"title":"混合物联网入侵检测的机器学习和数据挖掘方法","authors":"A. E. Ghazi, Ait Moulay Rachid","doi":"10.1109/CloudTech49835.2020.9365895","DOIUrl":null,"url":null,"abstract":"By 2025 Internet of things will reach over 75 billion devices which would exceed number of humans about 8.1 billion. These devices need to be secured from many threats by implementing secure and interoperable solutions in order to guarantee a proper functioning of the infrastructures and systems using the IoT. This is why we proposed a hybrid intrusion detection system installed on the cloud powering another online and real time intrusion detection system on the fog to monitor the communication and detect attacks before it spreads over the network as in the case of Mirai botnet. We will provide details of the different algorithms used to implement this distributed system so as to detect attacks against IoT devices.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Machine learning and datamining methods for hybrid IoT intrusion detection\",\"authors\":\"A. E. Ghazi, Ait Moulay Rachid\",\"doi\":\"10.1109/CloudTech49835.2020.9365895\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"By 2025 Internet of things will reach over 75 billion devices which would exceed number of humans about 8.1 billion. These devices need to be secured from many threats by implementing secure and interoperable solutions in order to guarantee a proper functioning of the infrastructures and systems using the IoT. This is why we proposed a hybrid intrusion detection system installed on the cloud powering another online and real time intrusion detection system on the fog to monitor the communication and detect attacks before it spreads over the network as in the case of Mirai botnet. We will provide details of the different algorithms used to implement this distributed system so as to detect attacks against IoT devices.\",\"PeriodicalId\":272860,\"journal\":{\"name\":\"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CloudTech49835.2020.9365895\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CloudTech49835.2020.9365895","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Machine learning and datamining methods for hybrid IoT intrusion detection
By 2025 Internet of things will reach over 75 billion devices which would exceed number of humans about 8.1 billion. These devices need to be secured from many threats by implementing secure and interoperable solutions in order to guarantee a proper functioning of the infrastructures and systems using the IoT. This is why we proposed a hybrid intrusion detection system installed on the cloud powering another online and real time intrusion detection system on the fog to monitor the communication and detect attacks before it spreads over the network as in the case of Mirai botnet. We will provide details of the different algorithms used to implement this distributed system so as to detect attacks against IoT devices.