INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES
The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens new types of attacks for s...
Uloženo v:
| Vydáno v: | Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Ročník 8; číslo 1; s. 23 - 30 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
30.04.2023
|
| ISSN: | 2527-5399, 2528-2514 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens new types of attacks for systems and networks. This article outlines various techniques for detecting known attacks in ZigBee-based IoT systems. We introduced an Detection System (IDS) specific for ZigBee using data analytics method, that are used to provide an accurate detection method for known attacks. This article looks at our IDS implementation covering a wide variety of detection techniques to detect known attacks ZigBee IoT systems. |
|---|---|
| AbstractList | The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens new types of attacks for systems and networks. This article outlines various techniques for detecting known attacks in ZigBee-based IoT systems. We introduced an Detection System (IDS) specific for ZigBee using data analytics method, that are used to provide an accurate detection method for known attacks. This article looks at our IDS implementation covering a wide variety of detection techniques to detect known attacks ZigBee IoT systems. |
| Author | Wiranda, Nuruddin Sadikin, Fal |
| Author_xml | – sequence: 1 givenname: Fal surname: Sadikin fullname: Sadikin, Fal – sequence: 2 givenname: Nuruddin orcidid: 0000-0001-7830-0431 surname: Wiranda fullname: Wiranda, Nuruddin |
| BookMark | eNotkMtOg0AARSemJtbavcv5Aeq8gSWFKU6CkDDTRd2QYTokmD4MqIl_L21d3ZPcm7s4j2B2Op88AM8YrQjiJHz5-Oq_D8fVT9TjFeb0DswJJ1FAOGazK4cBp3H8AJbj2LeIsZAJiugcKFWaeqtVVcJMGpmaC-mdNvINbqoavqt8LWWwTrTMoKoMnLZlDrPEJDApk2KnlYb1tpD6Cdx39jD65X8ugNlIk74GRZWrNCkCF1EatLb1glOGhPCE2HBvQ966iEWxRdYJ0nmBCEYOORe3iPg98dh1LReW2qnFdAHQ7dYN53EcfNd8Dv3RDr8NRs1VRnOT0VxkNJMM-gdzC1Bx |
| ContentType | Journal Article |
| DBID | AAYXX CITATION |
| DOI | 10.20527/jtiulm.v8i1.153 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 2528-2514 |
| EndPage | 30 |
| ExternalDocumentID | 10_20527_jtiulm_v8i1_153 |
| GroupedDBID | AAYXX CITATION M~E |
| ID | FETCH-LOGICAL-c833-babe6534066e22a7da75bc8489a0ac62fe60210c0cc9b02ed2e1cfb56a3a62f13 |
| ISSN | 2527-5399 |
| IngestDate | Sat Nov 29 05:54:25 EST 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | false |
| Issue | 1 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c833-babe6534066e22a7da75bc8489a0ac62fe60210c0cc9b02ed2e1cfb56a3a62f13 |
| ORCID | 0000-0001-7830-0431 |
| OpenAccessLink | http://jtiulm.ti.ft.ulm.ac.id/index.php/jtiulm/article/download/153/90 |
| PageCount | 8 |
| ParticipantIDs | crossref_primary_10_20527_jtiulm_v8i1_153 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-04-30 |
| PublicationDateYYYYMMDD | 2023-04-30 |
| PublicationDate_xml | – month: 04 year: 2023 text: 2023-04-30 day: 30 |
| PublicationDecade | 2020 |
| PublicationTitle | Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) |
| PublicationYear | 2023 |
| SSID | ssib044746303 |
| Score | 1.8302795 |
| Snippet | The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow... |
| SourceID | crossref |
| SourceType | Index Database |
| StartPage | 23 |
| Title | INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES |
| Volume | 8 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2528-2514 dateEnd: 99991231 omitProxy: false ssIdentifier: ssib044746303 issn: 2527-5399 databaseCode: M~E dateStart: 20160101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWwoELAgGC8pAPXJCVknWc1zFl0xK0XVCThZbLyq-gqO1S7Us98QP41Yydx0aLkOiBS2Q50ST2fPk8tsczCL0BC0S4DP5vEWnlsFJpR7CIOUMupcsE07ENX_xlHE4m0dlZ_Hkw-NWehdlchvN5dHMTX_9XVUMdKNscnb2FujuhUAFlUDpcQe1w_SfFZ5PidGookozSIrU-IiQ_z4v0hMCMj3zLjg_T1DlM8nREsk8FMYk3jskoKRKSTJLxeZ7l5HQ6bqzE1m6tzdZCX9h1-Io0x5iW1da1gy_JmF8JYA_jVPP9Yg3gMgbsxyKbjk96Sw45V1WTBeyIdx4eX6uFWdWw8Fwv1ko1McGbJQnq9XZXLHNRn4aOCXlbDzJtHejJr0-MttQb_YGwhka93oBcS96leurCSwzXr6r15dXBJqqGB0Pf2w5r7Vb-zmjX-SDC7MfKmNUSZkbCDCTcQXdp6MeG5E9-pi03MRaywLOJtrvW1bveVsi7nc_oWTk9c6V4iB408wyc1Ph4hAZ6_hhlHTZwhw1cYwMDNnAfGxiwgS02sMEGbrGBLTaeoOIoLd5_cJpcGo6MPM8RXOjA98B6CzSlPFQ89IWMWBRzl8uAljowk3_pShkLl2pF9VCWwg-4x-Hu0HuK9uY_5voZwl7MaSkV9IgoGZRjKlQcMRUEquSBDJ-jt23TZ9d1xJTZ3_p6_xbPvkD3t1h7ifZWi7V-he7JzapaLl5bZf0GUytcDQ |
| linkProvider | ISSN International Centre |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=INTRUSION+DETECTION+SYSTEM+FOR+ZIGBEE-BASED+IOT+USING+DATA+ANALYSIS+RULES&rft.jtitle=Jurnal+Teknologi+Informasi+Universitas+Lambung+Mangkurat+%28JTIULM%29&rft.au=Sadikin%2C+Fal&rft.au=Wiranda%2C+Nuruddin&rft.date=2023-04-30&rft.issn=2527-5399&rft.eissn=2528-2514&rft.volume=8&rft.issue=1&rft.spage=23&rft.epage=30&rft_id=info:doi/10.20527%2Fjtiulm.v8i1.153&rft.externalDBID=n%2Fa&rft.externalDocID=10_20527_jtiulm_v8i1_153 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2527-5399&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2527-5399&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2527-5399&client=summon |