Loading…

A Survey on Intrusion Detection Systems for Fog and Cloud Computing

The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hen...

Full description

Saved in:
Bibliographic Details
Published in:Future internet 2022-03, Vol.14 (3), p.89
Main Authors: Chang, Victor, Golightly, Lewis, Modesti, Paolo, Xu, Qianwen Ariel, Doan, Le Minh Thao, Hall, Karl, Boddu, Sreeja, Kobusińska, Anna
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c361t-c14974278abc2b3b8a7f2fa273595cf577e7e332953445749ea4c4a0661d9a7f3
cites cdi_FETCH-LOGICAL-c361t-c14974278abc2b3b8a7f2fa273595cf577e7e332953445749ea4c4a0661d9a7f3
container_end_page
container_issue 3
container_start_page 89
container_title Future internet
container_volume 14
creator Chang, Victor
Golightly, Lewis
Modesti, Paolo
Xu, Qianwen Ariel
Doan, Le Minh Thao
Hall, Karl
Boddu, Sreeja
Kobusińska, Anna
description The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. The goal of the security policy and framework for cloud and fog computing is to protect the end-users and their information, reduce task-based operations, aid in compliance, and create standards for expected user actions, all of which are based on the use of established rules for cloud computing. Moreover, intrusion detection systems are widely adopted solutions to monitor and analyze network traffic and detect anomalies that can help identify ongoing adversarial activities, trigger alerts, and automatically block traffic from hostile sources. This survey paper analyzes factors, including the application of technologies and techniques, which can enable the deployment of security policy on fog and cloud computing successfully. The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations. Our survey aims to provide a framework for a cloud and fog computing security policy, while addressing the required security tools, policies, and services, particularly for cloud and fog environments for organizational adoption. While developing the essential linkage between requirements, legal aspects, analyzing techniques and systems to reduce intrusion detection, we recommend the strategies for cloud and fog computing security policies. The paper develops structured guidelines for ways in which organizations can adopt and audit the security of their systems as security is an essential component of their systems and presents an agile current state-of-the-art review of intrusion detection systems and their principles. Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems. Finally, we discuss evaluation criteria and open-ended challenges in this area.
doi_str_mv 10.3390/fi14030089
format article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_0f6d1c91ca4246f6931e2b1fd1b08697</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_0f6d1c91ca4246f6931e2b1fd1b08697</doaj_id><sourcerecordid>2642393228</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-c14974278abc2b3b8a7f2fa273595cf577e7e332953445749ea4c4a0661d9a7f3</originalsourceid><addsrcrecordid>eNpNkEFLAzEQhYMoWLQXf8GCN2E1yWSTnWNZrRYKHqrnkM0mZUu7qcmu0H_v1oo6h5nH8PFmeITcMHoPgPTBt0xQoLTEMzJhiJgXSOH8n74k05Q2dCxALqWakGqWrYb46Q5Z6LJF18chtaN6dL2z_VGtDql3u5T5ELN5WGema7JqG4axh91-6NtufU0uvNkmN_2ZV-R9_vRWveTL1-dFNVvmFiTrc8sEKsFVaWrLa6hLozz3hisosLC-UMopB8CxACEKJdAZYYWhUrIGRxauyOLk2wSz0fvY7kw86GBa_b0Ica1N7Fu7dZp62TCLzBrBhfQSgTleM9-wmpYS1eh1e_Lax_AxuNTrTRhiN76vuRQcEDgvR-ruRNkYUorO_15lVB8z13-Zwxc3hXEG</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2642393228</pqid></control><display><type>article</type><title>A Survey on Intrusion Detection Systems for Fog and Cloud Computing</title><source>ABI/INFORM Global</source><source>Publicly Available Content (ProQuest)</source><creator>Chang, Victor ; Golightly, Lewis ; Modesti, Paolo ; Xu, Qianwen Ariel ; Doan, Le Minh Thao ; Hall, Karl ; Boddu, Sreeja ; Kobusińska, Anna</creator><creatorcontrib>Chang, Victor ; Golightly, Lewis ; Modesti, Paolo ; Xu, Qianwen Ariel ; Doan, Le Minh Thao ; Hall, Karl ; Boddu, Sreeja ; Kobusińska, Anna</creatorcontrib><description>The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. The goal of the security policy and framework for cloud and fog computing is to protect the end-users and their information, reduce task-based operations, aid in compliance, and create standards for expected user actions, all of which are based on the use of established rules for cloud computing. Moreover, intrusion detection systems are widely adopted solutions to monitor and analyze network traffic and detect anomalies that can help identify ongoing adversarial activities, trigger alerts, and automatically block traffic from hostile sources. This survey paper analyzes factors, including the application of technologies and techniques, which can enable the deployment of security policy on fog and cloud computing successfully. The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations. Our survey aims to provide a framework for a cloud and fog computing security policy, while addressing the required security tools, policies, and services, particularly for cloud and fog environments for organizational adoption. While developing the essential linkage between requirements, legal aspects, analyzing techniques and systems to reduce intrusion detection, we recommend the strategies for cloud and fog computing security policies. The paper develops structured guidelines for ways in which organizations can adopt and audit the security of their systems as security is an essential component of their systems and presents an agile current state-of-the-art review of intrusion detection systems and their principles. Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems. Finally, we discuss evaluation criteria and open-ended challenges in this area.</description><identifier>ISSN: 1999-5903</identifier><identifier>EISSN: 1999-5903</identifier><identifier>DOI: 10.3390/fi14030089</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Anomalies ; Cloud computing ; Communications traffic ; Cybersecurity ; Data encryption ; defense techniques ; Fog ; Information technology ; Infrastructure ; Internet ; intrusion detection and prevention ; Intrusion detection systems ; Network topologies ; Organizations ; Policies ; Prevention ; recommendations for cloud computing and security ; recommendations for network security ; security ; Software services ; Software-as-a-service ; State-of-the-art reviews ; Systems analysis</subject><ispartof>Future internet, 2022-03, Vol.14 (3), p.89</ispartof><rights>2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-c14974278abc2b3b8a7f2fa273595cf577e7e332953445749ea4c4a0661d9a7f3</citedby><cites>FETCH-LOGICAL-c361t-c14974278abc2b3b8a7f2fa273595cf577e7e332953445749ea4c4a0661d9a7f3</cites><orcidid>0000-0002-8012-5852 ; 0000-0002-2523-1847 ; 0000-0002-3501-2840 ; 0000-0001-9656-7287 ; 0000-0002-2189-335X ; 0000-0003-2863-3312</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2642393228/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2642393228?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,11668,25732,27903,27904,36039,36991,44342,44569,74642,74873</link.rule.ids></links><search><creatorcontrib>Chang, Victor</creatorcontrib><creatorcontrib>Golightly, Lewis</creatorcontrib><creatorcontrib>Modesti, Paolo</creatorcontrib><creatorcontrib>Xu, Qianwen Ariel</creatorcontrib><creatorcontrib>Doan, Le Minh Thao</creatorcontrib><creatorcontrib>Hall, Karl</creatorcontrib><creatorcontrib>Boddu, Sreeja</creatorcontrib><creatorcontrib>Kobusińska, Anna</creatorcontrib><title>A Survey on Intrusion Detection Systems for Fog and Cloud Computing</title><title>Future internet</title><description>The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. The goal of the security policy and framework for cloud and fog computing is to protect the end-users and their information, reduce task-based operations, aid in compliance, and create standards for expected user actions, all of which are based on the use of established rules for cloud computing. Moreover, intrusion detection systems are widely adopted solutions to monitor and analyze network traffic and detect anomalies that can help identify ongoing adversarial activities, trigger alerts, and automatically block traffic from hostile sources. This survey paper analyzes factors, including the application of technologies and techniques, which can enable the deployment of security policy on fog and cloud computing successfully. The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations. Our survey aims to provide a framework for a cloud and fog computing security policy, while addressing the required security tools, policies, and services, particularly for cloud and fog environments for organizational adoption. While developing the essential linkage between requirements, legal aspects, analyzing techniques and systems to reduce intrusion detection, we recommend the strategies for cloud and fog computing security policies. The paper develops structured guidelines for ways in which organizations can adopt and audit the security of their systems as security is an essential component of their systems and presents an agile current state-of-the-art review of intrusion detection systems and their principles. Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems. Finally, we discuss evaluation criteria and open-ended challenges in this area.</description><subject>Anomalies</subject><subject>Cloud computing</subject><subject>Communications traffic</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>defense techniques</subject><subject>Fog</subject><subject>Information technology</subject><subject>Infrastructure</subject><subject>Internet</subject><subject>intrusion detection and prevention</subject><subject>Intrusion detection systems</subject><subject>Network topologies</subject><subject>Organizations</subject><subject>Policies</subject><subject>Prevention</subject><subject>recommendations for cloud computing and security</subject><subject>recommendations for network security</subject><subject>security</subject><subject>Software services</subject><subject>Software-as-a-service</subject><subject>State-of-the-art reviews</subject><subject>Systems analysis</subject><issn>1999-5903</issn><issn>1999-5903</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpNkEFLAzEQhYMoWLQXf8GCN2E1yWSTnWNZrRYKHqrnkM0mZUu7qcmu0H_v1oo6h5nH8PFmeITcMHoPgPTBt0xQoLTEMzJhiJgXSOH8n74k05Q2dCxALqWakGqWrYb46Q5Z6LJF18chtaN6dL2z_VGtDql3u5T5ELN5WGema7JqG4axh91-6NtufU0uvNkmN_2ZV-R9_vRWveTL1-dFNVvmFiTrc8sEKsFVaWrLa6hLozz3hisosLC-UMopB8CxACEKJdAZYYWhUrIGRxauyOLk2wSz0fvY7kw86GBa_b0Ica1N7Fu7dZp62TCLzBrBhfQSgTleM9-wmpYS1eh1e_Lax_AxuNTrTRhiN76vuRQcEDgvR-ruRNkYUorO_15lVB8z13-Zwxc3hXEG</recordid><startdate>20220301</startdate><enddate>20220301</enddate><creator>Chang, Victor</creator><creator>Golightly, Lewis</creator><creator>Modesti, Paolo</creator><creator>Xu, Qianwen Ariel</creator><creator>Doan, Le Minh Thao</creator><creator>Hall, Karl</creator><creator>Boddu, Sreeja</creator><creator>Kobusińska, Anna</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-8012-5852</orcidid><orcidid>https://orcid.org/0000-0002-2523-1847</orcidid><orcidid>https://orcid.org/0000-0002-3501-2840</orcidid><orcidid>https://orcid.org/0000-0001-9656-7287</orcidid><orcidid>https://orcid.org/0000-0002-2189-335X</orcidid><orcidid>https://orcid.org/0000-0003-2863-3312</orcidid></search><sort><creationdate>20220301</creationdate><title>A Survey on Intrusion Detection Systems for Fog and Cloud Computing</title><author>Chang, Victor ; Golightly, Lewis ; Modesti, Paolo ; Xu, Qianwen Ariel ; Doan, Le Minh Thao ; Hall, Karl ; Boddu, Sreeja ; Kobusińska, Anna</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-c14974278abc2b3b8a7f2fa273595cf577e7e332953445749ea4c4a0661d9a7f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Anomalies</topic><topic>Cloud computing</topic><topic>Communications traffic</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>defense techniques</topic><topic>Fog</topic><topic>Information technology</topic><topic>Infrastructure</topic><topic>Internet</topic><topic>intrusion detection and prevention</topic><topic>Intrusion detection systems</topic><topic>Network topologies</topic><topic>Organizations</topic><topic>Policies</topic><topic>Prevention</topic><topic>recommendations for cloud computing and security</topic><topic>recommendations for network security</topic><topic>security</topic><topic>Software services</topic><topic>Software-as-a-service</topic><topic>State-of-the-art reviews</topic><topic>Systems analysis</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chang, Victor</creatorcontrib><creatorcontrib>Golightly, Lewis</creatorcontrib><creatorcontrib>Modesti, Paolo</creatorcontrib><creatorcontrib>Xu, Qianwen Ariel</creatorcontrib><creatorcontrib>Doan, Le Minh Thao</creatorcontrib><creatorcontrib>Hall, Karl</creatorcontrib><creatorcontrib>Boddu, Sreeja</creatorcontrib><creatorcontrib>Kobusińska, Anna</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer science database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content (ProQuest)</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Future internet</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chang, Victor</au><au>Golightly, Lewis</au><au>Modesti, Paolo</au><au>Xu, Qianwen Ariel</au><au>Doan, Le Minh Thao</au><au>Hall, Karl</au><au>Boddu, Sreeja</au><au>Kobusińska, Anna</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey on Intrusion Detection Systems for Fog and Cloud Computing</atitle><jtitle>Future internet</jtitle><date>2022-03-01</date><risdate>2022</risdate><volume>14</volume><issue>3</issue><spage>89</spage><pages>89-</pages><issn>1999-5903</issn><eissn>1999-5903</eissn><abstract>The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. The goal of the security policy and framework for cloud and fog computing is to protect the end-users and their information, reduce task-based operations, aid in compliance, and create standards for expected user actions, all of which are based on the use of established rules for cloud computing. Moreover, intrusion detection systems are widely adopted solutions to monitor and analyze network traffic and detect anomalies that can help identify ongoing adversarial activities, trigger alerts, and automatically block traffic from hostile sources. This survey paper analyzes factors, including the application of technologies and techniques, which can enable the deployment of security policy on fog and cloud computing successfully. The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations. Our survey aims to provide a framework for a cloud and fog computing security policy, while addressing the required security tools, policies, and services, particularly for cloud and fog environments for organizational adoption. While developing the essential linkage between requirements, legal aspects, analyzing techniques and systems to reduce intrusion detection, we recommend the strategies for cloud and fog computing security policies. The paper develops structured guidelines for ways in which organizations can adopt and audit the security of their systems as security is an essential component of their systems and presents an agile current state-of-the-art review of intrusion detection systems and their principles. Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems. Finally, we discuss evaluation criteria and open-ended challenges in this area.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/fi14030089</doi><orcidid>https://orcid.org/0000-0002-8012-5852</orcidid><orcidid>https://orcid.org/0000-0002-2523-1847</orcidid><orcidid>https://orcid.org/0000-0002-3501-2840</orcidid><orcidid>https://orcid.org/0000-0001-9656-7287</orcidid><orcidid>https://orcid.org/0000-0002-2189-335X</orcidid><orcidid>https://orcid.org/0000-0003-2863-3312</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1999-5903
ispartof Future internet, 2022-03, Vol.14 (3), p.89
issn 1999-5903
1999-5903
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_0f6d1c91ca4246f6931e2b1fd1b08697
source ABI/INFORM Global; Publicly Available Content (ProQuest)
subjects Anomalies
Cloud computing
Communications traffic
Cybersecurity
Data encryption
defense techniques
Fog
Information technology
Infrastructure
Internet
intrusion detection and prevention
Intrusion detection systems
Network topologies
Organizations
Policies
Prevention
recommendations for cloud computing and security
recommendations for network security
security
Software services
Software-as-a-service
State-of-the-art reviews
Systems analysis
title A Survey on Intrusion Detection Systems for Fog and Cloud Computing
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T20%3A11%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20on%20Intrusion%20Detection%20Systems%20for%20Fog%20and%20Cloud%20Computing&rft.jtitle=Future%20internet&rft.au=Chang,%20Victor&rft.date=2022-03-01&rft.volume=14&rft.issue=3&rft.spage=89&rft.pages=89-&rft.issn=1999-5903&rft.eissn=1999-5903&rft_id=info:doi/10.3390/fi14030089&rft_dat=%3Cproquest_doaj_%3E2642393228%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c361t-c14974278abc2b3b8a7f2fa273595cf577e7e332953445749ea4c4a0661d9a7f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2642393228&rft_id=info:pmid/&rfr_iscdi=true