ログイン
Language:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 02 情報科学
  2. 01 学術雑誌論文

Efficient IDS for IoT Networks Using Host-Based Data Aggregation and Multi-Entropy Analysis

http://hdl.handle.net/10061/0002001249
http://hdl.handle.net/10061/0002001249
19f7603a-c181-4586-bad2-96cef7def8ea
アイテムタイプ 学術雑誌論文 / Journal Article(1)
公開日 2025-10-23
タイトル
タイトル Efficient IDS for IoT Networks Using Host-Based Data Aggregation and Multi-Entropy Analysis
言語
言語 eng
キーワード
主題Scheme Other
主題 IoT
キーワード
主題Scheme Other
主題 machine learning
キーワード
主題Scheme Other
主題 network security
キーワード
主題Scheme Other
主題 malware
資源タイプ
資源タイプ journal article
アクセス権
アクセス権 open access
著者 Katsura, Yusei

× Katsura, Yusei

en Katsura, Yusei

Search repository
遠藤, 新

× 遠藤, 新

ja 遠藤, 新

ja-Kana エンドウ, アラタ

en Endo, Arata

Search repository
新井, イスマイル

× 新井, イスマイル

ja 新井, イスマイル

ja-Kana アライ, イスマイル

en Arai, Ismail

Search repository
藤川, 和利

× 藤川, 和利

ja 藤川, 和利

ja-Kana フジカワ, カズトシ

en Fujikawa, Kazutoshi

Search repository
抄録
内容記述タイプ Abstract
内容記述 T IoT devices have limited computational resources, posing challenges to implementing adequate security measures. As a result, numerous attacks targeting vulnerabilities in IoT devices have been observed. Against this backdrop, research on Intrusion Detection Systems (IDSs) leveraging machine learning in IoT environments has been actively conducted. However, packet-based and flow-based IDSs proposed in existing studies are vulnerable to attacks such as DoS and DDoS, which involve numerous packet or flow combination patterns. These methods also face challenges related to computational resource burdens caused by the increased volume of input data. This study proposes a lightweight IDS with the hostbased approach, representing communication behaviors with multiple entropies. The host-based approach aggregates features from different communications sent by the same host, enabling a reduction in input data. Additionally, the method captures host-level communication behaviors by leveraging multiple entropies, focusing on characteristic patterns of IoT devices, such as periodic communication with specific servers during normal operation. This enables the reduction of computational resources during detection processing while maintaining detection accuracy, even when using fewer features and lightweight machine learning algorithms. The evaluation results demonstrate that the proposed method achieves a maximum reduction of 99.7% (2916 milliseconds) in processing time and 86.4% (633 MiB) in memory usage while maintaining an intrusion detection accuracy of 99.97%, proving its feasibility in constrained environments comparable to IoT gateways.
書誌情報 en : IEEE Access

巻 13, p. 12546-125419, ページ数 14, 発行日 2025-07-14
出版者
出版者 IEEE
ISSN
収録物識別子タイプ EISSN
収録物識別子 2169-3536
出版者版DOI
関連タイプ isReplacedBy
識別子タイプ DOI
関連識別子 https://doi.org/10.1109/ACCESS.2025.3589057
出版者版URI
関連タイプ isReplacedBy
識別子タイプ URI
関連識別子 https://ieeexplore.ieee.org/document/11080017
権利
権利情報Resource https://creativecommons.org/licenses/by/4.0/
権利情報 ©2025 The Authors. This work is licensed under a Creative Commons Attribution 4.0 License.
著者版フラグ
出版タイプ NA
戻る
0
views
See details
Views

Versions

Ver.1 2025-10-23 01:31:11.227730
Show All versions

Share

Share
tweet

Cite as

Other

print

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX
  • ZIP

コミュニティ

確認

確認

確認


Powered by WEKO3


Powered by WEKO3