Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 13 , Issue 2 , PP: 35-51, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Comprehensive Analysis of Implementation and Evaluation IoT based Techniques in Networked Security Systems

Raenu Kolandaisamy 1 * , Suhas Gupta 2 , Shashikant Patil 3 , Jaymeel Shah 4 , Abhinav Mishra 5 , N. Gobi 6

  • 1 Full time Student Institute of Computer Science and Digital Innovation, UCSI University, Kuala Lumpur, Malaysia - (raenu@ucsiuniversity.edu.my)
  • 2 Centre of Research Impact and Outcome, Chitkara University, Rajpura- 140417, Punjab, India - (suhas.gupta.orp@chitkara.edu.in)
  • 3 Professor, Department of uGDX, ATLAS SkillTech University, Mumbai, Maharashtra, India - (shashikant.patil@atlasuniversity.edu.in)
  • 4 Associate Professor, Department of Computer science and Engineering, Faculty of Engineering and Technology, Parul institute of Engineering and Technology, Parul University, Vadodara, Gujarat, India - (jaimeel.shah@paruluniversity.ac.in)
  • 5 Chitkara Centre for Research and Development, Chitkara University, Himachal Pradesh-174103 India - (abhinav.mishra.orp@chitkara.edu.in)
  • 6 Assistant Professor, Department of Computer Science and Information Technology, Jain (Deemed to be University), Bangalore, Karnataka, India - (gobi.n@jainuniversity.ac.in)
  • Doi: https://doi.org/10.54216/JISIoT.130203

    Received: September 24, 2023 Revised: February 07, 2024 Accepted: June 19, 2024
    Abstract

    This research introduces an advanced network security methodology based on IoT, combining five innovative algorithms: Dynamic Threat Detection (DTD), Adaptive Intrusion Prevention System (AIPS), Anomaly-Based Security Metrics (ABSM), Context-Aware Firewall (CAF), and Cognitive Security Assessment (CSA). Each algorithm contributes specific functionalities, ranging from real-time threat detection and adaptive policy adjustments to anomaly quantification, contextual rule modifications, and holistic security risk assessments. The ablation study conducted on each algorithm reveals critical components driving their performance, ensuring a deep understanding of their inner workings. The proposed method demonstrates superior performance in accuracy, scalability, usability, and adaptability compared to existing network security methods. Visual representations and a comprehensive evaluation further validate the proposed method's effectiveness, positioning it as an advanced and efficient solution for addressing evolving network security challenges.

    Keywords :

    security algorithms , threat detection , intrusion prevention, IoT , anomaly detection , firewall , cognitive assessment , machine learning , adaptive monitoring , continuous improvement , network context

    References

    [1]    J. D. Glover, M. S. Sarma, and T. Overbye, "Power System Analysis and Design," Cengage Learning, 2016.

    [2]    P. Ding, Y. Li, D. Xu, F. Tian, J. Yan, and Z. Yu, "Improved algorithm of fast static state security analysis of power systems," Proceedings of the Chinese Society of Electrical Engineering, vol. 30, no. 31, pp. 77–82, 2010.

    [3]   G. Zhou, X. Zhang, Y. Lang et al., "A novel GPU-accelerated strategy for contingency screening of static security analysis," International Journal of Electrical Power & Energy Systems, vol. 83, pp. 33–39, 2016.

    [4]    D. Pathak and R. Kashyap, "Neural correlate-based E-learning validation and classification using convolutional and Long Short-Term Memory networks," Traitement du Signal, vol. 40, no. 4, pp. 1457-1467, 2023. [Online]. Available: https://doi.org/10.18280/ts.400414

    [5]     R. Kashyap, "Stochastic Dilated Residual Ghost Model for Breast Cancer Detection," J Digit Imaging, vol. 36, pp. 562–573, 2023. [Online]. Available: https://doi.org/10.1007/s10278-022-00739-z

    [6]     D. Bavkar, R. Kashyap, and V. Khairnar, "Deep Hybrid Model with Trained Weights for Multimodal Sarcasm Detection," in Inventive Communication and Computational Technologies, G. Ranganathan, G. A. Papakostas, and Á. Rocha, Eds. Singapore: Springer, 2023, vol. 757, Lecture Notes in Networks and Systems. [Online]. Available: https://doi.org/10.1007/978-981-99-5166-6_13

    [7]     K. Purchala, L. Meeus, D. Van Dommelen, and R. Belmans, "Usefulness of DC power flow for active power flow analysis," in Proceedings of the IEEE Power Engineering Society General Meeting, pp. 454–459, San Francisco, Calif, USA, June 2005.

    [8]      X. Wang, W. Fang, and Z. Du, "Modern Power System Analysis," Science Press, 2016.

    [9]      P. Bientinesi, J. A. Gunnels, M. E. Myers, E. S. Quintanaorti, and R. A. van de Geijn, "The science of deriving dense linear algebra algorithms," ACM Transactions on Mathematical Software, vol. 31, no. 1, pp. 1–26, 2005.

    [10]   NVIDIA, "cuBLAS," [Online]. Available: https://developer.nvidia.com/cublas.

    [11]    R. Zheng, W. Wang, H. Jin, S. Wu, Y. Chen, and H. Jiang, "GPU-based multifrontal optimizing method in sparse Cholesky factorization," in Proceedings of the 26th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP '15), pp. 90–97, IEEE, Ontario, Canada, July 2015.

    [12]   X. Chen, L. Ren, Y. Wang, and H. Yang, "GPU-accelerated sparse LU factorization for circuit simulation with performance modeling," IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 3, pp. 786–795, 2015.

    [13]    J. G. Kotwal, R. Kashyap, and P. M. Shafi, "Artificial Driving based EfficientNet for Automatic Plant Leaf Disease Classification," Multimed Tools Appl, 2023. [Online]. Available: https://doi.org/10.1007/s11042-023-16882-w

    [14]    V. Roy et al., “Detection of sleep apnea through heart rate signal using Convolutional Neural Network,” International Journal of Pharmaceutical Research, vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.

    [15]   R. Kashyap, "Machine Learning, Data Mining for IoT-Based Systems," in Research Anthology on Machine Learning Techniques, Methods, and Applications, Information Resources Management Association, Ed. IGI Global, 2022, pp. 447-471. [Online]. Available: https://doi.org/10.4018/978-1-6684-6291-1.ch025

    [16]  J. L. Greathouse and M. Daga, "Efficient sparse matrix-vector multiplication on GPUs Using the CSR storage format," in Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis (SC '14), pp. 769–780, November 2014.

    [17]  A. Gómez and L. G. Franquelo, "An efficient ordering algorithm to improve sparse vector methods," IEEE Transactions on Power Systems, vol. 3, no. 4, pp. 1538–1544, 1988.

    [18]   R. Betancourt, "An efficient heuristic ordering algorithm for partial matrix refactorization," IEEE Transactions on Power Systems, vol. 3, no. 3, pp. 1181–1187, 1988.

    [19]   H. P. Sahu and R. Kashyap, "FINE_DENSEIGANET: Automatic medical image classification in chest CT scan using Hybrid Deep Learning Framework," International Journal of Image and Graphics [Preprint], 2023. [Online]. Available: https://doi.org/10.1142/s0219467825500044

    [20]   S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. [Online]. Available: https://doi.org/10.1155/2021/2942808

    [21]   R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas, "MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education," IEEE Transactions on Power Systems, vol. 26, no. 1, pp. 12–19, 2011.

    [22]   Rajit Nair, Unraveling the Decision-making Process Interpretable Deep Learning IDS for Transportation Network Security, Journal of Journal of Cybersecurity and Information Management, Vol. 12 , No. 2 , (2023) : 69-82 (Doi   :  https://doi.org/10.54216/JCIM.120205)

    [23]   Neha Mathur,Shweta Sinha,Rajesh Kumar Tyagi,Nishtha Jatana, Analysis of Secure Data Sharing Techniques Using Blockchain, Journal of Fusion: Practice and Applications, Vol. 10 , No. 2 , (2023) : 42-54 (Doi   :  https://doi.org/10.54216/FPA.100204)

    [24]   Gopal Chaudhary , Smriti Srivastava , Manju Khari, Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats, International Journal of Wireless and Ad Hoc Communication, Vol. 6 , No. 1 , (2023) : 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)

    [25]   Ahmed Sleem, A Comprehensive Study of Cybersecurity Threats and Countermeasures: Strategies for Mitigating Risks in the Digital Age, Journal of Journal of Cybersecurity and Information Management, Vol. 10 , No. 2 , (2022) : 35-46 (Doi   :  https://doi.org/10.54216/JCIM.100204)

    [26]    Pooja , Dr. Manish Kumar Mukhija , Satish Kumar Alaria, Smart City's Security Model for Management of Image Data on Cloud, Journal of Cognitive Human-Computer Interaction, Vol. 2 , No. 1 , (2022) : 8-14 (Doi   :  https://doi.org/10.54216/JCHCI.020101)

    [27]   S.P. Samyuktha , Dr.P. Kavitha , V.A Kshaya , P. Shalini , R. Ramya, A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security, Journal of Cognitive Human-Computer Interaction, Vol. 2 , No. 2 , (2022) : 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)

    [28]   Esmeralda Kazia, Blockchain-based Model for Image Encryption in IoT Communication Environment, International Journal of Wireless and Ad Hoc Communication, Vol. 5 , No. 1 , (2022) : 54-64 (Doi   :  https://doi.org/10.54216/IJWAC.050105)

    [29]    Ossama Embarak , Mhmed Algrnaodi, Deep Learning Fusion for Attack Detection in Internet of Things Communications, Fusion: Practice and Applications, Vol. 9 , No. 2 , (2022) : 27-47 (Doi   :  https://doi.org/10.54216/FPA.090203)

    Cite This Article As :
    Kolandaisamy, Raenu. , Gupta, Suhas. , Patil, Shashikant. , Shah, Jaymeel. , Mishra, Abhinav. , Gobi, N.. Comprehensive Analysis of Implementation and Evaluation IoT based Techniques in Networked Security Systems. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2024, pp. 35-51. DOI: https://doi.org/10.54216/JISIoT.130203
    Kolandaisamy, R. Gupta, S. Patil, S. Shah, J. Mishra, A. Gobi, N. (2024). Comprehensive Analysis of Implementation and Evaluation IoT based Techniques in Networked Security Systems. Journal of Intelligent Systems and Internet of Things, (), 35-51. DOI: https://doi.org/10.54216/JISIoT.130203
    Kolandaisamy, Raenu. Gupta, Suhas. Patil, Shashikant. Shah, Jaymeel. Mishra, Abhinav. Gobi, N.. Comprehensive Analysis of Implementation and Evaluation IoT based Techniques in Networked Security Systems. Journal of Intelligent Systems and Internet of Things , no. (2024): 35-51. DOI: https://doi.org/10.54216/JISIoT.130203
    Kolandaisamy, R. , Gupta, S. , Patil, S. , Shah, J. , Mishra, A. , Gobi, N. (2024) . Comprehensive Analysis of Implementation and Evaluation IoT based Techniques in Networked Security Systems. Journal of Intelligent Systems and Internet of Things , () , 35-51 . DOI: https://doi.org/10.54216/JISIoT.130203
    Kolandaisamy R. , Gupta S. , Patil S. , Shah J. , Mishra A. , Gobi N. [2024]. Comprehensive Analysis of Implementation and Evaluation IoT based Techniques in Networked Security Systems. Journal of Intelligent Systems and Internet of Things. (): 35-51. DOI: https://doi.org/10.54216/JISIoT.130203
    Kolandaisamy, R. Gupta, S. Patil, S. Shah, J. Mishra, A. Gobi, N. "Comprehensive Analysis of Implementation and Evaluation IoT based Techniques in Networked Security Systems," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 35-51, 2024. DOI: https://doi.org/10.54216/JISIoT.130203