Open Access   Article Go Back

Enhancing Cyber Security in Modern IOT Using Intrusion Prevention Algorithm for IOT

Shanthi Swaroop M.S.1 , Minavathi 2

Section:Research Paper, Product Type: Journal Paper
Volume-9 , Issue-4 , Page no. 25-29, Apr-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i4.2529

Online published on Apr 30, 2021

Copyright © Shanthi Swaroop M.S., Minavathi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shanthi Swaroop M.S., Minavathi, “Enhancing Cyber Security in Modern IOT Using Intrusion Prevention Algorithm for IOT,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.4, pp.25-29, 2021.

MLA Style Citation: Shanthi Swaroop M.S., Minavathi "Enhancing Cyber Security in Modern IOT Using Intrusion Prevention Algorithm for IOT." International Journal of Computer Sciences and Engineering 9.4 (2021): 25-29.

APA Style Citation: Shanthi Swaroop M.S., Minavathi, (2021). Enhancing Cyber Security in Modern IOT Using Intrusion Prevention Algorithm for IOT. International Journal of Computer Sciences and Engineering, 9(4), 25-29.

BibTex Style Citation:
@article{M.S._2021,
author = {Shanthi Swaroop M.S., Minavathi},
title = {Enhancing Cyber Security in Modern IOT Using Intrusion Prevention Algorithm for IOT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2021},
volume = {9},
Issue = {4},
month = {4},
year = {2021},
issn = {2347-2693},
pages = {25-29},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5321},
doi = {https://doi.org/10.26438/ijcse/v9i4.2529}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i4.2529}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5321
TI - Enhancing Cyber Security in Modern IOT Using Intrusion Prevention Algorithm for IOT
T2 - International Journal of Computer Sciences and Engineering
AU - Shanthi Swaroop M.S., Minavathi
PY - 2021
DA - 2021/04/30
PB - IJCSE, Indore, INDIA
SP - 25-29
IS - 4
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
321 460 downloads 145 downloads
  
  
           

Abstract

The IoT-(Internet of Things) is an expeditiously sprouting archetype having prospective to transmute the physical interface amid the folks & organizations. Internet of Things network ambitions to interchange ‘‘things’’ in protected and consistent method over IT-infrastructure. This Internet of Things expertise has originate submission in numerous arenas like healthcare besides privacy concerns, learning & preparation besides resource administration, material dispensation to term a limited. Though, real-world comprehension of the expertise is met copious security which to alleviated for significant effectively placement of IoT expertise. An anticipation method is planned to augment cyber safety of Internet of Things strategies and systems in contradiction of DDoS bouts which devour the band-width in contemporary IOT devices. Subsequently the systems is are wire-less & self-configuring & does not prerequisite an existing setup and partake great volatile bulge engagements, safety develops unique of greatest vigorous dispute to upstretched hooked on the interpretation. Suggested tactic is grounded on examination & inquiries of band-width bouts that predominantly emphasis arranged DDoS and is truthfully a callous encounter remains tough to perceive, besides diminutions recital of system. DDoS embraces collection of assailant bulges besides boards the prey to avert the genuine operators beginning recovering the network services & chattels. Intermission dissuasion method in the IoT strategies are events that is pickled as Supplementary of the invasion recognition scheme to aggressively shield besides avert incursions which are identified through the recognition trials of IDS. The shot which is engendered through IDS subsequently investigating echo of pathological scrutiny is ignoble of recommended process.

Key-Words / Index Term

IoT, Interruption Deterrence, IT infrastructure, DDoS, pathological investigation

References

[1] A. Mansour, M. Azab, M. R. M. Rizk and M. Abdelazim, "Biologically-inspired SDN-based Intrusion Detection and Prevention Mechanism for Heterogeneous IoT Networks," 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 2018, pp. 1120-1125, doi: 10.1109/IEMCON.2018.8614759.
[2] C. Jiang, J. Kuang and S. Wang, "Home IoT Intrusion Prevention Strategy Based on Edge Computing," 2019 IEEE 2nd International Conference on Electronics and Communication Engineering (ICECE), Xi`an, China, 2019, pp. 94-98, doi: 10.1109/ICECE48499.2019.9058536.
[3] N. Chaabouni, M. Mosbah, A. Zemmari and C. Sauvignac, "A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning," NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 2020, pp. 1-7, doi: 10.1109/NOMS47738.2020.9110473.
[4] C. Constantinides, S. Shiaeles, B. Ghita and N. Kolokotronis, "A Novel Online Incremental Learning Intrusion Prevention System," 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Canary Islands, Spain, 2019, pp. 1-6, doi: 10.1109/NTMS.2019.8763842.
[5] AHANGER, Tariq Ahamad. Defense Scheme to Protect IoT from Cyber Attacks using AI Principles. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 13, n. 6, p. 915-926, nov. 2018. ISSN 1841-9844. Available at: . Date accessed: 22 feb. 2021. doi: https://doi.org/10.15837/ijccc.2018.6.3356.
[6] T. A. Ahanger and A. Aljumah, "Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms," in IEEE Access, vol. 7, pp. 11020-11028, 2019, doi: 10.1109/ACCESS.2018.2876939.