{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T23:13:20Z","timestamp":1768000400630,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030233730","type":"print"},{"value":"9783030233747","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23374-7_5","type":"book-chapter","created":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T23:09:30Z","timestamp":1560812970000},"page":"59-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions"],"prefix":"10.1007","author":[{"given":"Simone","family":"Raponi","sequence":"first","affiliation":[]},{"given":"Maurantonio","family":"Caprolu","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,13]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13\u201316. ACM (2012)","DOI":"10.1145\/2342509.2342513"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Rios, R., Roman, R., Onieva, J.A., Lopez, J.: From SMOG to Fog: a security perspective. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), pp. 56\u201361, May 2017","DOI":"10.1109\/FMEC.2017.7946408"},{"key":"5_CR3","unstructured":"Roman, R., Lopez, J., Mambo, M., Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680\u2013698 (2018)"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"19293","DOI":"10.1109\/ACCESS.2017.2749422","volume":"5","author":"M Mukherjee","year":"2017","unstructured":"Mukherjee, M., et al.: Security and privacy in fog computing: challenges. IEEE Access 5, 19293\u201319304 (2017)","journal-title":"IEEE Access"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Munir, K.: Advancing Consumer-Centric Fog Computing Architectures. IGI Global (2018)","DOI":"10.4018\/978-1-5225-7149-0"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.comnet.2016.08.003","volume":"108","author":"S Sciancalepore","year":"2016","unstructured":"Sciancalepore, S., Piro, G., Vogli, E., Boggia, G., Grieco, L.A., Cavone, G.: LICITUS: a lightweight and standard compatible framework for securing layer-2 communications in the IoT. Comput. Netw. 108, 66\u201377 (2016)","journal-title":"Comput. Netw."},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"6900","DOI":"10.1109\/ACCESS.2017.2778504","volume":"6","author":"W Yu","year":"2018","unstructured":"Yu, W., et al.: A survey on the edge computing for the internet of things. IEEE Access 6, 6900\u20136919 (2018)","journal-title":"IEEE Access"},{"key":"5_CR8","unstructured":"Hosseinpour, F., Vahdani Amoli, P., Plosila, J., H\u00e4m\u00e4l\u00e4inen, T., Tenhunen, H.: An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. Int. J. Digit. Content Technol. Appl. 10, 34\u201346 (2016)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-3-319-21837-3_67","volume-title":"Wireless Algorithms, Systems, and Applications","author":"S Yi","year":"2015","unstructured":"Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. In: Xu, K., Zhu, H. (eds.) WASA 2015. LNCS, vol. 9204, pp. 685\u2013695. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21837-3_67"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.comcom.2018.03.011","volume":"122","author":"A Martin","year":"2018","unstructured":"Martin, A., Raponi, S., Combe, T., Di Pietro, R.: Docker ecosystem-vulnerability analysis. Comput. Commun. 122, 30\u201343 (2018)","journal-title":"Comput. Commun."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Krontiris, I., Giannetsos, T., Dimitriou, T.: LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, p. 20. ACM (2008)","DOI":"10.1145\/1460877.1460903"},{"issue":"4","key":"5_CR12","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1002\/wcm.785","volume":"10","author":"TH Hai","year":"2010","unstructured":"Hai, T.H., Huh, E.N., Jo, M.: A lightweight intrusion detection framework for wireless sensor networks. Wirel. Commun. Mob. Comput. 10(4), 559\u2013572 (2010)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"5_CR13","unstructured":"Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking And Communications, WiMob 2005, vol. 3, pp. 253\u2013259. IEEE (2005)"},{"issue":"2","key":"5_CR14","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/a10020039","volume":"10","author":"S Anwar","year":"2017","unstructured":"Anwar, S., et al.: From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms 10(2), 39 (2017)","journal-title":"Algorithms"},{"issue":"5","key":"5_CR15","first-page":"213","volume":"26","author":"R Sandhu","year":"2017","unstructured":"Sandhu, R., Sohal, A.S., Sood, S.K.: Identification of malicious edge devices in fog computing environments. Inf. Secur. J.: Glob. Perspect. 26(5), 213\u2013228 (2017)","journal-title":"Inf. Secur. J.: Glob. Perspect."},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"178","DOI":"10.3390\/app9010178","volume":"9","author":"B Sudqi Khater","year":"2019","unstructured":"Sudqi Khater, B., Abdul Wahab, A., Idris, M., Abdulla Hussain, M., Ahmed Ibrahim, A.: A lightweight perceptron-based intrusion detection system for fog computing. Appl. Sci. 9(1), 178 (2019)","journal-title":"Appl. Sci."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Sedjelmaci, H., Senouci, S.M., Al-Bahri, M.: A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICC.2016.7510811"},{"issue":"3","key":"5_CR18","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/s11036-015-0644-x","volume":"21","author":"N Pandeeswari","year":"2016","unstructured":"Pandeeswari, N., Kumar, G.: Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mob. Netw. Appl. 21(3), 494\u2013505 (2016)","journal-title":"Mob. Netw. Appl."},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Lo, C.C., Huang, C.C., Ku, J.: A cooperative intrusion detection system framework for cloud computing networks. In: 2010 39th International Conference on Parallel Processing Workshops, pp. 280\u2013284. IEEE (2010)","DOI":"10.1109\/ICPPW.2010.46"},{"key":"5_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77265-3","volume-title":"Intrusion detection systems","author":"R Pietro Di","year":"2008","unstructured":"Di Pietro, R., Mancini, L.V.: Intrusion detection systems, vol. 38. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-0-387-77265-3"},{"issue":"2","key":"5_CR21","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/MCOM.2018.1700332","volume":"56","author":"A Abeshu","year":"2018","unstructured":"Abeshu, A., Chilamkurti, N.: Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun. Mag. 56(2), 169\u2013175 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-319-46301-8_23","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems","author":"T Kovanen","year":"2016","unstructured":"Kovanen, T., David, G., H\u00e4m\u00e4l\u00e4inen, T.: Survey: intrusion detection systems in encrypted traffic. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN\/ruSMART -2016. LNCS, vol. 9870, pp. 281\u2013293. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46301-8_23"},{"issue":"10","key":"5_CR23","doi-asserted-by":"publisher","first-page":"3492","DOI":"10.3390\/s18103492","volume":"18","author":"S Sciancalepore","year":"2018","unstructured":"Sciancalepore, S., Oligeri, G., Di Pietro, R.: Strength of crowd (SOC)\u2013defeating a reactive jammer in IoT with decoy messages. Sensors 18(10), 3492 (2018). Special Issue on Emerging Methodologies and Practical Solutions for M2M and D2D Communications in the Internet of Things Era","journal-title":"Sensors"},{"issue":"4","key":"5_CR24","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1109\/COMST.2017.2717482","volume":"19","author":"Ahmet Cihat Baktir","year":"2017","unstructured":"Baktir, A.C., Ozgovde, A., Ersoy, C.: How can edge computing benefit from software-defined networking: a survey, use cases, and future directions. IEEE Commun. Surv. Tutor. 19(4), 2359\u20132391 (2017, Fourthquarter)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Caprolu, M., Raponi, S., Di Pietro, R.: Fortress: an efficient and distributed firewall for stateful data plane SDN. Secur. Commun. Netw., 16 (2019)","DOI":"10.1155\/2019\/6874592"}],"container-title":["Lecture Notes in Computer Science","Edge Computing \u2013 EDGE 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23374-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T21:31:31Z","timestamp":1721424691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-23374-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030233730","9783030233747"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23374-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EDGE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Edge Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"edge2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/theedgecomputing.org\/2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}