Intrusion detection system to advance IoT security environment

Maha Abullah Al-Dhuhli, Ammar Khamis Al-Mizaini, Miysaa Salim Al-Braiki, Rajesh Natarajan
{"title":"Intrusion detection system to advance IoT security environment","authors":"Maha Abullah Al-Dhuhli, Ammar Khamis Al-Mizaini, Miysaa Salim Al-Braiki, Rajesh Natarajan","doi":"10.59461/ijitra.v2i2.48","DOIUrl":null,"url":null,"abstract":"Nowadays, with the technological improvement, communications with the things become easier. It helps people to live an easier life, live and work smarter as well as take back control of their lives completely. this smart communication is done in an environment that called Internet of Things (IoT) environment. The Internet of Thing is multiple physical objects that communicate using the internet, allowing sending, and receiving of data. Since it’s a data so it's prone to attack in a goal of steal it, change it and so many reasons.  In addition, nowadays hackers are everywhere with so many types.  So, it needs to protect those data and the devices, if Internet of Things devices doesn't have enough security to protect the system from being compromised, then many threats and attacks will occur. If the administrator does not apply strong security and develop a plan for system and device prevention, the Internet of Things environment will be weak, which will make the system and devices prone to attack. Unauthorized access will be prevented if the login system includes a signature matching system. This research aims to analyze the traffic security and analyze threats and risks using IoT devices from intruders by applying an IDS to the IoT environment. when the attacker will try to enter to the traffic or send any packets to any IoT devices, the intrusion detection system will send an alert to the administrator that there's something wrong need to check, the IDS will detect the attacker's name, type and from which device he tries to enter to the system, it will analyze the traffic system, as well as will prevent the devices and data from threats.","PeriodicalId":187267,"journal":{"name":"International Journal of Information Technology, Research and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Technology, Research and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59461/ijitra.v2i2.48","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Nowadays, with the technological improvement, communications with the things become easier. It helps people to live an easier life, live and work smarter as well as take back control of their lives completely. this smart communication is done in an environment that called Internet of Things (IoT) environment. The Internet of Thing is multiple physical objects that communicate using the internet, allowing sending, and receiving of data. Since it’s a data so it's prone to attack in a goal of steal it, change it and so many reasons.  In addition, nowadays hackers are everywhere with so many types.  So, it needs to protect those data and the devices, if Internet of Things devices doesn't have enough security to protect the system from being compromised, then many threats and attacks will occur. If the administrator does not apply strong security and develop a plan for system and device prevention, the Internet of Things environment will be weak, which will make the system and devices prone to attack. Unauthorized access will be prevented if the login system includes a signature matching system. This research aims to analyze the traffic security and analyze threats and risks using IoT devices from intruders by applying an IDS to the IoT environment. when the attacker will try to enter to the traffic or send any packets to any IoT devices, the intrusion detection system will send an alert to the administrator that there's something wrong need to check, the IDS will detect the attacker's name, type and from which device he tries to enter to the system, it will analyze the traffic system, as well as will prevent the devices and data from threats.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
入侵检测系统提升物联网安全环境
如今,随着技术的进步,与事物的交流变得更加容易。它帮助人们更轻松地生活,更聪明地生活和工作,并完全重新掌控自己的生活。这种智能通信是在称为物联网(IoT)环境的环境中完成的。物联网是使用互联网进行通信的多个物理对象,允许发送和接收数据。因为这是一个数据,所以它很容易被攻击,目的是窃取它,改变它,还有很多原因。此外,如今黑客无处不在,种类繁多。因此,它需要保护这些数据和设备,如果物联网设备没有足够的安全性来保护系统不被破坏,那么就会发生许多威胁和攻击。如果管理员不应用强大的安全措施,不制定系统和设备防护方案,物联网环境就会变得薄弱,系统和设备就容易受到攻击。如果登录系统包含签名匹配系统,则可以防止未经授权的访问。本研究旨在通过在物联网环境中应用IDS,分析物联网设备的流量安全性,并分析入侵者使用物联网设备的威胁和风险。当攻击者试图进入流量或向任何物联网设备发送任何数据包时,入侵检测系统将向管理员发送警报,提示有错误需要检查,IDS将检测攻击者的名称,类型以及他试图进入系统的设备,它将分析流量系统,以及将防止设备和数据受到威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
INCEPTION TO SENSOR AND IoT TECHNOLOGY Fully Functional Shopping Mall Application – ShopVista GENETIC ALGORITHM AND RANDOM FOREST CLASSIFIER FUSION: A CUTTING-EDGE APPROACH FOR BREAST CANCER DIAGNOSIS Applying Scrum in A Game Development Life Cycle For Small Scale Game Project SOLVING FUZZY FRACTIONAL HEAT EQUATION USING HOMOTOPY PERTURBATION SUMUDU TRANSFORM METHOD
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1