Implementation of lightweight intrusion detection model for security of smart green house and vertical farm

With the current global food production capability, it is not difficult to anticipate that there will be a global food shortage when the world population grows beyond 10 billion by the end of the 21st century. Many projects are in motion to deal with this problem and some of them are considered to be quite feasible. Development and implementation of smart green houses and vertical farms are two major solutions for the expected crisis, but as other ICT-based systems, their security problems must be dealt with. Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. Although major companies and government agencies have introduced various types of high-speed IDS into their networks, smaller firms or private organizations are unable to do so because of the cost involved. The lightweight IDS proposed in this study can be a suitable solution as this system can be operated with a common PC and peripherals. This system also underwent a test bed experiment and proved its efficiency. Jpcap library was used to capture transport packets which were then classified using typical communications protocols. The packet headers were subjected to analysis and the results were stored in database for later applications.

[1]  Seokung Yoon,et al.  Security Issues on Smarthome in IoT Environment , 2015 .

[2]  Jun-Ho Huh,et al.  Implementation of Graphic Based Network Intrusion Detection System for Server Operation , 2015 .

[3]  Klara Nahrstedt,et al.  Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks , 2008, 2008 Tenth IEEE International Symposium on Multimedia.

[4]  Zhili Zhou,et al.  Fast and accurate near-duplicate image elimination for visual sensor networks , 2017, Int. J. Distributed Sens. Networks.

[5]  Jun-Ho Huh,et al.  A Case Study of the Base Technology for the Smart Grid Security , 2016 .

[6]  Robert Raszuk,et al.  Dissemination of Flow Specification Rules , 2009, RFC.

[7]  Yang Xiao,et al.  Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications , 2008, GLOBECOM.

[8]  Yang Xiao,et al.  Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[9]  Martín Casado,et al.  NOX: towards an operating system for networks , 2008, CCRV.

[10]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..

[11]  Danny McPherson,et al.  Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF) , 2009, RFC.

[12]  Martín Casado,et al.  Extending Networking into the Virtualization Layer , 2009, HotNets.

[13]  Jun-Ho Huh,et al.  Smart Grid Test Bed Using OPNET and Power Line Communication , 2017 .

[14]  Jian Shen,et al.  A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..

[15]  Yang Xiao,et al.  A survey of distributed denial-of-service attack, prevention, and mitigation techniques , 2017, Int. J. Distributed Sens. Networks.

[16]  Hossein Rouhani Zeidanloo,et al.  Botnet Detection by Monitoring Similar Communication Patterns , 2010, ArXiv.

[17]  Hae-Sool Yang,et al.  Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis , 2009 .