Design of Enterprise Data Security Management Based on IoT and CNN
In the era of rapid digital transformation, enterprise data security faces increasingly complex and dynamic threats. Traditional defense mechanisms are complicated to effectively respond to real-time risks, mainly when enterprises rely extensively on Internet of Things (IoT) devices. To address this problem, this paper proposes and implements a dynamic intelligent security assessment and early warning system based on ResNet-50 architecture and IoT technology. The system builds a distributed IoT data collection platform to collect multi-source data such as network traffic, device status changes, and user behavior in real time. It uses the optimized ResNet-50 model to analyze high-dimensional heterogeneous data streams accurately. The system is deployed in a cloud computing environment and can process large-scale data with low latency. It can instantly detect abnormal activities, conduct threat assessment, and issue alerts based on contextual information. Experimental results show that the system has an accuracy rate of 98.6% for distributed denial of service (DDoS) attacks and 96.2% for malware data leaks, with an average response time of 1.03 seconds, significantly better than traditional detection methods. This study provides an efficient and scalable solution for enterprise data security protection and lays a foundation for further integrating AI-driven models with IoT infrastructure.
- Research Article
267
- 10.1109/access.2021.3073408
- Jan 1, 2021
- IEEE Access
Internet of Things (IoT) technology is prospering and entering every part of our lives, be it education, home, vehicles, or healthcare. With the increase in the number of connected devices, several challenges are also coming up with IoT technology: heterogeneity, scalability, quality of service, security requirements, and many more. Security management takes a back seat in IoT because of cost, size, and power. It poses a significant risk as lack of security makes users skeptical towards using IoT devices. This, in turn, makes IoT vulnerable to security attacks, ultimately causing enormous financial and reputational losses. It makes up for an urgent need to assess present security risks and discuss the upcoming challenges to be ready to face the same. The undertaken study is a multi-fold survey of different security issues present in IoT layers: perception layer, network layer, support layer, application layer, with further focus on Distributed Denial of Service (DDoS) attacks. DDoS attacks are significant threats for the cyber world because of their potential to bring down the victims. Different types of DDoS attacks, DDoS attacks in IoT devices, impacts of DDoS attacks, and solutions for mitigation are discussed in detail. The presented review work compares Intrusion Detection and Prevention models for mitigating DDoS attacks and focuses on Intrusion Detection models. Furthermore, the classification of Intrusion Detection Systems, different anomaly detection techniques, different Intrusion Detection System models based on datasets, various machine learning and deep learning techniques for data pre-processing and malware detection has been discussed. In the end, a broader perspective has been envisioned while discussing research challenges, its proposed solutions, and future visions.
- Research Article
9
- 10.3390/s21216983
- Oct 21, 2021
- Sensors (Basel, Switzerland)
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to apply existing security solutions to IoT devices. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are increasing every year. The most representative is the Mirai malware that caused distributed denial of service (DDoS) attacks by creating a massive IoT botnet. Moreover, Mirai malware has been released on the Internet, resulting in increasing variants and new malicious codes. One of the ways to mitigate distributed denial of service attacks is to render the creation of massive IoT botnets difficult by preventing the spread of malicious code. For IoT infrastructure security, security solutions are being studied to analyze network packets going in and out of IoT infrastructure to detect threats, and to prevent the spread of threats within IoT infrastructure by dynamically controlling network access to maliciously used IoT devices, network equipment, and IoT services. However, there is a great risk to apply unverified security solutions to real-world environments. In this paper, we propose a malware simulation tool that scans vulnerable IoT devices assigned a private IP address, and spreads malicious code within IoT infrastructure by injecting malicious code download command into vulnerable devices. The malware simulation tool proposed in this paper can be used to verify the functionality of network threat detection and prevention solutions.
- Research Article
1
- 10.48175/ijarsct-3877
- May 20, 2022
- International Journal of Advanced Research in Science, Communication and Technology
Internet of Things (IoT) technology provides the basic infrastructure for a hyper connected society where all things are connected and exchange information through the Internet. IoT technology is fused with 5G and artificial intelligence (AI) technologies for use various fields such as the smart city and smart factory. As the demand for IoT technology increases, security threats against IoT infrastructure, applications, and devices have also increased. A variety of studies have been conducted on the detection of IoT malware to avoid the threats posed by malicious code. While existing models may accurately detect malicious IoT code identified through static analysis, detecting the new and variant IoT malware quickly being generated may become challenging. Due to the complexity of design and implementation in both hardware and software, as well as the lack of security functions and abilities, IoT devices are becoming an attractive target for cyber criminals who take advantage of weak authentication, outdated firmware’s , and malwares to compromise IoT devices .This project provides the light on the system named as malware classification and detection of IOT devices, used to detect the cyber-attacks caused by malware on IOT devices by using machine learning techniques. The malware classification and detection system detect and identifies the various types of malwares using static analysis with the help of machine learning algorithm. An easy-to-use user interface for easy uploading of files and checking for virus is designed. Also, acceptance testing is performed on the application to remove vulnerabilities.
- Research Article
59
- 10.1111/poms.13615
- Mar 1, 2022
- Production and Operations Management
Internet of Things (IoT) technology utilizes sensors and other internet‐enabled devices to collect and share data. It is widely regarded as a disruptive technology that brings tremendous opportunities to supply chain members. This study uses a game‐theoretical model to study an e‐commerce setting in which an online platform provides IoT infrastructure and a manufacturer sells its products on the platform. Our work examines the interaction among the manufacturer's IoT investment decision, the platform's choice of pricing models, and the platform's transfer payment strategy. We solve the model analytically and obtain several interesting findings. Our study shows that the manufacturer in a wholesale pricing model is more likely to invest, and invests more, in IoT technology than in an agency one. One surprising finding is that both the manufacturer and the channel performance could be hurt by an increase in IoT technology value in certain situations. Also surprisingly, even having the option of investing in IoT technology by the manufacturer can make both the manufacturer and the channel performance worse off. Therefore, the advancement of IoT technology might not benefit either manufacturers or the whole industry, although e‐commerce platform giants and the news media have been advocating the benefits of IoT technology enthusiastically in recent years. Our results should concern both device manufacturers who contemplate adopting or have adopted IoT technology and policymakers who are interested in overall channel performance.
- Book Chapter
5
- 10.1201/9781003283003-10
- Dec 9, 2022
The Internet of Things (IoT) does not require human involvement to function. Sensors collect, communicate, analyze, and act on data as part of the IoT, providing new opportunities for technology, media, and telecommunications companies to produce value. For example, consider a garage door opener that can also deactivate the home alarm system as you enter. This is a useful function for a homeowner who needs to get into their house quickly. However, if the garage door opener is compromised, the complete alarm system may now be disarmed. TVs, home thermostats, door locks, home alarms, smart home hubs, and garage door openers, to mention a few, present a plethora of connection points for hackers to gain access to IoT ecosystems, access customer data, and even enter manufacturers' backend systems.IoT technology-based devices are becoming popular worldwide very quickly. The pervasiveness of the IoT, which is defined by its diversity, heterogeneity, and complexity, is blurring the boundaries between the physical and digital worlds. The presence of IoT technology in the business world cannot be ignored, hence the attacks and threats on IoT devices, too. Such attacks or crimes are increasing day by day. The IoT offers new ways for businesses to create value; however, the constant connectivity and data sharing also create new opportunities for information to be compromised.Cyber criminals have become a major threat to the government and business infrastructures all over the globe and are destroying these infrastructures through their criminal behaviors. Cyberattacks over IoT devices and systems are affecting the lives of users, so looking into solutions is mandatory now. Secure IoT is the need of the hour, and understanding of attacks and threats in the IoT structure should be common knowledge.Because IoT is so widely used, it makes it an ideal breeding ground for cyberattacks. The IoT infrastructure can be used as a tool to carry out a cyberattack or used as a direct target in a cyberattack. In either case, the IoT infrastructure's security is threatened. IoT forensics supports investigators in gaining intelligence from smart infrastructure in order to reconstruct historical occurrences. Due to the sophisticated IoT architecture, digital investigators face numerous obstacles when conducting IoT-related investigations using current investigation methodology, necessitating the creation of a new dedicated forensic framework.This chapter consists of the below mentioned topics and subtopics to discuss IoT technologies, IoT's main features, security challenges, proposed security solutions, and how IoT allows cybercrimes to happen. The chapter also explains digital forensics as well as IoT forensics before concluding the chapter.
- Research Article
32
- 10.1002/ett.4758
- Mar 14, 2023
- Transactions on Emerging Telecommunications Technologies
The Internet of Things (IoT) is connecting more devices every day. Security is critical to ensure that the devices operate in a trusted environment. The lack of proper IoT security encourages cybercriminals to target many smart devices across the network and gain sensitive information. Distributed Denial of Service (DDoS) attacks are common in the IoT infrastructure and involve hijacking IoT devices to consume resources and interrupt services. This may specifically vandalize the application running the service that the end users are trying to access (application layer DDoS attacks) or flood the network bandwidth leading to network failure (software defined network DDoS attacks). This article proposes a hybrid attention‐based bidirectional long short term memory (LSTM) with convolutional neural networks (CNN) to identify DDoS attacks in the application layer and SDN. We deploy several other machine learning models like logistic regression, decision trees, random forests, support vector machines, K‐nearest neighbors, extreme gradient boosting, artificial neural networks, CNN, LSTM, CNN‐LSTM to evaluate the performance of our proposed model. The evaluation metrics considered for the study are accuracy, precision, recall, and F‐1 score. The experimental analysis on multiple datasets exhibits that the proposed model performs the classification efficiently with an accuracy of 99.74% and 99.98%.
- Research Article
149
- 10.1109/access.2020.2995887
- Jan 1, 2020
- IEEE Access
Internet of Things (IoT) technology provides the basic infrastructure for a hyper connected society where all things are connected and exchange information through the Internet. IoT technology is fused with 5G and artificial intelligence (AI) technologies for use various fields such as the smart city and smart factory. As the demand for IoT technology increases, security threats against IoT infrastructure, applications, and devices have also increased. A variety of studies have been conducted on the detection of IoT malware to avoid the threats posed by malicious code. While existing models may accurately detect malicious IoT code identified through static analysis, detecting the new and variant IoT malware quickly being generated may become challenging. This paper proposes a dynamic analysis for IoT malware detection (DAIMD) to reduce damage to IoT devices by detecting both well-known IoT malware and new and variant IoT malware evolved intelligently. The DAIMD scheme learns IoT malware using the convolution neural network (CNN) model and analyzes IoT malware dynamically in nested cloud environment. DAIMD performs dynamic analysis on IoT malware in a nested cloud environment to extract behaviors related to memory, network, virtual file system, process, and system call. By converting the extracted and analyzed behavior data into images, the behavior images of IoT malware are classified and trained in the Convolution Neural Network (CNN). DAIMD can minimize the infection damage of IoT devices from malware by visualizing and learning the vast amount of behavior data generated through dynamic analysis.
- Research Article
15
- 10.3390/electronics11233892
- Nov 24, 2022
- Electronics
The Internet of Things (IoT) is a network of sensors that helps collect data 24/7 without human intervention. However, the network may suffer from problems such as the low battery, heterogeneity, and connectivity issues due to the lack of standards. Even though these problems can cause several performance hiccups, security issues need immediate attention because hackers access vital personal and financial information and then misuse it. These security issues can allow hackers to hijack IoT devices and then use them to establish a Botnet to launch a Distributed Denial of Service (DDoS) attack. Blockchain technology can provide security to IoT devices by providing secure authentication using public keys. Similarly, Smart Contracts (SCs) can improve the performance of the IoT–blockchain network through automation. However, surveyed work shows that the blockchain and SCs do not provide foolproof security; sometimes, attackers defeat these security mechanisms and initiate DDoS attacks. Thus, developers and security software engineers must be aware of different techniques to detect DDoS attacks. In this survey paper, we highlight different techniques to detect DDoS attacks. The novelty of our work is to classify the DDoS detection techniques according to blockchain technology. As a result, researchers can enhance their systems by using blockchain-based support for detecting threats. In addition, we provide general information about the studied systems and their workings. However, we cannot neglect the recent surveys. To that end, we compare the state-of-the-art DDoS surveys based on their data collection techniques and the discussed DDoS attacks on the IoT subsystems. The study of different IoT subsystems tells us that DDoS attacks also impact other computing systems, such as SCs, networking devices, and power grids. Hence, our work briefly describes DDoS attacks and their impacts on the above subsystems and IoT. For instance, due to DDoS attacks, the targeted computing systems suffer delays which cause tremendous financial and utility losses to the subscribers. Hence, we discuss the impacts of DDoS attacks in the context of associated systems. Finally, we discuss Machine-Learning algorithms, performance metrics, and the underlying technology of IoT systems so that the readers can grasp the detection techniques and the attack vectors. Moreover, associated systems such as Software-Defined Networking (SDN) and Field-Programmable Gate Arrays (FPGA) are a source of good security enhancement for IoT Networks. Thus, we include a detailed discussion of future development encompassing all major IoT subsystems.
- Research Article
7
- 10.1016/j.iot.2023.100976
- Nov 3, 2023
- Internet of Things
Flow and unified information-based DDoS attack detection system for multi-topology IoT networks
- Book Chapter
6
- 10.1007/978-3-030-14647-4_1
- Jan 1, 2021
The Internet of Things (IoT) has been adopted by several areas of society, such as smart transportation systems, smart cities, smart agriculture, smart energy, and smart healthcare. Healthcare is an area that takes a lot of benefits from IoT technology (composing the Internet of Medical Things (IoMT)) since low-cost devices and sensors can be used to create medical assistance systems, reducing the deployment and maintenance costs, and at the same time, improving the patients and their family quality of life. However, only IoT is not able to support the complexity of e-health applications. For instance, sensors can generate a large amount of data, and IoT devices do not have enough computational capabilities to process and store these data. Thus, the cloud and fog technologies emerge to mitigate the IoT limitations, expanding the IoMT applications capacities. Cloud computing provides virtually unlimited computational resources, while fog pushes the resources closest to the end-users, reducing the data transfer latency. Therefore, the IoT, fog, and cloud computing integration provides a robust environment for e-health systems deployment, allowing plenty of different types of IoMT applications. In this paper, we conduct a systematic mapping with the goal to overview the current state-of-the-art in IoMT applications using IoT, fog, and cloud infrastructures.
- Research Article
- 10.32473/flairs.38.1.138690
- May 14, 2025
- The International FLAIRS Conference Proceedings
The denial of service (DoS) and distributed denial of service (DDoS) attacks are considered the most frequent attacks targeting the Internet of Things (IoT) network infrastructure globally. The current approaches for detecting DoS and DDoS attacks mainly use intrusion detection systems, traffic monitoring, and firewalls. However, complex DoS and DDoS attacks can bypass these detection mechanisms. Thus, this paper proposes utilizing convolutional neural network-based transfer learning to detect DoS and DDoS attacks from converted network traffic data into images. We employed the Xception model with fine-tuning, and we achievedan average of 91% accuracy in detecting eleven different types of DoS and DDoS attacks, which is higher than the current state-of-the-art by 5% targeting the same task.
- Research Article
32
- 10.3390/app11030929
- Jan 20, 2021
- Applied Sciences
Software-Defined Networking (SDN) and Internet of Things (IoT) are the trends of network evolution. SDN mainly focuses on the upper level control and management of networks, while IoT aims to bring devices together to enable sharing and monitoring of real-time behaviours through network connectivity. On the one hand, IoT enables us to gather status of devices and networks and to control them remotely. On the other hand, the rapidly growing number of devices challenges the management at the access and backbone layer and raises security concerns of network attacks, such as Distributed Denial of Service (DDoS). The combination of SDN and IoT leads to a promising approach that could alleviate the management issue. Indeed, the flexibility and programmability of SDN could help in simplifying the network setup. However, there is a need to make a security enhancement in the SDN-based IoT network for mitigating attacks involving IoT devices. In this article, we discuss and analyse state-of-the-art DDoS attacks under SDN-based IoT scenarios. Furthermore, we verify our SDN sEcure COntrol and Data plane (SECOD) algorithm to resist DDoS attacks on the real SDN-based IoT testbed. Our results demonstrate that DDoS attacks in the SDN-based IoT network are easier to detect than in the traditional network due to IoT traffic predictability. We observed that random traffic (UDP or TCP) is more affected during DDoS attacks. Our results also show that the probability of a controller becoming halt is 10%, while the probability of a switch getting unresponsive is 40%.
- Research Article
35
- 10.3390/s22103819
- May 18, 2022
- Sensors (Basel, Switzerland)
The 5G networks aim to realize a massive Internet of Things (IoT) environment with low latency. IoT devices with weak security can cause Tbps-level Distributed Denial of Service (DDoS) attacks on 5G mobile networks. Therefore, interest in automatic network intrusion detection using machine learning (ML) technology in 5G networks is increasing. ML-based DDoS attack detection in a 5G environment should provide ultra-low latency. To this end, utilizing a feature-selection process that reduces computational complexity and improves performance by identifying features important for learning in large datasets is possible. Existing ML-based DDoS detection technology mostly focuses on DDoS detection learning models on the wired Internet. In addition, studies on feature engineering related to 5G traffic are relatively insufficient. Therefore, this study performed feature selection experiments to reduce the time complexity of detecting and analyzing large-capacity DDoS attacks in real time based on ML in a 5G core network environment. The results of the experiment showed that the performance was maintained and improved when the feature selection process was used. In particular, as the size of the dataset increased, the difference in time complexity increased rapidly. The experiments show that the real-time detection of large-scale DDoS attacks in 5G core networks is possible using the feature selection process. This demonstrates the importance of the feature selection process for removing noisy features before training and detection. As this study conducted a feature study to detect network traffic passing through the 5G core with low latency using ML, it is expected to contribute to improving the performance of the 5G network DDoS attack automation detection technology using AI technology.
- Supplementary Content
71
- 10.3390/s20113078
- May 29, 2020
- Sensors (Basel, Switzerland)
The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday objects. The facilities provided by the IoT infrastructure allow the development of a wide range of new business models and applications (e.g., smart homes, smart cities, or e-health). However, there are still concerns over the security measures which need to be addressed to ensure a suitable deployment. Distributed Denial of Service (DDoS) attacks are among the most severe virtual threats at present and occur prominently in this scenario, which can be mainly owed to their ease of execution. In light of this, several research studies have been conducted to find new strategies as well as improve existing techniques and solutions. The use of emerging technologies such as those based on the Software-Defined Networking (SDN) paradigm has proved to be a promising alternative as a means of mitigating DDoS attacks. However, the high granularity that characterizes the IoT scenarios and the wide range of techniques explored during the DDoS attacks make the task of finding and implementing new solutions quite challenging. This problem is exacerbated by the lack of benchmarks that can assist developers when designing new solutions for mitigating DDoS attacks for increasingly complex IoT scenarios. To fill this knowledge gap, in this study we carry out an in-depth investigation of the state-of-the-art and create a taxonomy that describes and characterizes existing solutions and highlights their main limitations. Our taxonomy provides a comprehensive view of the reasons for the deployment of the solutions, and the scenario in which they operate. The results of this study demonstrate the main benefits and drawbacks of each solution set when applied to specific scenarios by examining current trends and future perspectives, for example, the adoption of emerging technologies based on Cloud and Edge (or Fog) Computing.
- Research Article
70
- 10.1109/access.2022.3188311
- Jan 1, 2022
- IEEE Access
Internet of Things (IoT) is characterized as one of the leading actors for the next evolutionary stage in the computing world. IoT-based applications have already produced a plethora of novel services and are improving the living standard by enabling innovative and smart solutions. However, along with its rapid adoption, IoT technology also creates complex challenges regarding the management of IoT networks due to its resource limitations (computational power, energy, and security). Hence, it is urgently needed to refine the IoT-based application’s architectures to robustly manage the overall IoT infrastructure. Software-defined networking (SDN) has emerged as a paradigm that offers software-based controllers to manage hardware infrastructure and traffic flow on a network effectively. SDN architecture has the potential to provide efficient and reliable IoT network management. This research provides a comprehensive survey investigating the published studies on SDN-based frameworks to address IoT management issues in the dimensions of fault tolerance, energy management, scalability, load balancing, and security service provisioning within the IoT networks. We conducted a Systematic Literature Review (SLR) on the research studies (published from 2010 to 2022) focusing on SDN-based IoT management frameworks. We provide an extensive discussion on various aspects of SDN-based IoT solutions and architectures. We elaborate a taxonomy of the existing SDN-based IoT frameworks and solutions by classifying them into categories such as network function virtualization, middleware, OpenFlow adaptation, and blockchain-based management. We present the research gaps by identifying and analyzing the key architectural requirements and management issues in IoT infrastructures. Finally, we highlight various challenges and a range of promising opportunities for future research to provide a roadmap for addressing the weaknesses and identifying the benefits from the potentials offered by SDN-based IoT solutions.
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.