An Intense Systematic Review of Mobile Agent Based Harmful Threats And Attack Detection Systems in IOT Networks

2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)(2023)

引用 0|浏览2
暂无评分
摘要
A breach is detected by an intrusion detection system (IDS) by analysing events that are deemed risky from a security standpoint in systems and networks. Due to a surge in occurrences involving network security, organisations must implement IDS for the protection of sensitive data. Both intrusions coming from outside a network and those coming from within a distributed network are challenging to identify. IDS should be in charge of processing a sizable volume of data without overwhelming networks and monitoring systems. Due to the flaws and restrictions in centralised IDS, mobile agents (MA) were developed. By identifying harmful activity, these agents can carry out specified actions. From earlier works of literature, it was deduced that most of the existing IDS based on MA are not significantly effective
更多
查看译文
关键词
Internet of things,networks,Intrusion Detection,Distributed Correlation Scripts
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要