Efficient Memory Optimization for IoT Intrusion Detection
By Ethan Evelyn
()
About this ebook
The advent of the Internet of Things (IoT) has brought significant benefits to various industries, but at the same time, it has also led to an increase in cyber threats. Therefore, Intrusion Detection Systems (IDS) play a crucial role in ensuring the security of IoT devices. One of the challenges faced by IDS is the limited memory available in IoT devices. This makes it necessary to optimize memory usage for efficient intrusion detection.
In this context, P. Suresh's research on "Efficient Memory Optimization for IoT Intrusion Detection" is an essential contribution to IoT security. The study focuses on improving the performance of IDS by optimizing memory usage. The research proposes innovative techniques for efficient memory allocation, management, and access in IoT devices.
The proposed solution employs machine learning, deep learning, and artificial intelligence techniques, along with big data analytics and data mining, for anomaly detection, pattern recognition, and threat detection. The IDS also includes real-time monitoring, data processing, and data storage, retrieval, and analysis capabilities.
The research evaluates the performance of the proposed IDS by conducting experimental studies and benchmarking against existing systems. The results show that the proposed solution achieves better intrusion detection rates with reduced memory usage, improved system scalability, and enhanced energy efficiency.
The study's findings provide valuable insights into memory optimization techniques for IoT intrusion detection, highlighting the need for efficient resource utilization and system performance. The research also emphasizes the significance of system design, architecture, integration, and testing in ensuring reliable and secure IoT devices.
Related to Efficient Memory Optimization for IoT Intrusion Detection
Related ebooks
Recent Developments in Artificial Intelligence and Communication Technologies Rating: 0 out of 5 stars0 ratingsCompTIA Tech+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam FC0-U71 Rating: 0 out of 5 stars0 ratingsLexicon of Computer Science Terminology: Lexicon of Tech and Business, #16 Rating: 4 out of 5 stars4/5Knuth-Morris-Pratt Algorithm Explained: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratingsCompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam FC0-U61 Rating: 5 out of 5 stars5/5Exploring Computer Systems Rating: 5 out of 5 stars5/5Cyber Physical Systems - Advances and Applications Rating: 0 out of 5 stars0 ratingsCyber-Assurance for the Internet of Things Rating: 0 out of 5 stars0 ratingsKernel Concepts and Architecture: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratingsCrafting Data-Driven Solutions: Core Principles for Robust, Scalable, and Sustainable Systems Rating: 0 out of 5 stars0 ratingsCrateDB for IoT and Machine Data: The Complete Guide for Developers and Engineers Rating: 0 out of 5 stars0 ratingsParallel Programming with Python Rating: 0 out of 5 stars0 ratingsBig Data Analytics for Human-Computer Interactions: A New Era of Computation Rating: 0 out of 5 stars0 ratingsTop Networking Terms You Should Know Rating: 0 out of 5 stars0 ratingsA SECURE DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORK Rating: 0 out of 5 stars0 ratingsSCCharts - Language and Interactive Incremental Compilation Rating: 0 out of 5 stars0 ratingsOptimized Caching Techniques: Application for Scalable Distributed Architectures Rating: 0 out of 5 stars0 ratingsEfficient String Searching with Boyer-Moore: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratingsComputing Principles V11 Rating: 0 out of 5 stars0 ratingsCrushing The Technical Interview: Data Structures And Algorithms (Python Edition) Rating: 0 out of 5 stars0 ratingsAdvanced JavaScript Design Patterns Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests Rating: 0 out of 5 stars0 ratingsSmart Home for beginners: Designing and building a smart house Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Tests: Exam SY0-601 Rating: 0 out of 5 stars0 ratingspfSense Essentials: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratingsSearch Algorithms and Systems: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratingsDesigning Secure and Scalable IoT Systems: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratingsMastering C++ Design Patterns: Create Efficient and Scalable Code Rating: 0 out of 5 stars0 ratingsDatastore Architecture and Implementation: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratings
System Administration For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Mastering Windows 365: Deploy and Manage Cloud PCs and Windows 365 Link devices, Copilot with Intune, and Intune Suite Rating: 0 out of 5 stars0 ratingsLinux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS Rating: 5 out of 5 stars5/5Linux Bible Rating: 0 out of 5 stars0 ratingsLearning Microsoft Endpoint Manager: Unified Endpoint Management with Intune and the Enterprise Mobility + Security Suite Rating: 0 out of 5 stars0 ratingsCompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Git Essentials Rating: 4 out of 5 stars4/5Linux Commands By Example Rating: 5 out of 5 stars5/5Bash Command Line Pro Tips Rating: 5 out of 5 stars5/5Mastering Linux Network Administration Rating: 4 out of 5 stars4/5CompTIA A+ Complete Practice Tests: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 0 out of 5 stars0 ratingsOperating Systems DeMYSTiFieD Rating: 0 out of 5 stars0 ratingsGetting Started with Docker: Master the Art of Containerization with Docker Rating: 0 out of 5 stars0 ratingsPractical Data Analysis Rating: 4 out of 5 stars4/5PowerShell: A Beginner's Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Linux: A complete guide to Linux command line for beginners, and how to get started with the Linux operating system! Rating: 0 out of 5 stars0 ratingsLinux Kernel Programming: A comprehensive and practical guide to kernel internals, writing modules, and kernel synchronization Rating: 0 out of 5 stars0 ratingsCloud Security For Dummies Rating: 0 out of 5 stars0 ratingsWordpress 2023 A Beginners Guide : Design Your Own Website With WordPress 2023 Rating: 0 out of 5 stars0 ratingsThe Linux Command Line, 2nd Edition: A Complete Introduction Rating: 4 out of 5 stars4/5Networking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5Instant Ubuntu Rating: 4 out of 5 stars4/5
Reviews for Efficient Memory Optimization for IoT Intrusion Detection
0 ratings0 reviews
Book preview
Efficient Memory Optimization for IoT Intrusion Detection - Ethan Evelyn
ABSTRACT
Intrusion detection is an approach to security that also emerges in the networked environments. Formerly, Intrusion detection began as a technique for detecting masqueraders and misfeasors in standalone systems, but in the few years the focus of intrusion detection has moved to towards networks. Wireless-oriented Intrusion Detection Systems (WIDSs) is a source of events for the analysis on distributed system composed of many hosts and network links. WID Systems are also capable of comparing signatures for similar packets to link and drop harmful detected packets which have a signature matching the records in the WIDS. The goal of WIDS is to detect attacks that involve the network and may span different hosts. For maximum effectiveness, WIDSs should be able to interoperate with host- based IDSs so that misuse patterns include both network events and operating system events. So, the main function of an intrusion detection system is to perform string pattern matching. Memory architecture is a main part of hardware approaches. Through the memory architecture memory pattern is reduced and fast matching is achieved in Network Intrusion Detection System. In this memory architecture, the string patterns are taken as input which is compiled by finite state machine. As a result substrings that match to string patterns are detected. In order to achieve high security as of the networking domain are considered in current scenarios, various methods have been proposed based on the software for pattern matching. But approaches based on software do not provide adequate scalability and reconfigurability to today’s level of security provisioning. In order to give enough security in Wireless Intrusion Detection System, this project work moves towards the hardware-based approaches. It provides a high level of security. Hardware based approaches mainly concentrate on memory efficiency in pattern matching. The second phase of this work provides a novel proposed technique, a new algorithm which offers an effectual memory for pattern matching. Already State traversal pattern matching algorithm affords a substantial drop in the memory used on comparing other conventional algorithms. This new algorithm provides reduction in memory over a new design method that constructs the state traversal
machine having a size of 1280 bytes. The basic ASCII characters number is 128 which were employed as a standard. The memory architecture is designed with the use of Binary Search Tree (BST) structure. Each node needs memory space of about 10 bytes. Therefore, it needs very small size of memory space like 128(ASCII character) X10 which is 1280 bytes. In 1280 bytes, the users can be capable of storing huge string patterns size in the pattern database which can retrieve easily from the record by means of state traversal machine over path vector.
The existing processes need a vast sum of memory on comparing conventional bit split algorithm and Aho–Corasick algorithm. The proposed system rates the input strings address and entirely merges the input strings common address and reduces the size of memory by means of consuming bits split algorithms and state traversal machine. The string reduced can be provided to IoT for transferring information through network. The combined input strings addresses are encrypted and decrypted through Enhanced Blowfish algorithm for the purpose of allowing packets that are valid or to discard the ones that were invalid with the use of Wireless Intrusion and Detection Systems (WIDS) for the security purpose. This influential IoT platform could be capable of recognizing the identity in an exact manner at which the information is valuable and how it could be ignored in a safe manner. This information might be employed for the identification of patterns, to make the recommendations, and for the detection of possible strings before their occurrence. A novel system of pattern matching is offered in this work that has effectual computational difficulty and needs a small memory amount so as to keep objects of IoT alongside security lops. The projected system depends on the conventional algorithm of pattern-detection that is usually employed for the application of computer security. It is found that the target data could be skipped devoid of any assessment function more directly than they were in the conventional algorithm for security. The information that could be skipped is pre-computed in this projected system as combined FSM. Moreover, the memory usage limit of the conventional algorithm makes it appropriate for resource-constrained smart things. So, to avoid the performance deprivation provided by this restriction, the projected
algorithm reduces the necessary number of additional operations on matching in the course of multi-list algorithm on the operations of character matching. By the variation of pattern numbers taken, the memory reduction is altered and the proposed novel algorithm offers the value of about 87% and 89% which can be considered as 88% in average.
TABLE NO. TITLE PAGE NO.
1.1 Pattern matching FA scheme 8
2.1 Various existing approches 48
AC state table 52
Memory gain table 71
Properties of pattern sets 88
Snort rules - preprocessing times of pattern-
matching algorithms 98
Clam AV preprocessing times of pattern-matching
algorithms 99
Memory gain table 105
Performance analysis of proposed system 107
Performance analysis of proposed system 109
Snort rules - Preprocessing times of pattern-
matching algorithms 111
Clam AV preprocessing times of pattern-matching
algorithms 112
Performance analysis of encryption time 112
Performance analysis of encryption time 114
FIGURE NO. TITLE PAGE NO.
––––––––
IDS architecture 4
Signature matching scheme 5
Pattern matching scheme 6
FA scheme of pattern matching 7
Suffix tree based pattern matching 11
Suffix tree representation 12
Suffix tree for given text 13
Depiction of suffix tree function 14
Searching process 15
FSM representation 18
State diagram of an AC machine 52
A state traversal pattern matching algorithm 53
The alphabetical order of memory address
generator 56
State traversal machine 58
Merged state traversal machine 58
Transition function of string wxyz
60
Transition function of String pxyq
. 61
Merging the similar states 62
String merge using loop back problem 65
Experimental results for memory reduction
algorithm 69
Memory gain graph 72
Performance analysis of proposed encryption time 74
Performance analysis of proposed decryption time 75
Performance analysis of execution time 76
Architecture of intrusion detection systems 80
FIGURE NO. TITLE PAGE NO.
Secured IoT device architecture 84
IoT network consisting of smart physical objects 85
FSM structure 88
Merged FSM and Multi-list 89
Pattern matching algorithm 90
Encryption and decryption using EBA 93
Performance analysis of proposed mechanism in
terms of encryption time 100
Performance analysis of decryption time 101
Memory gain graph 106
Performance analysis of proposed encryption time 108
Performance analysis of proposed decryption time 109
Performance analysis of proposed mechanism in
terms of encryption time 113
Performance analysis of decryption time 114
Performance analysis of decryption time 115
LIST OF SYMBOLS AND ABBREVIATIONS
AC - Aho–Corasick
AGT - Address Generator Tree as binary search tree BST - Binary Search Tree
CLT - CAM-based Lookup Table
CM - Character Matching
COP - Common Operating Picture
DFA - Deterministic Finite Automata
DMA - Direct Matching Algorithm
EBA - Enhanced Blowfish Algorithm
EDFA - Extended deterministic finite automaton FA - Finite Automata
FPGA - Field Programmable Gate Array architectures FSM - Finite State Machine
GPPs - General-Purpose Processors
HBFA - Head Body Finite Automaton
HBM - Head Body Matching
HIDS - Host based Intrusion Detection System
HT - Hilbert transform
IDS - Intrusion Detection System
IoT - Internet of Things
IP - Internet Protocol
KMP - Knuth-Morris-Pratt algorithm
LCS - Longest Common Subsequence
LPM - Logo Pattern Matching
LTT - Label Translation Table
MAR - Memory Address Register
MASM - Memory-efficient Architecture for large-scale String
Matching
MFSM - Merged FSM
NFA - Nondeterministic Finite Automaton
NIDS - Network based Intrusion Detection System PM - Prefix Matching
PMCCC - Pattern Matching Algorithm Using Changing Consecutive Characters
QMM - Quasi-Multiple Medium
QWM - Quick search improved WM
SQLIA - SQL Injection Attack
WEMA - Weighted Exact Matching Algorithm
WIDSs - Wireless-oriented Intrusion Detection Systems WSN - Wireless Sensor Network
CHAPTER 1 INTRODUCTION
INTRODUCTION
The Internet of Things (IoT) has bring extensive of the web usage, by communicating through customer strategy for connecting physical objects. In this time, several objects on a daily basis employed will be functioned in smart sensors and resources of computation that were connected to the networks in one or another form. Thetechnology of Wireless