Название: Machine Learning Approach for Cloud Data Analytics in IoT
Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Жанр: Программы
isbn: 9781119785859
isbn:
30. Sujatha, R., Nathiya, S., Chatterjee, J.M., Clinical Data Analysis Using IoT Data Analytics Platforms, in: Internet of Things Use Cases for the Healthcare Industry, pp. 271–293, Springer, Cham, 2020.
31. Priya, G., Shri, M.L., GangaDevi, E., Chatterjee, J.M., IoT Use Cases and Applications, in: Internet of Things Use Cases for the Healthcare Industry, pp. 205–220, Springer, Cham, 2020.
32. Raj, P., Chatterjee, J.M., Kumar, A., Balamurugan, B., Internet of Things Use Cases for the Healthcare Industry, Springer International Publishing, India, 2020.
33. Garg, S., Chatterjee, J.M., Le, D.N., Implementation of Rest Architecure-Based Energy-Efficient Home Automation System, Security Designs for the Cloud, Iot, and Social Networking, 143–152, 2019.
34. Almusaylim, Z.A. and Zaman, N., A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wireless networks, 25, 6, 3193–3204, 2019.
35. Almulhim, M. and Zaman, N., Proposing secure and lightweight authentication scheme for IoT based E-health applications. 2018 20th International Conference on Advanced Communication Technology (ICACT), IEEE, pp. 481–487, 2018, February.
36. Almulhim, M., Islam, N., Zaman, N., A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications. Int. J. Comput. Sci. Netw. Secur., 19, 1, 107–120, 2019.
37. Alshammari, M.O., Almulhem, A.A., Zaman, N., Internet of Things (IoT): Charity Automation. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 8, 2, 166–170, 2017.
38. Mangla, M. and Sharma, N., Fuzzy Modelling of Clinical and Epidemiological Factors for COVID-19, Research Square, 1, 1–15, 2020.
39. Potluri, S., An IoT based solution for health monitoring using a body-worn sensor enabled device. JARDCS, 10, 9, 646–651, 2018.
40. Potluri, S., Health record data analysis using wireless wearable technology device. JARDCS, 10, 9, 696–701, 2018.
1 *Corresponding author: [email protected]
2
Machine Learning for Cyber-Immune IoT Applications
Suchismita Sahoo1* and Sushree Sangita Sahoo2
1Biju Patnaik University of Technology, Rourkela, India
2Department of Computer, St. Paul’s School (ICSE), Rourkela, India
Abstract
Today’s era, which is being ruled by Internet of Things (IoT) or the reformation; being the Internet of Everything, has combined various technological affirmations with it. But along with its deployment, it is also undergoing malicious threats to compromise on the security issues of the IoT devices with high priority over the cloud, hence proving to be the weakest link of today’s computational intelligence infrastructure. Digital network security issue has become the desperate need of the hour to combat cyber attack. Although there have been various learning methods which have made break through, this chapter focuses on machine learning being used in cyber security to deal with spear phishing and corrosive malwares detection and classification. It also looks for the ways to exploit vulnerabilities in this domain which is invading the training data sets with power of artificial intelligence. Cloud being an inherent evolution, so as to deal with these issues, this chapter will be an approach to establish an interactive network, cognitively intervening the domains of cyber security services to the computational specifications of IoT.
Keywords: Cyber security, machine learning, malware detection, classification
2.1 Introduction
This chapter is structured with an overview that “It’s only when they go wrong that machines remind you how powerful they are” by Clive James.
The major concern of these days is digital security, which is at its heights; this is because the era is becoming digitech uninterrupted exponentially. At the same time, our customizable environment becoming dynamic and scalable with its inevitable warehouse differentiated as cloud computing is one of the major concerns. Cyber security can be applied upon to attain the grip over this digital surface, whereby the veritable exposure of various machines on the web provides an area for hackers in committing frauds, which we name it as cybercrime with an internet intervention being globally at 3.9 million users across the world as per the recent news of 2020 in BBC, has aired up the opportunity for cybercrime exponentially. It is a multi-disciplinary prevention where it spans IoT through it by constantly evolving some active processes like minimizing or preventing its impact by cyber security. There exist a large number of serious issues related to the frightening situations in the growth of IoT, specifically in ground of security, privacy, and, furthermore, in all the aspects in technical environment to relocate the concerned areas which have started to move on with a rapid pace. As of need of the hour, our study also focuses on forming it as a basic entity of every design attribute for each of the related database of the electronic data transfer, so that the world could rely upon the technology as a potential of enriched dimension to take over the world with the striding facts of accessing IoT with relevance to secured encryption routes over the cloud and its associated tech facts. This secure revolution may be tough in its approach but will definitely be a renaissance.
It is a matter of great concern that, as we are progressively moving ahead with highly advanced computing technologies being deduced over internet, at the same time, the perception that is being provoked upon the security risks hovering over World Wide Web is a matter to be explored. Several encryption technologies are fuelling the online gambling and fraudulence, which is hampering the transformation of secret messages over internet.
Hence, to fine-tune the exploitation and get a makeover, the concept of cyber security needs to be embedded into the interoperability of the impaction presumption in such a way that security is restored at proactive way. Cyber security demonstrates the coaxial control over the offending activity congruency supporting the formal anticipation of stronger IT skills, suggesting the vulnerable access to the World Wide Web in increasingly analyzing the threats, and significantly making an attempt to secure usage and integration of digital information. With this being the most debated, recently, machine learning is able to resolve the conflict and can enormously bypass the network structure and work over the latest digital infrastructure.
2.2 Some Associated Impactful Terms
2.2.1 IoT
It can be enumerated in a sense of a sensible system of interrelated computing mediums along w ith association of electronic, mechanical, and digital machines that were built up with unique identifiers and its capability to get on over the network for transferring data without the intervention among the human beings as well as in between the users and computer.
It also can be noted as a perfect definition of a large range of globally connected devices of many forms starting from a sensor to that of smart phones and even beyond these.
The IoT has come СКАЧАТЬ