دورية أكاديمية

Análisis comparativo de variables utilizadas en redes distribuidas zigbee para detección de intrusiones desde dispositivos finales en una red de vehículos autónomos no tripulados.

التفاصيل البيبلوغرافية
العنوان: Análisis comparativo de variables utilizadas en redes distribuidas zigbee para detección de intrusiones desde dispositivos finales en una red de vehículos autónomos no tripulados. (Spanish)
Alternate Title: Comparative analysis of variables used in zigbee distributed networks for intrusion detection on end devices in an unmanned autonomous vehicles network. (English)
المؤلفون: Pola-Jiménez, Eddy-Alberto, López-Sánchez, Máximo, González-Serna, Juan-Gabriel, González-Franco, Nimrod, Mújica-Vargas, Dante, Santamaria-Bonfil, Guillermo
المصدر: DYNA - Ingeniería e Industria; nov2022, Vol. 97 Issue 6, p606-612, 7p
مصطلحات موضوعية: DENIAL of service attacks, MACHINE learning, CYBERTERRORISM, IDENTITY theft, TECHNOLOGICAL innovations, INTRUSION detection systems (Computer security)
مستخلص: Cyber attacks have become more common and sophisticated in the new age of technology. Intrusion detection systems were designed to detect attacks while they are being carried out and many applications have been deployed in IoT, showing great effectiveness to identify anomalies. However, almost all of them are built under a conventional scheme where network traffic is generated by services based on a client-server architecture. Pure Zigbee networks are distinguished by the connection between end devices and do not generate this kind of network traffic because Zigbee protocol stack is limited. Because of this, many of the variables presented in related works to train machine learning algorithms are not present in such a network. This would generate effects such as data theft, identity theft, permanent loss of information and even manipulation of devices, something significantly serious in the area of unmanned vehicles. The purpose of this article is to expose variables obtained from pure Zigbee in a distributed environment can be used to identify intrusions in a simulated test case such as the connection between unmanned vehicles. In this way, a new identification approach is introduced, within end devices are focused instead network traffic only to identify anomalies. It is intended to demonstrate that CPU and RAM variables analysis directly from end devices allow an effective identification in packet storm denial of service attacks and that they would be a considerable option to avoid end effects. [ABSTRACT FROM AUTHOR]
Copyright of DYNA - Ingeniería e Industria is the property of Publicaciones Dyna SL and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Supplemental Index
الوصف
تدمد:00127361
DOI:10.6036/10620