Computer Science ›› 2024, Vol. 51 ›› Issue (3): 3-13.doi: 10.11896/jsjkx.230700130
• Information Security Protection in New Computing Mode • Previous Articles Next Articles
SHANG Yuling1, LI Peng1,2, ZHU Feng1, WANG Ruchuan1,2
CLC Number:
[1]BANSAL S,TOMAR V K.Challenges & Security Threats inIoT with Solution Architectures[C]//2022 2nd International Conference on Power Electronics & IoT Applications in Renewa-ble Energy and its Control(PARC).Mathura:IEEE,2022:1-5. [2]HUAN W M,LIN H T.Design of Intrusion detection System based on sampling integration Algorithm [J].Computer Science,2021,48(S2):705-712. [3]BUCZAK A L,GUVEN E.A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection[J].IEEE Communications Surveys & Tutorials,2016,18(2):1153-1176. [4]GU J,LU S.An effective intrusion detection approach usingSVM with naïve Bayes feature embedding[J].Computers & Security,2021,103:102158. [5]GUEZZAZ A,ASIMI A,ASIMI Y,et al.A Lightweight Neural Classifier for Intrusion Detection[J].General Letters in Mathematics,2017,2(2):57-66. [6]JIANG Z T,ZHOU TAN S Z,HAN L Y.Nearest neighbor Intrusion detection algorithm based on perceptual hash matrix [J].Acta Electronica Sinica,2019,47(7):1538-1546. [7]ZHOU J H,PENG F,QIU R F,et al.Intrusion detection based on Fusion random forest and gradient Lift Tree [J].Journal of Software,2021,32(10):3254-3265. [8]ZHANG L,CUI Y,LIU J,et al.Application of Machine Lear-ning in Cyberspace security research [J].Journal of Computers,2018,41(9):1943-1975. [9]MODI C,PATEL D,BORISANIYA B,et al.A survey of intrusion detection techniques in Cloud[J].Journal of Network and Computer Applications,2013,36(1):42-57. [10]WU S X,BANZHAF W.The use of computational intelligence in intrusion detection systems:A review[J].Applied Soft Computing,2010,10(1):1-35. [11]YANG P F,CAI R J,GUO S C,et al.A container-based Intrusion detection method for Cisco IOS-XE system [J].Journal of Computer Science,2012,50(4):298-307. [12]SHANMUGAVADIVU R,NAGARAJAN N.Network intru-sion detection system using fuzzy logic[J].Indian Journal of Computer Science and Engineering(IJCSE),2011,2(1):101-111. [13]ZADEH L A.Fuzzy sets[J].Information and Control,1965,8(3):338-353. [14]SHERAZI H H R,IQBAL R,AHMAD F,et al.DDoS attack detection:A key enabler for sustainable communication in Internet of vehicles[J].Sustainable Computing:Informatics and Systems,2019,23:13-20. [15]DICKERSON J E,DICKERSON J A.Fuzzy network profilingfor intrusion detection[C]//19th International Conference of the North American Fuzzy Information Processing Society-NAFIPS(Cat.No.00TH8500).Atlanta:IEEE,2000:301-306. [16]LI F,ZHAO R,WANG S,et al.Online Intrusion Detection for Internet of Things Systems With Full Bayesian Possibilistic Clustering and Ensembled Fuzzy Classifiers[J].IEEE Transactions on Fuzzy Systems,2022,30(11):4605-4617. [17]PAJILA P J B,JULIE E G,ROBINSON Y H.FBDR-FuzzyBased DDoS Attack Detection and Recovery Mechanism for Wireless Sensor Networks[J].Wireless Personal Communications,2022,122(4):3053-3083. [18]SHAH Y,SENGUPTA S.A survey on Classification of Cyber-attacks on IoT and IIoT devices[C]//2020 11th IEEE Annual Ubiquitous Computing,Electronics & Mobile Communication Conference(UEMCON).New York:IEEE,2020:406-413. [19]SETHI P,SARANGI S R.Internet of Things:Architectures,Protocols,and Applications[J].Journal of Electrical and Computer Engineering,2017,2017:1-25. [20]OMOLARA A E,ALABDULATIF A,ABIODUN O I,et al.The internet of things security:A survey encompassing unexplored areas and new insights[J].Computers & Security,2022,112:102494. [21]ALHIRABI N,RANA O,PERERA C.Security and Privacy Requirements for the Internet of Things[J].ACM Transactions on Internet of Things,2021,2(1):1-37. [22]LIU Q X,JIN Z,CHEN C H,et al.Internet of Things access control security review [J].Computer Research and Development,2022,59(10):2190-2211. [23]MOHAMAD M B,HASSAN W H.Current research on Internet of Things(IoT) security:A survey[J].Computer Networks,2019,148:283-294. [24]AZROUR M,MABROUKI J,FARHAOUI Y,et al.SecurityAnalysis of Nikooghadam et al.'s Authentication Protocol for Cloud-IoT[M].Intelligent Systems in Big Data,Semantic Web and Machine Learning.Cham:Springer International Publi-shing,2021:261-269. [25]MOUDNI H,ER-ROUIDI M,MOUNCIF H,et al.Fuzzy logic based intrusion detection system against black hole attack in mobile ad hoc networks[J].International Journal of Communication Networks and Information Security,2018,10(2):366-373. [26]SCARFONE K,MELL P.Guide to intrusion detection and prevention systems(idps)[J].NIST Special Bublication,2007,800(2007):94. [27]DEBAR H,DACIER M,WESPI A.Towards a taxonomy of intrusion-detection systems[J].Computer Networks(Amsterdam,Netherlands:1999),1999,31(8):805-822. [28]PERUMALLA S,CHATTERJEE S,KUMAR A P S.BlockChain-based access control and intrusion detection system in IoD[C]// 2021 6th International Conference on Communication and Electronics Systems(ICCES).Coimbatre:IEEE,2021:511-518. [29]MITTAL M,SARASWAT L K,IWENDI C,et al.A Neuro-Fuzzy Approach for Intrusion Detection in Energy Efficient Sensor Routing[C]// 2019 4th International Conference on Internet of Things:Smart Innovation and Usages(IoT-SIU).Ghaziabad:IEEE,2019:1-5. [30]SHUBHA R S,MANJAIAH D H.Multi-Layer PerceptronBased Fuzzy Logic Technique for Detection of Attacks in VANETS[C]//2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation(IATMSI).Gwalior:IEEE,2022. [31]HU X,ZHANG Q,YANG X,et al.An Intrusion DetectionMethod Fused Deep Learning and Fuzzy Neural Network for Smart Home[C]//ICIC 2022:Intelligent Computing Theories and Application.Cham:Springer International Publishing,2022:627-637. [32]JANG J S R.ANFIS:adaptive-network-based fuzzy inferencesystem[J].IEEE Transactions on Systems,Man,and Cyberne-tics,1993,23(3):665-685. [33]FARHIN F,SULTANA I,ISLAM N,et al.Attack Detection in Internet of Things using Software Defined Network and Fuzzy Neural Network[C]//2020 Joint 9th International Conference on Informatics,Electronics & Vision(ICIEV) and 2020 4th International Conference on Imaging,Vision & Pattern Recognition(icIVPR).Kitakyushu:IEEE,2020. [34]SEDOVA N A,ARKHIPOVA Z V,LAVROV E A,et al.Smart System for Detecting Unauthorized Entry into a Smart Home[C]//2020 International Conference Quality Management,Transport and Information Security,Information Technologies(IT&QM&IS).Yaroslavl:IEEE,2020:63-67. [35]BESLIN PAJILA P J,GOLDEN JULIE E,HAROLD ROB-INSON Y.ABAP:Anchor Node Based DDoS Attack Detection Using Adaptive Neuro-Fuzzy Inference System[J].Wireless Personal Communications,2023,128(2):875-899. [36]KARTHIGA B,DURAIRAJ D,NAWAZ N,et al.Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches[J].Wireless Communications and Mobile Computing,2022,2022:1-13. [37]BEDOYA J C,LIU C,XIE J.Adaptive Neuro Fuzzy Inference System for Cyber-Intrusion Detection in a Smart Grid[C]//2019 20th International Conference on Intelligent System Application to Power Systems(ISAP).New Delhi:IEEE,2019. [38]ABAZARI A,ZADSAR M,GHAFOURI M,et al.A Data Mi-ning/ANFIS and Adaptive Control for Detection and Mitigation of Attacks on DC MGs[J].IEEE Transactions on Smart Grid,2023,14(3):2406-2422. [39]JAVAHERI D,GORGIN S,LEE J,et al.An improved discrete harris hawk optimization algorithm for efficient workflow sche-duling in multi-fog computing[J].Sustainable Computing:Informatics and Systems,2022,36:100787. [40]ANDRÉ L C,DOUGLAS D L,RODOLFO I M,et al.A Fuzzy Intrusion Detection System for Identifying Cyber-Attacks on IoT Networks[C]//2020 IEEE Latin-American Conference on Communications(LATINCOM).Santo Domingo:IEEE,2020. [41]HAFEEZ I,ANTIKAINEN M,DING A Y,et al.IoT-KEEPER:Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge[J].IEEE Transactions on Network and Service Management,2020,17(1):45-59. [42]KHALAFI Z S,DEHGHANI M,KHALILI A,et al.Intrusion Detection,Measurement Correction,and Attack Localization of PMU Networks[J].IEEE Transactions on Industrial Electro-nics,2022,69(5):4697-4706. [43]FU G H,LI B C,WEI Q J,et al.A Multi-Distance Ensemble and Feature Clustering Based Feature Selection Approach for Network Intrusion Detection[C]//2022 International Symposium on Sensing and Instrumentation in 5G and IoT Era(ISSI).Shanghai:IEEE,2022:160-164. [44]KOU L.Research on security defense Technology of IoT Sen-sing Layer [D].Harbin:Harbin Engineering University,2019. [45]ZENG S,TONG X,SANG N.Study on multi-center fuzzy C-means algorithm based on transitive closure and spectral clustering[J].Applied Soft Computing,2014,16:89-101. [46]SHAN D H,SHI Y C,ZHAO W Z,et al.Segmentation fusion fuzzy clustering algorithm for Cloud data security storage [J].Computer Science,2017,44(5):166-169. [47]HUANG S,GUO Y,YANG N,et al.A weighted fuzzy C-means clustering method with density peak for anomaly detection in IoT-enabled manufacturing process[J].Journal of Intelligent Manufacturing,2021,32(7):1845-1861. [48]WANG Z Y,LI L J,MI Z S,et al.Variable precision fuzzyRough Set attribute reduction based on error cost [J].Computer Science,2022,49(4):161-167. [49]WU Y,NIE L,WANG S,et al.Intelligent Intrusion Detection for Internet of Things Security:A Deep Convolutional Generative Adversarial Network-Enabled Approach[J].IEEE Internet of Things Journal,2023,10(4):3094-3106. [50]LIU X,ZHAO J,LI J,et al.Large-Scale Multiobjective Federated Neuroevolution for Privacy and Security in the Internet of Things[J].IEEE Internet of Things Magazine,2022,5(2):74-77. [51]FANG L,LI Y,LIU Z,et al.A Practical Model Based on Ano-maly Detection for Protecting Medical IoT Control Services Against External Attacks[J].IEEE Transactions on Industrial Informatics,2021,17(6):4260-4269. [52]GORZALCZANY M B,RUDZINSKI F.Intrusion Detection in Internet of Things With MQTT Protocol—An Accurate and Interpretable Genetic-Fuzzy Rule-Based Solution[J].IEEE Internet of Things Journal,2022,9(24):24843-24855. [53]JIANG J,LIU F,NG W W Y,et al.Dynamic Incremental Ensemble Fuzzy Classifier for Data Streams in Green Internet of Things[J].IEEE Transactions on Green Communications and Networking,2022,6(3):1316-1329. [54]LI F Y,LI Y,YANG J.Review of interpolation inference algorithms based on fuzzy rules [J].Journal of Computers,2022,45(8):1687-1711. [55]HOANG T M,TRAN N H,THAI V L,et al.An efficient IDS using FIS to detect DDoS in IoT networks[C]//2022 9th NAFOSTED Conference on Information and Computer Science(NICS).Ho Chi Minh City:IEEE,2022:193-198. [56]AWOTUNDE J B,AYO F E,PANIGRAHI R,et al.A Multi-level Random Forest Model-Based Intrusion Detection Using Fuzzy Inference System for Internet of Things Networks[J].International Journal of Computational Intelligence Systems,2023,16(1):31. [57]MEENALOCHANI M,SUDHA S.Jammed Node Detection and Routing in a Multihop Wireless Sensor Network Using Hybrid Techniques[J].Wireless Personal Communications,2019,104(2):663-675. [58]SAVVA M,IOANNOU I,VASSILIOU V.Fuzzy-Logic Based IDS for Detecting Jamming Attacks in Wireless Mesh IoT Networks[C]//2022 20th Mediterranean Communication and Computer Networking Conference(MedComNet).Pafos:IEEE,2022:54-63. [59]FARZANEH B,KOOSHA M,BOOCHANPOUR E,et al.ANew Method for Intrusion Detection on RPL Routing Protocol Using Fuzzy Logic[C]//2020 6th International Conference on Web Research(ICWR).Tehran:IEEE,2020:245-250. |
[1] | MAO Chenyu, HUANG He, SUN Yu'e, DU Yang. Global Top-K Frequent Flow Measurement for Continuous Periods in Distributed Networks [J]. Computer Science, 2024, 51(4): 28-38. |
[2] | XU Chenhan, HUANG He, SUN Yu'e, DU Yang. Multi-level Pruning Obfs4 Obfuscated Traffic Recognition Method Based on Partial Data [J]. Computer Science, 2024, 51(4): 39-47. |
[3] | YUAN Rong, PENG Lilan, LI Tianrui, LI Chongshou. Traffic Flow Prediction Model Based on Dual Prior-adaptive Graph Neural ODE Network [J]. Computer Science, 2024, 51(4): 151-157. |
[4] | HUANG Kun, SUN Weiwei. Traffic Speed Forecasting Algorithm Based on Missing Data [J]. Computer Science, 2024, 51(3): 72-80. |
[5] | LIANG Chen, HONG Zheng, WU Lifa, JI Qingbing. Cryptographic Protocol Reverse Method Based on Information Entropy and Closed Frequent Sequences [J]. Computer Science, 2024, 51(3): 326-334. |
[6] | WANG Lina, LAI Kunhao, YANG Kang. CARINA:An Efficient Application Layer Protocol Conversion Approach for IoT Interoperability [J]. Computer Science, 2024, 51(2): 278-285. |
[7] | ZHONG Yue, GU Jieming, CAO Honglin. Survey of Lightweight Block Cipher [J]. Computer Science, 2023, 50(9): 3-15. |
[8] | ZHANG Naixin, CHEN Xiaorui, LI An, YANG Leyao, WU Huaming. Edge Offloading Framework for D2D-MEC Networks Based on Deep Reinforcement Learningand Wireless Charging Technology [J]. Computer Science, 2023, 50(8): 233-242. |
[9] | ZHU Boyu, CHEN Xiao, SHA Letian, XIAO Fu. Two-layer IoT Device Classification Recognition Model Based on Traffic and Text Fingerprints [J]. Computer Science, 2023, 50(8): 304-313. |
[10] | LIU Yingjun, LUO Yang, YANG Yujun, LIU Yuanni. Anonymous Authentication Protocol for Medical Internet of Things [J]. Computer Science, 2023, 50(8): 359-364. |
[11] | SHEN Zhehui, WANG Kailai, KONG Xiangjie. Exploring Station Spatio-Temporal Mobility Pattern:A Short and Long-term Traffic Prediction Framework [J]. Computer Science, 2023, 50(7): 98-106. |
[12] | WANG Jiaxing, YANG Sijin, ZHUANG Lei, SONG Yu, YANG Xinyu. Multi-objective Online Hybrid Traffic Scheduling Algorithm in Time-sensitive Networks [J]. Computer Science, 2023, 50(7): 286-292. |
[13] | LIU Jiansong, KANG Yan, LI Hao, WANG Tao, WANG Hailing. Spatial-Temporal Graph-CoordAttention Network for Traffic Forecasting [J]. Computer Science, 2023, 50(6A): 220200042-7. |
[14] | MENG Xiangfu, XU Ruihang. City Traffic Flow Prediction Method Based on Dynamic Spatio-Temporal Neural Network [J]. Computer Science, 2023, 50(6A): 220600266-7. |
[15] | ZHANG Yuxiang, HAN Jiujiang, LIU Jian, XIAN Ming, ZHANG Hongjiang, CHEN Yu, LI Ziyuan. Network Advanced Threat Detection System Based on Event Sequence Correlation Under ATT&CK Framework [J]. Computer Science, 2023, 50(6A): 220600176-7. |
|