Browse > Article
http://dx.doi.org/10.7236/JIIBC.2018.18.5.9

Design of an Intrusion Detection and Self-treatment System for IoT  

Oh, Sun-Jin (Dept. of Computer & Information Science, Semyung University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.18, no.5, 2018 , pp. 9-15 More about this Journal
Abstract
With the advent of the 5G communication era recently, advancement of the convergence technologies related to IoT has been progressed rapidly. IoT convergence technologies using various sensors are actively applied many fields in our lives, and it contributes to the popularization of these convergence technologies among many people successfully. The security problem of the IoT which connects many things on the network is critically vulnerable and is one of the most important challenge to be solved urgently. In this paper, we design an intrusion detection and self-treatment system for IoT, which can detect external attacks and anomalies in order to solve the security problems in IoT, perform self-treatment by operating the vaccine program according to the intrusion type whenever it detects certain intrusion. Furthermore, we consider the broadcasting of intrusion alarm message according to the frequency of similar circumstances in order to block intrusion contagious in IoT.
Keywords
Intrusion Detection; IoT; Self-treatment;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 H. Y. Kim, Internet of Things: Concept, Implementation Technology, and Business, Hongrung Science Pub. Co., pp. 314, 2014.
2 D. Lake, A. Rayes, M. Morrow, "The Internet of Things", The Internet Protocol Journal, vol. 15, no. 3, September 2012.
3 I. Jeon, S. Kang, H. Yang, "Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System," Journal of the Korea Academia-Industrial cooperation Society (JKAIS), Vol. 11, No. 1, pp. 81-86, 2010.
4 I. H. Bae, C. H. Kim, H. T. Noh, "Design and Evaluation of a Fuzzy Logic based Multi-hop Broadcast Algorithm for IoT Application", Journal of Internet Computing and Services, vol. 17, no. 6, pp. 17-23, 2016. doi: 10.7472/jksii.2016.17.6.17.   DOI
5 I. H. Bae, "Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Application", Journal of Internet Computing and Services, vol. 19, no. 1, pp. 37-47, 2018. doi: 10.7472/jksii.2018.19.1.37.   DOI
6 C. W. Lee, IoT Vaccine, Hanbit Media Inc., pp. 300, 2017.
7 M. C. Chae, H. Lim, N. H. Kang, "Design of Multi-level Abnormal Detection System Suitable for Time-Series Data", Journal of the Institute of Internet, Broadcasting and Communication(IIBC) vol. 16, no. 6, pp. 1-7, 2016. doi: 10.7236/jiibc.2016.16.6.1.   DOI
8 Y. B. Kwon, I. S. Kim, "A Study on Anomaly Signal Detection and Management Model using Big Data", Journal of the Institute of Internet, Broadcasting and Communication(IIBC) vol. 16, no. 6, pp. 287-294, 2016. doi: 10.7236/jiibc.2016.16.6.287.   DOI
9 S. I. Lee, S. C. Lee, J. R. Lee, H. Y. Youm, "Extraction of Network Threat Signatures using Latent Dirichlet Allocation", Journal of Internet Computing and Services(JICS), vol. 19, no. 1, pp. 1-10, 2018. doi: 10.7472/jksii.2018.19.1.1.   DOI
10 S. J. Oh, "Design and Evaluation of a Weighted Intrusion Detection Method for VANETs", The Journal of the Institute of Internet and Broadcasting and Communication (IIBC), vol. 11, no. 3, pp. 181-188, June 2011.
11 K. Y. Kwack, Social Network Analysis, 2ed. Chungram Pub., pp. 690, 2017.
12 M. Akihiro, Google Analytics Access Kaiseki Kanzen Guide, Socym Co., pp. 239, 2014.