Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems
Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conduc...
Gespeichert in:
Veröffentlicht in: | International journal of distributed systems and technologies 2022-01, Vol.13 (7), p.1-21 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 21 |
---|---|
container_issue | 7 |
container_start_page | 1 |
container_title | International journal of distributed systems and technologies |
container_volume | 13 |
creator | Xie, Linjiang Hang, Feilu Guo, Wei Zhang, Zhenhong Li, Hanruo |
description | Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%. |
doi_str_mv | 10.4018/IJDST.307956 |
format | Article |
fullrecord | <record><control><sourceid>gale_cross</sourceid><recordid>TN_cdi_gale_businessinsightsgauss_A760037833</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A760037833</galeid><sourcerecordid>A760037833</sourcerecordid><originalsourceid>FETCH-LOGICAL-c202t-147de02de55022f76177f1f56200e10305d46e2647d9723c13ad9ff4721dc7d93</originalsourceid><addsrcrecordid>eNpFkM9OwkAQxjdGEwly8wH2ASzO_uvSIwIChsRD0WuztrO1BlrS2Zrw9hYhOoeZb2a-mcOPsXsBYw1i8rh-mafbsQKbmPiKDUSibaSMhus_reQtGxF9QR9GWxsnA_a-KErks2Z_6EJVl7yp-6Y5YOtC9Y181VDgKeZdW4Ujn6PHmpCnRwq450-OsDhdpE1euR1fN9vLiu7YjXc7wtGlDtnb82I7W0Wb1-V6Nt1EuQQZIqFtgSALNAak9DYW1nrhTSwBUIACU-gYZdzbEitVLpQrEu-1laLI-5kasofz39LtMPvoqKqR-kRV-RmodB1RNrUxgLITpf7tedsQteizQ1vtXXvMBGQnitkvxexMUf0AVNtjrQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems</title><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Xie, Linjiang ; Hang, Feilu ; Guo, Wei ; Zhang, Zhenhong ; Li, Hanruo</creator><creatorcontrib>Xie, Linjiang ; Hang, Feilu ; Guo, Wei ; Zhang, Zhenhong ; Li, Hanruo</creatorcontrib><description>Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.</description><identifier>ISSN: 1947-3532</identifier><identifier>EISSN: 1947-3540</identifier><identifier>DOI: 10.4018/IJDST.307956</identifier><language>eng</language><publisher>IGI Global</publisher><subject>Defense industry ; Safety and security measures</subject><ispartof>International journal of distributed systems and technologies, 2022-01, Vol.13 (7), p.1-21</ispartof><rights>COPYRIGHT 2022 IGI Global</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c202t-147de02de55022f76177f1f56200e10305d46e2647d9723c13ad9ff4721dc7d93</citedby><cites>FETCH-LOGICAL-c202t-147de02de55022f76177f1f56200e10305d46e2647d9723c13ad9ff4721dc7d93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27915,27916</link.rule.ids></links><search><creatorcontrib>Xie, Linjiang</creatorcontrib><creatorcontrib>Hang, Feilu</creatorcontrib><creatorcontrib>Guo, Wei</creatorcontrib><creatorcontrib>Zhang, Zhenhong</creatorcontrib><creatorcontrib>Li, Hanruo</creatorcontrib><title>Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems</title><title>International journal of distributed systems and technologies</title><description>Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.</description><subject>Defense industry</subject><subject>Safety and security measures</subject><issn>1947-3532</issn><issn>1947-3540</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><recordid>eNpFkM9OwkAQxjdGEwly8wH2ASzO_uvSIwIChsRD0WuztrO1BlrS2Zrw9hYhOoeZb2a-mcOPsXsBYw1i8rh-mafbsQKbmPiKDUSibaSMhus_reQtGxF9QR9GWxsnA_a-KErks2Z_6EJVl7yp-6Y5YOtC9Y181VDgKeZdW4Ujn6PHmpCnRwq450-OsDhdpE1euR1fN9vLiu7YjXc7wtGlDtnb82I7W0Wb1-V6Nt1EuQQZIqFtgSALNAak9DYW1nrhTSwBUIACU-gYZdzbEitVLpQrEu-1laLI-5kasofz39LtMPvoqKqR-kRV-RmodB1RNrUxgLITpf7tedsQteizQ1vtXXvMBGQnitkvxexMUf0AVNtjrQ</recordid><startdate>20220101</startdate><enddate>20220101</enddate><creator>Xie, Linjiang</creator><creator>Hang, Feilu</creator><creator>Guo, Wei</creator><creator>Zhang, Zhenhong</creator><creator>Li, Hanruo</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>N95</scope></search><sort><creationdate>20220101</creationdate><title>Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems</title><author>Xie, Linjiang ; Hang, Feilu ; Guo, Wei ; Zhang, Zhenhong ; Li, Hanruo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c202t-147de02de55022f76177f1f56200e10305d46e2647d9723c13ad9ff4721dc7d93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Defense industry</topic><topic>Safety and security measures</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xie, Linjiang</creatorcontrib><creatorcontrib>Hang, Feilu</creatorcontrib><creatorcontrib>Guo, Wei</creatorcontrib><creatorcontrib>Zhang, Zhenhong</creatorcontrib><creatorcontrib>Li, Hanruo</creatorcontrib><collection>CrossRef</collection><collection>Gale Business: Insights</collection><jtitle>International journal of distributed systems and technologies</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Xie, Linjiang</au><au>Hang, Feilu</au><au>Guo, Wei</au><au>Zhang, Zhenhong</au><au>Li, Hanruo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems</atitle><jtitle>International journal of distributed systems and technologies</jtitle><date>2022-01-01</date><risdate>2022</risdate><volume>13</volume><issue>7</issue><spage>1</spage><epage>21</epage><pages>1-21</pages><issn>1947-3532</issn><eissn>1947-3540</eissn><abstract>Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.</abstract><pub>IGI Global</pub><doi>10.4018/IJDST.307956</doi><tpages>21</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1947-3532 |
ispartof | International journal of distributed systems and technologies, 2022-01, Vol.13 (7), p.1-21 |
issn | 1947-3532 1947-3540 |
language | eng |
recordid | cdi_gale_businessinsightsgauss_A760037833 |
source | ProQuest Central UK/Ireland; ProQuest Central |
subjects | Defense industry Safety and security measures |
title | Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T04%3A07%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Edge%20Computing%20on%20Cooperative%20Host%20Security%20Defense%20System%20Based%20on%20Social%20IoT%20Systems&rft.jtitle=International%20journal%20of%20distributed%20systems%20and%20technologies&rft.au=Xie,%20Linjiang&rft.date=2022-01-01&rft.volume=13&rft.issue=7&rft.spage=1&rft.epage=21&rft.pages=1-21&rft.issn=1947-3532&rft.eissn=1947-3540&rft_id=info:doi/10.4018/IJDST.307956&rft_dat=%3Cgale_cross%3EA760037833%3C/gale_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_galeid=A760037833&rfr_iscdi=true |