Security and Communication Networks

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things


Publishing date
01 Jan 2019
Status
Published
Submission deadline
24 Aug 2018

Lead Editor

1University of Auckland, Auckland, New Zealand

2Michigan State University, East Lansing, USA

3University of Windsor, Windsor, Canada

4University of the West of England, Bristol, UK

5Qufu Normal University, Qufu, China

6University of Technology Sydney, Sydney, Australia


Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things

Description

Internet of Things (IoT), cloud, and fog computing paradigms are as a whole provision a powerful large-scale computing infrastructure for many data and computation intensive applications. Specifically, the IoT technologies and deployment can widely perceive our physical world at a fine granularity and generate sensing data for further insight extraction. The fog computing facilities can provide computing power near the IoT devices where data are generated, aiming to achieve fast data processing for time critical applications or save the amount of data transmitted into cloud for storage or further processing. The cloud computing platforms can offer big data storage and large-scale processing services for cheap long-term storage or data intensive analytics with more advanced data mining models. Hence, it can be seen that the IoT/fog/cloud computing infrastructures can support the whole lifecycle of large-scale applications where big data collection, transmission, storage, processing, and mining can be seamlessly integrated. However, these state-of-the-art computing infrastructures still suffer from severe security and privacy threats because of their built-in properties such as the ubiquitous-access and multitenancy features of cloud computing, or the limited computing capability of IoT devices. The expanded attack surface and the lack of effective security and privacy protection measures are still one of the barriers of widely deploying applications on the IoT/fog/cloud infrastructure.

Intrusion detection and prevention systems that monitor the devices, networks, and systems for malicious activities and policy violations are one of the key countermeasures against cybersecurity attacks. With a wide spectrum, the detection and prevention systems vary from antivirus software to hierarchical systems monitoring the traffic of an entire backbone networks. In general, intrusion detection systems can be categorized into two groups, that is, signature-based detection (malicious patterns are already known) and anomaly-based detection (no patterns are given). Traditional methods and systems might fail to be directly applicable to the state-of-the-art computing paradigms and infrastructure as mentioned above. Novel intrusion detection and prevention algorithms and systems are in demand to cater for the new computing infrastructure and newly emerging cybersecurity attacks and threats, with taking into account the factors such as algorithmic scalability, computing environment heterogeneity, and data diversity and complexity. Extensive research is required to conduct more scalable and effective intrusion detection and prevention in IoT/fog/cloud. Many relevant theoretical and technical issues have not been answered well yet. So, it is high time to investigate the related issues in intrusion detection and prevision in IoT, fog, and cloud computing by examining intrusion detection and prevision algorithms, methods, architecture, systems, platforms, and applications in detail, hence the call for this special issue.

Potential topics include but are not limited to the following:

  • Theories and modeling for intrusion detection and prevention
  • New challenges brought by IoT/fog/cloud to intrusion detection and prevention
  • Intrusion detection and prevention system and architecture design
  • IoT, fog, and/or cloud computing based intrusion detection and prevention systems
  • Network based and host-based intrusion detection systems
  • Signature based intrusion detection and prevention
  • Anomaly analysis based intrusion detection and prevention
  • Anomaly/outlier/emerging event detection theories and modeling
  • Anomaly/outlier detection applications and systems in IoT, fog, and cloud computing
  • Supervised and unsupervised learning for intrusion detection
  • Computational intelligence for intrusion detection and prevention systems
  • Light-weight and time-critical intrusion detection and prevention systems
  • Distributed and scalable detection and prevention systems
  • Privacy-preserving intrusion detection and prevention
  • Cryptographical theories and techniques for intrusion detection and prevention
  • Information hiding and encryption
  • Security issues and challenges in cloud, edge, fog, and IoT

Articles

  • Special Issue
  • - Volume 2019
  • - Article ID 4529757
  • - Editorial

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things

Xuyun Zhang | Yuan Yuan | ... | Deepak Puthal
  • Special Issue
  • - Volume 2019
  • - Article ID 5306395
  • - Research Article

Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic

Leila Khatibzadeh | Zarrintaj Bornaee | Abbas Ghaemi Bafghi
  • Special Issue
  • - Volume 2019
  • - Article ID 4923590
  • - Research Article

A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment

Wenjie Liu | Peipei Gao | ... | Maojun Zhang
  • Special Issue
  • - Volume 2019
  • - Article ID 4049765
  • - Research Article

A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things

Darong Huang | Lanyan Ke | ... | Shaohua Wan
  • Special Issue
  • - Volume 2018
  • - Article ID 1635081
  • - Research Article

Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT

Xuefei Liu | Chao Zhang | ... | Russell Higgs
  • Special Issue
  • - Volume 2018
  • - Article ID 6124160
  • - Research Article

Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment

Xiaodan Gu | Ming Yang | ... | Zhen Ling
  • Special Issue
  • - Volume 2018
  • - Article ID 1420930
  • - Research Article

Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud

Zhenghong Wang | Zhangjie Fu | Xingming Sun
  • Special Issue
  • - Volume 2018
  • - Article ID 6459326
  • - Research Article

Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing

Jieren Cheng | Mengyang Li | ... | Wei Guo
  • Special Issue
  • - Volume 2018
  • - Article ID 3210207
  • - Research Article

A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs

Rutvij H. Jhaveri | Aneri Desai | ... | Yubin Zhong
  • Special Issue
  • - Volume 2018
  • - Article ID 3723691
  • - Research Article

Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things

Weiwei Lin | Hongwei Zeng | ... | Xiaolin Wang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.