A Novel Intrusion Detection System for Smart Space

A Novel Intrusion Detection System for Smart Space

Bo Zhou, Qi Shi, Madjid Merabti
ISBN13: 9781605668369|ISBN10: 1605668362|EISBN13: 9781605668376
DOI: 10.4018/978-1-60566-836-9.ch013
Cite Chapter Cite Chapter

MLA

Zhou, Bo, et al. "A Novel Intrusion Detection System for Smart Space." Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, edited by Chang-Tsun Li, IGI Global, 2010, pp. 307-333. https://doi.org/10.4018/978-1-60566-836-9.ch013

APA

Zhou, B., Shi, Q., & Merabti, M. (2010). A Novel Intrusion Detection System for Smart Space. In C. Li (Ed.), Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions (pp. 307-333). IGI Global. https://doi.org/10.4018/978-1-60566-836-9.ch013

Chicago

Zhou, Bo, Qi Shi, and Madjid Merabti. "A Novel Intrusion Detection System for Smart Space." In Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, edited by Chang-Tsun Li, 307-333. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-836-9.ch013

Export Reference

Mendeley
Favorite

Abstract

An Intrusion Detection System (IDS) is a tool used to protect computer resources against malicious activities. Existing IDSs have several weaknesses that hinder their direct application to ubiquitous computing environments like smart home/office. These shortcomings are caused by their lack of considerations about the heterogeneity, flexibility and resource constraints of ubiquitous networks. Thus the evolution towards ubiquitous computing demands a new generation of resource-efficient IDSs to provide sufficient protections against malicious activities. In this chapter we proposed a Service-oriented and User-centric Intrusion Detection System (SUIDS) for ubiquitous networks. SUIDS keeps the special requirements of ubiquitous computing in mind throughout its design and implementation. It sets a new direction for future research and development.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.