DETECTION OF EXTERNAL INTERVENTIONS IN THE INTERNET OF THINGS
DETECTION OF EXTERNAL INTERVENTIONS IN THE INTERNET OF THINGS
Author(s): Namazov Asim TahirSubject(s): Education, General Reference Works, Business Economy / Management
Published by: Regional Department of Defense Resources Management Studies
Keywords: IoT; gateway; attack; security;
Summary/Abstract: The importance of ensuring the security of Internet of Things (IoT) devices is just as crucial as accelerating the implementation process of IoT. Like other devices, IoT devices can be vulnerable to various types of attacks over the internet. To identify these attacks, attention should be paid to the system itself and the activity sequence of certain resources. This article discusses various types of security solutions for IoT devices. Additionally, a new solution is proposed to identify the potential impact of IoT devices. The experiments conducted using a Mikrotik router as a gateway have shown that it is possible to detect cyber attacks by monitoring the device's internal resources for various activities. Login attempts using different usernames were recorded in the router's logs and the processor's jump activity was monitored to identify metrics indicating potential attacks based on increased sequential jumps. An algorithm was developed using these metrics, and a program was written in Python to detect cyber attack threats against the device.
Journal: Journal of Defense Resources Management (JoDRM)
- Issue Year: 14/2023
- Issue No: 2
- Page Range: 97-106
- Page Count: 10
- Language: English