Signature-Based Intrusion Detection System in Wireless 6G IoT Networks

  • Farooq M
  • Hassan Khan M
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

An “Intrusion Detection System” (IDS) is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network. Signature-based IDSs employ an attack signature database to identify intrusions. This indicates that the system can only identify known attacks and cannot identify brand-new or unidentified assaults. In Wireless 6G IoT networks, signature-based IDSs can be useful to detect a wide range of known attacks such as viruses, worms, and Trojans. However, these networks have specific requirements and constraints, such as the need for real-time detection and low-power operation. To meet these requirements, the IDS algorithm should be designed to be efficient in terms of resource usage and should include a mechanism for updating the attack signatures to keep up with evolving threats. This paper provides a solution for a signature-based intrusion detection system in wireless 6G IoT Networks, in which three different algorithms were used and implemented by using python and JavaScript programming languages and an accuracy of 98.9% is achieved.

Cite

CITATION STYLE

APA

Farooq, M., & Hassan Khan, M. (2022). Signature-Based Intrusion Detection System in Wireless 6G IoT Networks. Journal on Internet of Things, 4(3), 155–168. https://doi.org/10.32604/jiot.2022.039271

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free