Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems

Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conduc...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of distributed systems and technologies 2022-01, Vol.13 (7), p.1-21
Hauptverfasser: Xie, Linjiang, Hang, Feilu, Guo, Wei, Zhang, Zhenhong, Li, Hanruo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 21
container_issue 7
container_start_page 1
container_title International journal of distributed systems and technologies
container_volume 13
creator Xie, Linjiang
Hang, Feilu
Guo, Wei
Zhang, Zhenhong
Li, Hanruo
description Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.
doi_str_mv 10.4018/IJDST.307956
format Article
fullrecord <record><control><sourceid>gale_cross</sourceid><recordid>TN_cdi_gale_businessinsightsgauss_A760037833</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A760037833</galeid><sourcerecordid>A760037833</sourcerecordid><originalsourceid>FETCH-LOGICAL-c202t-147de02de55022f76177f1f56200e10305d46e2647d9723c13ad9ff4721dc7d93</originalsourceid><addsrcrecordid>eNpFkM9OwkAQxjdGEwly8wH2ASzO_uvSIwIChsRD0WuztrO1BlrS2Zrw9hYhOoeZb2a-mcOPsXsBYw1i8rh-mafbsQKbmPiKDUSibaSMhus_reQtGxF9QR9GWxsnA_a-KErks2Z_6EJVl7yp-6Y5YOtC9Y181VDgKeZdW4Ujn6PHmpCnRwq450-OsDhdpE1euR1fN9vLiu7YjXc7wtGlDtnb82I7W0Wb1-V6Nt1EuQQZIqFtgSALNAak9DYW1nrhTSwBUIACU-gYZdzbEitVLpQrEu-1laLI-5kasofz39LtMPvoqKqR-kRV-RmodB1RNrUxgLITpf7tedsQteizQ1vtXXvMBGQnitkvxexMUf0AVNtjrQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems</title><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Xie, Linjiang ; Hang, Feilu ; Guo, Wei ; Zhang, Zhenhong ; Li, Hanruo</creator><creatorcontrib>Xie, Linjiang ; Hang, Feilu ; Guo, Wei ; Zhang, Zhenhong ; Li, Hanruo</creatorcontrib><description>Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.</description><identifier>ISSN: 1947-3532</identifier><identifier>EISSN: 1947-3540</identifier><identifier>DOI: 10.4018/IJDST.307956</identifier><language>eng</language><publisher>IGI Global</publisher><subject>Defense industry ; Safety and security measures</subject><ispartof>International journal of distributed systems and technologies, 2022-01, Vol.13 (7), p.1-21</ispartof><rights>COPYRIGHT 2022 IGI Global</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c202t-147de02de55022f76177f1f56200e10305d46e2647d9723c13ad9ff4721dc7d93</citedby><cites>FETCH-LOGICAL-c202t-147de02de55022f76177f1f56200e10305d46e2647d9723c13ad9ff4721dc7d93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27915,27916</link.rule.ids></links><search><creatorcontrib>Xie, Linjiang</creatorcontrib><creatorcontrib>Hang, Feilu</creatorcontrib><creatorcontrib>Guo, Wei</creatorcontrib><creatorcontrib>Zhang, Zhenhong</creatorcontrib><creatorcontrib>Li, Hanruo</creatorcontrib><title>Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems</title><title>International journal of distributed systems and technologies</title><description>Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.</description><subject>Defense industry</subject><subject>Safety and security measures</subject><issn>1947-3532</issn><issn>1947-3540</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><recordid>eNpFkM9OwkAQxjdGEwly8wH2ASzO_uvSIwIChsRD0WuztrO1BlrS2Zrw9hYhOoeZb2a-mcOPsXsBYw1i8rh-mafbsQKbmPiKDUSibaSMhus_reQtGxF9QR9GWxsnA_a-KErks2Z_6EJVl7yp-6Y5YOtC9Y181VDgKeZdW4Ujn6PHmpCnRwq450-OsDhdpE1euR1fN9vLiu7YjXc7wtGlDtnb82I7W0Wb1-V6Nt1EuQQZIqFtgSALNAak9DYW1nrhTSwBUIACU-gYZdzbEitVLpQrEu-1laLI-5kasofz39LtMPvoqKqR-kRV-RmodB1RNrUxgLITpf7tedsQteizQ1vtXXvMBGQnitkvxexMUf0AVNtjrQ</recordid><startdate>20220101</startdate><enddate>20220101</enddate><creator>Xie, Linjiang</creator><creator>Hang, Feilu</creator><creator>Guo, Wei</creator><creator>Zhang, Zhenhong</creator><creator>Li, Hanruo</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>N95</scope></search><sort><creationdate>20220101</creationdate><title>Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems</title><author>Xie, Linjiang ; Hang, Feilu ; Guo, Wei ; Zhang, Zhenhong ; Li, Hanruo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c202t-147de02de55022f76177f1f56200e10305d46e2647d9723c13ad9ff4721dc7d93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Defense industry</topic><topic>Safety and security measures</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xie, Linjiang</creatorcontrib><creatorcontrib>Hang, Feilu</creatorcontrib><creatorcontrib>Guo, Wei</creatorcontrib><creatorcontrib>Zhang, Zhenhong</creatorcontrib><creatorcontrib>Li, Hanruo</creatorcontrib><collection>CrossRef</collection><collection>Gale Business: Insights</collection><jtitle>International journal of distributed systems and technologies</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Xie, Linjiang</au><au>Hang, Feilu</au><au>Guo, Wei</au><au>Zhang, Zhenhong</au><au>Li, Hanruo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems</atitle><jtitle>International journal of distributed systems and technologies</jtitle><date>2022-01-01</date><risdate>2022</risdate><volume>13</volume><issue>7</issue><spage>1</spage><epage>21</epage><pages>1-21</pages><issn>1947-3532</issn><eissn>1947-3540</eissn><abstract>Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.</abstract><pub>IGI Global</pub><doi>10.4018/IJDST.307956</doi><tpages>21</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1947-3532
ispartof International journal of distributed systems and technologies, 2022-01, Vol.13 (7), p.1-21
issn 1947-3532
1947-3540
language eng
recordid cdi_gale_businessinsightsgauss_A760037833
source ProQuest Central UK/Ireland; ProQuest Central
subjects Defense industry
Safety and security measures
title Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T04%3A07%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Edge%20Computing%20on%20Cooperative%20Host%20Security%20Defense%20System%20Based%20on%20Social%20IoT%20Systems&rft.jtitle=International%20journal%20of%20distributed%20systems%20and%20technologies&rft.au=Xie,%20Linjiang&rft.date=2022-01-01&rft.volume=13&rft.issue=7&rft.spage=1&rft.epage=21&rft.pages=1-21&rft.issn=1947-3532&rft.eissn=1947-3540&rft_id=info:doi/10.4018/IJDST.307956&rft_dat=%3Cgale_cross%3EA760037833%3C/gale_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_galeid=A760037833&rfr_iscdi=true