Intrusion detection at the network edge: Solutions, limitations, and future directions

Simone Raponi, Maurantonio Caprolu, Roberto Di Pietro

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

The low-latency, high bandwidth capabilities promised by 5G, together with the diffusion of applications that require high computing power and, again, low latency (such as videogames), are probably the main reasons—though not the only one—that have led to the introduction of a new network architecture: Fog Computing, that consists in moving the computation services geographically close to where computing is needed. This architectural shift moves security and privacy issues from the Cloud to the different layers of the Fog architecture. In this scenario, IDSs are still necessary, but they need to be contextualized in the new architecture. Indeed, while on the one hand Fog computing provides intrinsic benefits (e.g., low latency), on the other hand, it introduces new design challenges. In this paper, we provide the following contributions: we analyze the possible IDS solutions that can be adopted within the different Fog computing tiers, together with their related deployment and design challenges; and, we propose some promising future directions, by taking into account the challenges left uncovered by the considered solutions.
Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlagservice@springer.de
Pages59-75
Number of pages17
ISBN (Print)9783030233730
DOIs
StatePublished - Jan 1 2019
Externally publishedYes

Fingerprint

Dive into the research topics of 'Intrusion detection at the network edge: Solutions, limitations, and future directions'. Together they form a unique fingerprint.

Cite this