检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:商钰玲 李鹏[1,2] 朱枫[1] 王汝传 SHANG Yuling;LI Peng;ZHU Feng;WANG Ruchuan(College of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China;Institute of Network Security and Trusted Computing,Nanjing University of Posts and Telecommunications,Nanjing 210023,China)
机构地区:[1]南京邮电大学计算机学院,南京210023 [2]南京邮电大学网络安全与可信计算研究所,南京210023
出 处:《计算机科学》2024年第3期3-13,共11页Computer Science
基 金:国家自然科学基金(62102196);江苏省六大人才高峰高层次人才项目(RJFW-111)。
摘 要:物联网越来越多地出现在日常活动中,将我们周围多样化的物理设备连接到互联网,奠定了智慧城市、电子健康、精准农业等应用的基础。随着物联网应用的迅速普及,针对这类设备和服务的网络攻击数量也有所增加,且这些攻击具有不精确性和不确定性,使得对其进行正确检测和识别更加困难。为了应对上述挑战,学者们引入了基于模糊逻辑的攻击检测框架,在各种操作步骤中结合不同的模糊技术,以便在数据不准确和不确定时更精确地检测网络攻击。文中首先对物联网的安全性进行了详细的探讨,如其应对的安全挑战、所需的安全要求、面临的攻击类型等;其次对入侵检测系统(Intrusion Detection Systems,IDS)进行了描述,进而简述了物联网中IDS的基础框架;然后阐述了模糊逻辑的技术原理,分析了将其应用在流量攻击检测中的合理性;接着比较了各种基于不同技术的流量攻击检测方案,以说明它们在该领域的性能和重要性;最后总结了本文的主要工作,指出了未来的研究方向,为该领域的研究者提供了新的视角,以更好地应对不断升级的网络攻击。The Internet of things(IoT)is progressively permeating our daily activities,interconnecting an array of diverse physical devices to the Internet.This foundational connectivity underpins applications spanning smart cities,e-health,precision agriculture,and beyond.The swift proliferation of IoT applications,however,has been paralleled by an upsurge in the frequency of network attacks targeting these devices and services.The complex and dynamic nature of these attacks,coupled with their imprecision and uncertainty,has significantly compounded the intricacies of accurate detection and identification.In response to these exigencies,a novel approach has emerged in the form of fuzzy logic-based attack detection frameworks.These frameworks strategically integrate varied fuzzy techniques throughout diverse operational phases to facilitate heightened precision in the detection of network attacks,particularly in instances characterized by data inaccuracy and uncertainty.Within the expanse of this comprehensive survey paper,a meticulous exposition unfolds.It commences by delving deeply into the realm of IoT security,dissecting its multifaceted dimensions,such as the security challenges it responds to,the required security requirements,and the types of attacks it faces.Subsequently,it offers a detailed portrayal of intrusion detection systems(IDS)and further encapsulates the foundational framework of IDS within the IoT domain.The foundational tenets of fuzzy logic are subsequently expounded upon,followed by a discerning analysis of the rational underpinning the integration of fuzzy logic in traffic attack detection.In subsequent sections,a discerning comparative analysis of diverse traffic attack detection schemes,grounded in disparate technological methodologies,is meticulously presented.This analytical elucidation underscores their respective performance metrics and,by extension,their pivotal significance within this burgeoning sphere.Finally,the synthesis of the principal contributions encapsulated within this paper is met
分 类 号:TP311[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222