Abstract
With the increasing number of IoT devices, safe-guarding them against cyber attacks has become a complex task. Traditional intrusion detection system (IDS) solutions are often impractical for resource-constrained IoT devices. To address this challenge, this research proposes and evaluates a Raspberry Pi-based IDS specifically designed to secure IoT devices. The study aims to analyze the effectiveness of the Pi-based IDS in detecting various network attacks, identify configuration changes to enhance its performance, and assess any potential vulnerabilities. The methodology involves conducting attacks on an IoT environment consisting of a Raspberry Pi with IDS, a temperature sensor transmitting data to a web server, and a background traffic generator. The study analyzes and presents metrics data extracted from log files. The expected outcome is to demonstrate the efficacy of the Raspberry Pi-based IDS and provide insights into its potential advantages for securing IoT devices by detecting network attacks. The findings of this research will contribute to the existing IoT security literature and offer recommendations for optimizing the Snort IDS on the Raspberry Pi platform.
| Original language | English |
|---|---|
| Title of host publication | 2023 International Symposium on Networks, Computers and Communications (ISNCC) |
| Publisher | IEEE |
| Pages | 1-7 |
| Number of pages | 7 |
| Volume | 10 |
| ISBN (Electronic) | 979-8-3503-3559-0 |
| ISBN (Print) | 979-8-3503-3560-6 |
| DOIs | |
| Publication status | Published - 27 Nov 2023 |
| Event | International Symposium on Networks, Computers and Communications, ISNCC 2023 - Doha, Qatar Duration: 23 Oct 2023 → 26 Oct 2023 |
Conference
| Conference | International Symposium on Networks, Computers and Communications, ISNCC 2023 |
|---|---|
| Abbreviated title | ISNCC 2023 |
| Country/Territory | Qatar |
| City | Doha |
| Period | 23/10/23 → 26/10/23 |
Keywords
- 2024 OA procedure
Fingerprint
Dive into the research topics of 'Enhancing IoT Security: Design and Evaluation of a Raspberry Pi-Based Intrusion Detection System'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver