An “Intrusion Detection System” (IDS) is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network. Signature-based IDSs employ an attack signature database to identify intrusions. This indicates that the system can only identify known attacks and cannot identify brand-new or unidentified assaults. In Wireless 6G IoT networks, signature-based IDSs can be useful to detect a wide range of known attacks such as viruses, worms, and Trojans. However, these networks have specific requirements and constraints, such as the need for real-time detection and low-power operation. To meet these requirements, the IDS algorithm should be designed to be efficient in terms of resource usage and should include a mechanism for updating the attack signatures to keep up with evolving threats. This paper provides a solution for a signature-based intrusion detection system in wireless 6G IoT Networks, in which three different algorithms were used and implemented by using python and JavaScript programming languages and an accuracy of 98.9% is achieved.
CITATION STYLE
Farooq, M., & Hassan Khan, M. (2022). Signature-Based Intrusion Detection System in Wireless 6G IoT Networks. Journal on Internet of Things, 4(3), 155–168. https://doi.org/10.32604/jiot.2022.039271
Mendeley helps you to discover research relevant for your work.