April 2023 Issue Vol.13 No.4
AN ANALYSIS AND OVERVIEW ON CYBERSECURITY IN IOT NETWORKS USING MACHINELEARNING
https://ia600507.us.archive.org/26/items/ijitce-apr-2023/IJITCE_Apr2023.pdf
Mrs. Kalpana Chittor S
Research Scholar, School of Science Studies,
CMR University, Bangalore,India
Dr Chitra Ravi
Director & Professor, SOSS, OMBR Layout,
CMR University, Bangalore,India
Abstract: The network models evolved over a long period; the next generation network is the IoT (Internet of Things).IoT is nothing but intelligent connectivity between plenty of devices. IoT derives huge gains in many of the ubiquitous applications like smart health, smart transport, smart city, and smart home. Its vision is to support every walk of life including agriculture, and factory automation as a part of the industrial revolution and in diverse fields. Thus, the IoT network will be a lifeline for the future digital system. However, every system has vulnerabilities due to its architectural design and characteristics. These vulnerabilities assist and attract attackers to plan their strategies. The threats and risks due to attacks on the IoT application and network can cause a serious effect on both users as well as service providers, not only financially but sometimes fatal too. Therefore, it is an essential research issue to put focus on the security features of IoT. The emerging trend of intelligent technologies like SDN (Software Defined Networking), DL (Deep Learning), AI (Artificial Intelligence), and ML (Machine Learning) is attracting widespread attention in the research community for addressing various security issues in the wireless network system. Machine learning and deep learning techniques are robust technologies that have the capability of data exploration and learning. The solution developed based on machine learning collects data from the sensor nodes and based on their capability, it classifies the normal and abnormal pattern of the traffic flow in the network as well as the behavior of networking and information sensing devices according to how devices interact with each other within the IoT ecosystem
Keywords: Internet of Things (IoT), IoT Platforms,IoT Attacks, Authentication, Datasets,Technological Providers