“A Host-based Intrusion Detection and Mitigation Framework for Smart Home IoT using OpenFlow” Article Summary
Technology has brought many changes and among those changes is how devices are connected over the internet prompting the Internet of Things (IoT). According to Nobakht et al. (2016), the internet of things can be used in many applications especially in automation, education, building smart homes as well as smart cities. Nobakht et al. (2016) believe that at home internet of things should be able to help in controlling and managing smart appliances within the home and in scenarios outside the home. Nobakht et al. (2016) believe that although these advancements make lives easier, they are susceptible to attacks and thus the risk of bringing issues to do with security and privacy. In the words of Nobakht et al. (2016), technically savvy individuals might take advantage of this situation and create situations that could threaten the lives of individuals and their possessions. The most conversant example is how anyone from the internet can access baby monitors. Nobakht et al. (2016) say that different parameters could lead to these challenges in terms of how the IoT can be defended from intrusion. Nobakht et al. (2016) suggest that issues to do with invasion might arise as a result of insufficient authentification and authorization, insecure software and lack of encryption.
Making of IoT and related devices is becoming easy, and more of a norm and this is however not taken seriously as most devices are not secure from threats like the intrusion. According to the study by Nobakht et al. (2016), many vulnerabilities arise with a majority of these devices, and the majority of them are directly related to intrusion. Nobakht et al. (2016) further note that regardless of how secure a system is, it can be open to these vulnerabilities of intrusion if it is not managed in the right way, thus handling and managing these Internet of Things is the first step to achieve an almost 100% zero intrusion system. In the words of Nobakht et al. (2016) analyzing home networks and infrastructure associated with these systems for signs of potential threats and security risks as well as points that could lead to intrusion is also an important step in defending the systems against intrusion. Once such systems are analyzed and threats that could lead to intrusion detected, it is necessary and right to consider effective defense mechanisms that can hamper an enemy from intruding into the privacy of people or the infrastructure itself (Nobakht et al.,2016). Nobakht et a
To view this post and other posts in this category please pay the amount below