Research Article
An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection
Table 2
Analysis of intrusion detection in edge computing.
| | Presentation | Characters | Intrusion detection |
| Data | Data encryption methods which are lightweight | Light data | A distributed and dynamic IDS with uncertain model | Fine-grained data-sharing systems | Independent | Multisource heterogeneous data | Various | Communication | Independent edge devices | Noninterference | Communicating with cloud service | Distributed | Computing models | Faced with Internet of everything scenario that means various edge services | Uncertain models |
|
|