IoT cybersecurity based smart home intrusion prevention system

F James - 2019 3rd Cyber Security in Networking Conference …, 2019 - ieeexplore.ieee.org
F James
2019 3rd Cyber Security in Networking Conference (CSNet), 2019ieeexplore.ieee.org
The Internet of Things (IoT) devices are becoming more popular in various domains such as
e-Home, e-Health, e-Commerce, e-banking, e-Enterprises, e-Learning and e-Trafficking.
The IoT is not only connecting computer and mobile devices, it also interconnects smart
homes, buildings, companies and cities. With increased deployment of IoT devices in
domestic smart home environment, the threats and challenges also need to be addressed in
order to improve and build a secure and resilient cybersecurity based IoT smart …
The Internet of Things (IoT) devices are becoming more popular in various domains such as e-Home, e-Health, e-Commerce, e-banking, e-Enterprises, e-Learning and e-Trafficking. The IoT is not only connecting computer and mobile devices, it also interconnects smart homes, buildings, companies and cities.With increased deployment of IoT devices in domestic smart home environment, the threats and challenges also need to be addressed in order to improve and build a secure and resilient cybersecurity based IoT smart infrastructure. Moreover, IoT smart environment tackles more security issues than traditional computer networks usually do. While many researchers are trying to explore the security challenges and open problems in smart home based IoT infrastructure, there is a lack of a systematic study of the security challenges in the IoT cybersecurity landscape. However, Smart home environment and IoT services will introduce significant security challenges due to the substantial increase in the number of computing resources, attack surface, communications infrastructure and attack rates. In this paper, we intent to fulfil this gap by executing the IoT cybersecurity-based attacks to detect the most critical attacks for smart home IoT end devices. At the same time, we present our intrusion prevention system methodology in order to protect the affected system from future attacks.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果