Machine Learning Approach for Cloud Data Analytics in IoT. Группа авторов
Чтение книги онлайн.
Читать онлайн книгу Machine Learning Approach for Cloud Data Analytics in IoT - Группа авторов страница 26
The efficiency of cloud to receive and process it to get the information is virtually beyond limit. As it is more readily scalable intelligent algorithm, it has driven the authentication process in an enforcement of modality-based cyber metric captures and its facts of the cyber specification and just in time sharing mode; it is useful in automatically updating the information to identity authentication.
2.8 Discussions and Implications
It is definitely difficult to automate the security task hundred percent but our application of KNN can intervene with its data-based design model which can identify similar kinds of attacks and can combat over it eventually. It can be automated to gain authorized access to the networks communicating with the IOT devices, thereby the collision of human intelligence and artificial intelligence together would produce much of generic outputs accomplished with greater efficiency. Besides, to enrich the content of security analysis activity, studies have been further elongated upon the visualized parameters of defending cognitive infrastructures compelling over the security vector machines which can deduce the clusters with maximized efficiency to create AI products of making it imprecate for us to get on to IoT devices.
In our study of computational intelligence which has raised its impactable approach over cyber intelligence in getting on to analyzing and identifying the digital safety threats to deal with the intruders over the clouds for various application tools has embarked upon the security design and security architecture with hostile alterations to data which is nothing but intellectual property secrets. As IoT enriched cyber-based existing systems are coming across vulnerabilities, the intruder over the cloud from the web have compelled our introspective technical ideas to do the makeover of the secured thread caused by the generously malicious systems.
It is approximately calculated that the number of connected devices will increase to 40 billion by end of 2020. But the latest research says that it may further exceed 60 billion because of this pandemic situation that we are undergoing. Hence, it becomes the call of the hour to put up our keen study and implementation ideas to provide a real-time response to do the diagnose data processing and analysis to have been applied with the machine learning techniques with data retrieval to make the decision accurate and timely which is the goal of this data-based work.
2.9 Conclusion
In this strategic study, the surveyed paradigm includes the security aspect of IoT and what is being carried out over it as a thoughtful concern of today’s era and as well as the prospective which need further concern. It renders over the architectural infrastructure IOT-enabled devices and the design model of the computational intelligent approach which is applied over with machine learning algorithms. It also looks upon the perfect analysis of the vulnerabilities of the related devices over the cloud which limits the failure ratio by the use of cognitive intelligence techfacts and forms. It also overhauls the cryptographic protocols which would enable IOT devices to process the computational data signals without the interventions of intruding threats. It gives us a dynamic efficacy for a secured communication, thereby developing schemes to address the security in context. Besides, it clearly reflects the security in context to both defense as well as attack.
The machine learning algorithm acts as a cyberweapon and an automated tool for automating the correlated cyber activities, with use of which this leverages the sophisticated power of adversarial machine learning. This study can be better basis for future resources dynamically analyzing the existing security solutions and develop a scalable cyber security system. It is also observed the extracted high-order implicable technology can further be modified where single malicious node can give signals to multiple identities and thus reducing the effectiveness of their faults schemes.
Hence, we may brief up as follows: Whenever a contravention occurs, the earlier it is detected and responded to the maximum is the opportunity of reducing loss vividly in a dynamic and vulnerable incidental operation.
References
1. Atlam, H.F., Alenezi, A., Alharthi, A., Walters, R.J., Wills, G.B., Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE International Conferenece, Exeter, UK, 2017, https://ieeexplore.ieee.org/document/8276823.
2. Tweneboah-Koduah, S., Skouby, K.E., Tadayoni, R., Cyber Security Threats to IoT Applications and Service Domains, Wireless Personal Communications. Int. J., 94, 4, June 2017. Springer.
3. https://www.softwaretestinghelp.com/iot-devices/
4. Hossain, Md. M., Fotouhi, M., Hasan, R., Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. IEEE 11th World Congress on Services, New York, NY, USA, June 2015, https://www.researchgate.net/publication/279801184_Towards_an_Analysis_of_Security_Issues_Challenges_and_Open_Problems_in_the_Internet_of_Things.
5. https://www.scnsoft.com/services/iot
6. Buch, R., Borad, N., Kalola, P., World of Cyber Security and Cybercrime. STM J., August 2018. https://www.researchgate.net/publication/327110771.
7. Saravanan, A. and Sathya Bama, S., A Review on Cyber Security and the Fifth Generation Cyberattacks. Orien. J. Comput. Sci. Technol., 12, 2, 50–56, 2019.
8. Fruhlinger, J., What is a cyber attack? Recent examples show disturbing trends, CSO |, 27 February 2020. https://www.csoonline.com/article/3237324/what-is-a-cyber-attack-recent-examples-show-disturbing-trends.html.
9. Wikipedia, https://en.wikipedia.org/wiki/Cyberattack.
10. Fruhlinger, J., Malware explained: How to prevent, detect and recover from it CSO |, 17 May 2019. https://www.csoonline.com/article/3295877/what-is-malware-viruses-worms-trojans-and-beyond.html.
11. Fruhlinger, J., What is phishing? How this cyber attack works and how to prevent it CSO|, 4 September 2020. https://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html.
12. Fruhlinger, J., Ransomware explained: How it works and how to remove it, CSO |, 19 June 2020. https://www.csoonline.com/article/3236183/what-is-ransomware-how-it-works-and-how-to-remove-it.html.