{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T18:59:24Z","timestamp":1726081164467},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811548246"},{"type":"electronic","value":"9789811548253"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-4825-3_7","type":"book-chapter","created":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T04:02:53Z","timestamp":1587787373000},"page":"87-98","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study"],"prefix":"10.1007","author":[{"given":"Faisal","family":"Alsakran","sequence":"first","affiliation":[]},{"given":"Gueltoum","family":"Bendiab","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Shiaeles","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Kolokotronis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,26]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Albin, E., Rowe, N.C.: A realistic experimental comparison of the Suricata and Snort intrusion-detection systems. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 122\u2013127. IEEE (2012)","DOI":"10.1109\/WAINA.2012.29"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.procs.2011.07.024","volume":"5","author":"A Alhomoud","year":"2011","unstructured":"Alhomoud, A., Munir, R., Disso, J.P., Awan, I., Al-Dhelaan, A.: Performance evaluation study of intrusion detection systems. Procedia Comput. Sci. 5, 173\u2013180 (2011)","journal-title":"Procedia Comput. Sci."},{"issue":"5","key":"7_CR3","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi, E., Williams, L., S\u0142owi\u0144ska, M., Theodorakopoulos, G., Burnap, P.: A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 6(5), 9042\u20139053 (2019)","journal-title":"IEEE Internet Things J."},{"key":"7_CR4","unstructured":"Avast: Avast smart home security report 2019. \nhttps:\/\/bit.ly\/2Ns2ju2\n\n. Accessed 29 Aug 2019"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Bhosale, D.A., Mane, V.M.: Comparative study and analysis of network intrusion detection tools. In: 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 312\u2013315. IEEE (2015)","DOI":"10.1109\/ICATCCT.2015.7456901"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Brumen, B., Legvart, J.: Performance analysis of two open source intrusion detection systems. In: 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1387\u20131392. IEEE (2016)","DOI":"10.1109\/MIPRO.2016.7522356"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Bulajoul, W., James, A., Pannu, M.: Network intrusion detection systems in high-speed traffic in computer networks. In: 2013 IEEE 10th International Conference on e-Business Engineering, pp. 168\u2013175. IEEE (2013)","DOI":"10.1109\/ICEBE.2013.26"},{"issue":"1","key":"7_CR8","first-page":"316","volume":"4","author":"R China","year":"2013","unstructured":"China, R., Avadhani, P.: A comparison of two intrusion detection systems. IJCST 4(1), 316\u2013319 (2013)","journal-title":"IJCST"},{"key":"7_CR9","unstructured":"Dietrich, T.: Smart home product security risks can be alarming. \nhttps:\/\/www.insurancejournal.com\/news\/national\/2019\/01\/03\/513394.htm\n\n. Accessed 28 Mar 2019"},{"key":"7_CR10","unstructured":"Ghosh, A.K., Schwartzbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Workshop on Intrusion Detection and Network Monitoring, vol. 51462, pp. 1\u201313 (1999)"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1080\/09613218.2017.1286882","volume":"46","author":"T Hargreaves","year":"2018","unstructured":"Hargreaves, T., Wilson, C., Hauxwell-Baldwin, R.: Learning to live in a smart home. Build. Res. Inf. 46(1), 127\u2013139 (2018)","journal-title":"Build. Res. Inf."},{"key":"7_CR12","unstructured":"InsightDiy: TechUK and GfK: The state of the connected home. \nhttps:\/\/bit.ly\/2oz4nbf\n\n. Accessed 11 Aug 2019"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-981-13-7279-7_6","volume-title":"Proceedings of the Third International Conference on Computing, Mathematics and Statistics (iCMS2017)","author":"FM Isa","year":"2019","unstructured":"Isa, F.M., Saad, S., Fadzil, A.F.A., Saidi, R.M.: Comprehensive performance assessment on open source intrusion detection system. In: Kor, L.-K., Ahmad, A.-R., Idrus, Z., Mansor, K.A. (eds.) Proceedings of the Third International Conference on Computing, Mathematics and Statistics (iCMS2017), pp. 45\u201351. Springer, Singapore (2019). \nhttps:\/\/doi.org\/10.1007\/978-981-13-7279-7_6"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Joy, A.M.: Performance comparison between Linux containers and virtual machines. In: 2015 International Conference on Advances in Computer Engineering and Applications, pp. 342\u2013346. IEEE (2015)","DOI":"10.1109\/ICACEA.2015.7164727"},{"issue":"3","key":"7_CR15","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/info7030044","volume":"7","author":"H Lin","year":"2016","unstructured":"Lin, H., Bergmann, N.: IoT privacy and security challenges for smart home environments. Information 7(3), 44 (2016)","journal-title":"Information"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Liu, K., Fan, Z., Liu, M., Zhang, S.: Hybrid intrusion detection method based on k-means and CNN for smart home. In: 2018 IEEE 8th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), pp. 312\u2013317. IEEE (2018)","DOI":"10.1109\/CYBER.2018.8688271"},{"issue":"6","key":"7_CR17","first-page":"383","volume":"1","author":"P Mehra","year":"2012","unstructured":"Mehra, P.: A brief study and comparison of snort and bro open source network intrusion detection systems. Int. J. Adv. Res. Comput. Commun. Eng. 1(6), 383\u2013386 (2012)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"7_CR18","unstructured":"Murphy, B.R.: Comparing the performance of intrusion detection systems: Snort and Suricata. Ph.D. thesis, Colorado Technical University (2019)"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/978-1-4842-4294-0_19","volume-title":"Cyber Operations","author":"M O\u2019Leary","year":"2019","unstructured":"O\u2019Leary, M.: Snort. In: O\u2019Leary, M. (ed.) Cyber Operations, pp. 947\u2013982. Apress, Berkeley (2019). \nhttps:\/\/doi.org\/10.1007\/978-1-4842-4294-0_19"},{"key":"7_CR20","first-page":"15","volume":"87","author":"N Paulauskas","year":"2008","unstructured":"Paulauskas, N., Skudutis, J.: Investigation of the intrusion detection system \u201csnort\u201d performance. Elektron. Elektrotech. 87, 15\u201318 (2008)","journal-title":"Elektron. Elektrotech."},{"issue":"23\u201324","key":"7_CR21","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23\u201324), 2435\u20132463 (1999)","journal-title":"Comput. Netw."},{"key":"7_CR22","volume-title":"A comparative analysis of open-source intrusion detection systems","author":"M Pihelgas","year":"2012","unstructured":"Pihelgas, M.: A comparative analysis of open-source intrusion detection systems. Tallinn University of Technology & University of Tartu, Tallinn (2012)"},{"key":"7_CR23","unstructured":"Rambus: Smart home: Threats and countermeasures. \nhttps:\/\/www.rambus.com\/iot\/smart-home\/\n\n. Accessed 02 July 2019"},{"key":"7_CR24","unstructured":"Resmi, A.: Intrusion detection system techniques and tools: a survey (2017)"},{"key":"7_CR25","unstructured":"Roesch, M., et al.: Snort: lightweight intrusion detection for networks. In: LISA 1999, pp. 229\u2013238 (1999)"},{"issue":"1","key":"7_CR26","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.jnca.2009.07.005","volume":"33","author":"K Salah","year":"2010","unstructured":"Salah, K., Kahtani, A.: Performance evaluation comparison of snort NIDS under Linux and windows server. J. Netw. Comput. Appl. 33(1), 6\u201315 (2010)","journal-title":"J. Netw. Comput. Appl."},{"key":"7_CR27","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.future.2017.10.016","volume":"80","author":"SAR Shah","year":"2018","unstructured":"Shah, S.A.R., Issac, B.: Performance comparison of intrusion detection systems and application of machine learning to Snort system. Future Gener. Comput. Syst. 80, 157\u2013170 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"7_CR28","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MTS.2018.2826079","volume":"37","author":"V Sivaraman","year":"2018","unstructured":"Sivaraman, V., Gharakheili, H.H., Fernandes, C., Clark, N., Karliychuk, T.: Smart IoT devices in the home: security and privacy implications. IEEE Technol. Soc. Mag. 37(2), 71\u201379 (2018)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Thongkanchorn, K., Ngamsuriyaroj, S., Visoottiviseth, V.: Evaluation studies of three intrusion detection systems under various attacks and rule sets. In: 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), pp. 1\u20134. IEEE (2013)","DOI":"10.1109\/TENCON.2013.6718975"},{"key":"7_CR30","unstructured":"Van Der Meulen, R.: Gartner says 6.4 billion connected \u2018things\u2019 will be in use in 2016, up 30 percent from 2015. STAMFORD, Conn (2015)"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Wang, X., Kordas, A., Hu, L., Gaedke, M., Smith, D.: Administrative evaluation of intrusion detection system. In: Proceedings of the 2nd Annual Conference on Research in Information Technology, pp. 47\u201352. ACM (2013)","DOI":"10.1145\/2512209.2512216"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"White, J.S., Fitzsimmons, T., Matthews, J.N.: Quantitative analysis of intrusion detection systems: Snort and Suricata. In: Cyber Sensing 2013, vol. 8757, p. 875704. International Society for Optics and Photonics (2013)","DOI":"10.1117\/12.2015616"},{"key":"7_CR33","unstructured":"Zeek: Introduction: Bro overview. \nhttps:\/\/bit.ly\/2mRmeKd\n\n. Accessed 29 Aug 2019"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-4825-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T04:03:47Z","timestamp":1587787427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-4825-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811548246","9789811548253"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-4825-3_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"26 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Trivandrum","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}