Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems

Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems

Linjiang Xie, Feilu Hang, Wei Guo, Zhenhong Zhang, Hanruo Li
Copyright: © 2022 |Pages: 21
DOI: 10.4018/IJDST.307956
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.
Article Preview
Top

Discussed Information Security Theory-Based Defense System Of Cooperative Host Security:

Computer security must be constantly enhanced due to the rising reliance on information systems in military and civilian important tasks and the increase of harmful intrusive behavior (Hu et al.2020). An attack's impact on an information system or the attacker's objectives can help determine how malicious an intrusion (Gao t al.2020). The capacity of the information system to provide essential services might be jeopardized if a savvy attacker automates successive intrusion attempts, modifying its important qualities before each attempt to circumvent or bypass static protection mechanisms (Sharma et al.2020) when an information system can sustain its basic functioning and computing performance in the face of security intrusions, term survivability (Chi et al.2016). Applying online processes to supplement offline ones used during design to attain a survival goal since security failures induced by hostile incursions are dynamic and unpredictable (Yang et al., 2020). System partitioning, subsystem design, and system integration are proposed to achieve survivability using fault-tolerant or safety-critical design paradigms (Nguyen et al.2020). Edge computing is responsible for ingesting information from nearby devices connected and using a machine learning algorithm to analyze it before taking action. For example, better survivability of every machine in a networked information system can be achieved by buying time for upper-level components of the multi-layer security architecture to react with the more coordinated diagnosis- and counter-attack tactics (Kponyo et al.2020).

Servers need to have the following security features installed: Self-defense is the act of guarding against injury (Shahriar et al.2018). Lowering the risk of a successful attack on the entire system (Shijie et al.2020). Preparedness for a possible assault (Manogaran et al.2020). Host security measures safeguard the safety of all machines connected to your network (Guo et al.2020). As the amount of code in a system grows, the danger of a flaw being exploited to undermine security increases (Rawal et al.2018). Instead of wasting time putting out patch management fires, administrators may employ host-based protection to focus on the most important changes (Zhang et al.2021). Without host-based protection, a single compromised system may wreck an organization's infrastructure (Pillai et al.2018). Defensive security in cybersecurity is the process of developing a security plan to assure the effectiveness of any security measures that are implemented, starting with an analysis of the current network and concluding with full network infrastructure protection (Novianto et al.2020). According to this perspective on information security, organizations want to protect their information to generate tools to help them perform better (Vijayalakshmi et al.2014). Lowering the risk of cyberattacks on IT systems Using security methods to prevent unauthorized access to sensitive information (Elhaj et al.2020). For example, preventing denial-of-service attacks against systems (Sheron et al.2020). IT security is the process of keeping IT systems and networks safe from unauthorized use and access (Amudha et al.2021). Information security's three main goals are to keep systems and data available intact and secret (Mendonça et al.2020). These losses serve as the impetus for security rules and regulations (Shakeel et al.2018). Safeguarding the privacy of individual data There are many examples of defense technology that has changed over time: password technology, security models, access control strategies, host reinforcements to firewalls, intruder detection technologies, network technologies, emergency response to water intrusion protection technologies, dynamic Defense models, and consequently on (Amudha et al.2021). The growth of attack targets and the advancement of attack tactics go hand in hand with developing security models and technology (Meza et al.2017). Attacks are occurring increasingly fast, and as a result, attack tactics are getting more sophisticated, clever, and diversified (Batra et al.2016). Attackers' motivations are influenced by economic and technological factors (Sornalakshmi et al.2020). Internet-based corporate systems are particularly sensitive because the internet is an excellent platform and exposes internal company systems to outsiders' activity. Service attacks, assaults, and network penetration by attackers can cause major system failures.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 2 Issues (2023)
Volume 13: 8 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing