The recent data analytics approach can solve various security threats by boosting the overall infrastructure. According to Beulah Samuel, A student of Penn State Campus information science and technology program, by 2020 more than 20 million IoT devices will be operational which will leave a vulnerable state for people by putting their personal data at risk. He further added, as of now there is no other strategy to that can identify when a network will be attacked by a probable threat.
Their team applied a combination of techniques that can be used over a traditional network security management to a network that is backed by latest techniques of Internet of Things (IoT). It will enhance the overall security infrastructure. In order to achieve that they used intrusion detection along with a visualization tool through which they will determine upcoming attack and can be progressed through the current network.
This group of researchers explained their approach and data in a paper which was presented in the 2019 IEEE Ubiquitous Computing, Electronics and Mobile Communication Conference. One of the worth mentioning data analysis techniques was the open source that the team leveraged with freely available R statistical suite. This system is used to identify the IoT systems within the Canberra network. They have also used Machine learning (ML) to understand various patterns in the existing data.
This group of researchers used Splunk intrusion that is widely available detection tool; it enables software searching along with monitoring and network traffic analysing. One of the students, Melanie Seekins says Splunk is an analytical tool which is used traffic monitoring of traditional network, but it only has a limited application to IoT traffic until they discover this new combination to strengthen the network security.
Andrew Bandon, another student of the same group says they observed about three IP addresses attempting to attack the IoT devices more than once, using different protocol each time. It was tougher for them to specially it is a case of Distributed Denial of Service Attack, the main reason of is to disrupt and render other devices that are unavailable to the owners.
At the end, Seekins said, the power to analyse IoT data with their latest combination of techniques will enable security professionals to manage and identify the risks which can be mitigated by their technology amalgamation.
Tanaya is a Senior Content Developer at IoT Avenue who helped to build the content of the site along with several other sites with her compassionate SEO driven content. She is also a HubSpot, certified Content Marketer. She brings her five years of experience to her current role, where she is dedicated to developing the content of different websites.
by Tanaya Sadhukhan | Feb 07, 2022 | IoT News
by Tanaya Sadhukhan | Jan 07, 2022 | IoT News
by Tanaya Sadhukhan | Nov 17, 2021 | IoT News
by Tanaya Sadhukhan | Oct 27, 2021 | IoT News
by Tanaya Sadhukhan | Oct 04, 2021 | IoT News
We use cookies to provide you the best experience on our website. By continuing to use our site, you consent to the use of our cookies Find out more