Defending IoT against Intrusion Attack

Introduction

The demand and usage of smart things are rapidly and constantly growing over the years. Information technology companies are creating new products, services, softwares, platforms and devices that can be used in domestic situations and commercial applications. The main idea behind these innovations is to create completely innovative solutions that can be used by all, with the ultimate aim of controlling the market and creating customer intimacy. Nature by which most of these IoT products are designed it makes them vulnerable to issues to do with security, and this leads to IoT devices and services becoming targets of malicious softwares that aim to steal vital data or intrude into individual's lives. These and many other reasons have made research into this scope important because it touches on things that are expanding every day.  Darko Andročec and Neven Vrček recommended a wide option of articles that can be used on providing insights into how IoT systems and devices can be designed to defend themselves from intrusion attacks. The first article focuses on using the OpenFlow strategy, while the second one is on machine learning. The third article as suggested by Darko Andročec and Neven Vrček discusses how attacks and intrusions can be detected using SDN. The focus of the three papers is wide, but it narrows down to the issue of detecting and defending an IoT device and system from intrusions.

 

“A Host-based Intrusion Detection and Mitigation Framework for Smart Home IoT using OpenFlow” Article Summary

Technology has brought many changes and among those changes is how devices are connected over the internet prompting the Internet of Things (IoT). According to Nobakht et al. (2016), the internet of things can be used in many applications especially in automation, education, building smart homes as well as smart cities. Nobakht et al. (2016) believe that at home internet of things should be able to help in controlling and managing smart appliances within the home and in scenarios outside the home. Nobakht et al. (2016) believe that although these advancements make lives more comfortable, they are susceptible to attacks and thus the risk of bringing issues to do with security and privacy. In the words of Nobakht et al. (2016), technically savvy individuals might take advantage of this situation and create situations that could threaten the lives of individuals and their possessions. The most conversant example is how anyone from the internet can access baby monitors. Nobakht et al. (2016) say that different parameters could lead to these challenges in terms of how the IoT can be defended from intrusion. Nobakht et al. (2016) suggest that issues to do with invasion might arise as a result of insufficient authentication and authorization, insecure software and lack of encryption.

Making of IoT and related devices is becoming easy, and more of a norm and this is however not taken seriously as most methods are not secure from threats like the intrusion. According t

Pay to View the Entire Post

To view this post and other posts in this category please pay the amount below