TY - GEN
T1 - Anomolous Behavioral Pattern Analysis for IoT Application Using Firewall
AU - Agrawal, Mayank
AU - Badhani, Preeti
AU - Tripathi, Neha
AU - Pandey, Neeraj Kumar
AU - Mishra, Amit Kumar
AU - Dumka, Ankur
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024/1/1
Y1 - 2024/1/1
N2 - As Internet of Things (IoT) devices grow in many areas, such as smart homes, healthcare, business automation, and transportation, providing a security mechanism also becomes important. This brief presents a security solution that uses electronic technology to enhance IoT applications against various cyber threats. The solution begins by identifying the unique security challenges posed by the IoT ecosystem, including device diversity, access restrictions, and communication gaps. Recognizing the important role of firewalls in network security, our approach includes firewall resources designed for IoT environments. This article includes a behavioral analysis to identify negative behavioral patterns that indicate potential security hazards resulting in threat and response. It proposes a new concept that integrates machine learning algorithms with an electronic engine to crack code. Extensive experiments have been conducted to evaluate the effectiveness of the Framework. Using IoT traffic data from various applications. The results show that it is possible to identify bad patterns, including interference of illegal equipment, unreliable information, and poor communication.
AB - As Internet of Things (IoT) devices grow in many areas, such as smart homes, healthcare, business automation, and transportation, providing a security mechanism also becomes important. This brief presents a security solution that uses electronic technology to enhance IoT applications against various cyber threats. The solution begins by identifying the unique security challenges posed by the IoT ecosystem, including device diversity, access restrictions, and communication gaps. Recognizing the important role of firewalls in network security, our approach includes firewall resources designed for IoT environments. This article includes a behavioral analysis to identify negative behavioral patterns that indicate potential security hazards resulting in threat and response. It proposes a new concept that integrates machine learning algorithms with an electronic engine to crack code. Extensive experiments have been conducted to evaluate the effectiveness of the Framework. Using IoT traffic data from various applications. The results show that it is possible to identify bad patterns, including interference of illegal equipment, unreliable information, and poor communication.
KW - Behavioral Analysis
KW - IoT Application
KW - IoT Ecosystem
KW - Malware
UR - http://www.scopus.com/inward/record.url?scp=85211162655&partnerID=8YFLogxK
U2 - 10.1109/ICEECT61758.2024.10738909
DO - 10.1109/ICEECT61758.2024.10738909
M3 - Conference contribution
AN - SCOPUS:85211162655
T3 - 2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
BT - 2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
PB - Institute of Electrical and Electronics Engineers
T2 - 2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
Y2 - 29 August 2024 through 31 August 2024
ER -