Michael Moorman’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things
  • Conference Paper

August 2016

·

225 Reads

·

149 Citations

·

Michael Moorman

Abstract—The Internet of Things (IoT) is one of the largest technological evolutions of computing; by 2022 it is estimated that a trillion IP addresses (objects) will be connected to the Internet. The obscurity and low accessibility of many of these devices in this vast heterogeneous network will make it difficult to holistically monitor information flow. Nonetheless, to safeguard networks, unauthorized intruders must be detected within the constraints of each type of device or sub-network before any system information can be disseminated. In this paper, a survey of the Intrusion Detection Systems (IDS) using the most recent ideas and methods proposed for the IoT is presented. To understand and illustrate IDS platform differences and the current research trend towards a universal, cross-platform distributed approach, the survey starts with an historical examination of intrusion detection systems. This examination of the foundations of IDS research based on the components that make up the IoT is followed by a look at the current holistic trend and an analysis of these schemes. Finally, guidelines to potential IDS in the IoT are proposed before identifying the open research problems.

Citations (1)


... These styles of attacks can cause momentous damage to IoT services and EC networks. Therefore, the security of EC or IoT becomes more and more important [14]. IDS functions as a security measure predominantly situated within the network stratum of EC systems. ...

Reference:

Real Time Intrusion Detection In Edge Computing Using Machine Learning Techniques
Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things
  • Citing Conference Paper
  • August 2016