Machine Learning Approach for Cloud Data Analytics in IoT. Группа авторов. Читать онлайн. Newlib. NEWLIB.NET

Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Программы
Год издания: 0
isbn: 9781119785859
Скачать книгу
study of computational intelligence which has raised its impactable approach over cyber intelligence in getting on to analyzing and identifying the digital safety threats to deal with the intruders over the clouds for various application tools has embarked upon the security design and security architecture with hostile alterations to data which is nothing but intellectual property secrets. As IoT enriched cyber-based existing systems are coming across vulnerabilities, the intruder over the cloud from the web have compelled our introspective technical ideas to do the makeover of the secured thread caused by the generously malicious systems.

      In this strategic study, the surveyed paradigm includes the security aspect of IoT and what is being carried out over it as a thoughtful concern of today’s era and as well as the prospective which need further concern. It renders over the architectural infrastructure IOT-enabled devices and the design model of the computational intelligent approach which is applied over with machine learning algorithms. It also looks upon the perfect analysis of the vulnerabilities of the related devices over the cloud which limits the failure ratio by the use of cognitive intelligence techfacts and forms. It also overhauls the cryptographic protocols which would enable IOT devices to process the computational data signals without the interventions of intruding threats. It gives us a dynamic efficacy for a secured communication, thereby developing schemes to address the security in context. Besides, it clearly reflects the security in context to both defense as well as attack.

      The machine learning algorithm acts as a cyberweapon and an automated tool for automating the correlated cyber activities, with use of which this leverages the sophisticated power of adversarial machine learning. This study can be better basis for future resources dynamically analyzing the existing security solutions and develop a scalable cyber security system. It is also observed the extracted high-order implicable technology can further be modified where single malicious node can give signals to multiple identities and thus reducing the effectiveness of their faults schemes.

      Hence, we may brief up as follows: Whenever a contravention occurs, the earlier it is detected and responded to the maximum is the opportunity of reducing loss vividly in a dynamic and vulnerable incidental operation.

      1. Atlam, H.F., Alenezi, A., Alharthi, A., Walters, R.J., Wills, G.B., Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE International Conferenece, Exeter, UK, 2017, https://ieeexplore.ieee.org/document/8276823.

      3. https://www.softwaretestinghelp.com/iot-devices/

      4. Hossain, Md. M., Fotouhi, M., Hasan, R., Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. IEEE 11th World Congress on Services, New York, NY, USA, June 2015, https://www.researchgate.net/publication/279801184_Towards_an_Analysis_of_Security_Issues_Challenges_and_Open_Problems_in_the_Internet_of_Things.

      5. https://www.scnsoft.com/services/iot

      6. Buch, R., Borad, N., Kalola, P., World of Cyber Security and Cybercrime. STM J., August 2018. https://www.researchgate.net/publication/327110771.

      7. Saravanan, A. and Sathya Bama, S., A Review on Cyber Security and the Fifth Generation Cyberattacks. Orien. J. Comput. Sci. Technol., 12, 2, 50–56, 2019.

      8. Fruhlinger, J., What is a cyber attack? Recent examples show disturbing trends, CSO |, 27 February 2020. https://www.csoonline.com/article/3237324/what-is-a-cyber-attack-recent-examples-show-disturbing-trends.html.

      9. Wikipedia, https://en.wikipedia.org/wiki/Cyberattack.

      10. Fruhlinger, J., Malware explained: How to prevent, detect and recover from it CSO |, 17 May 2019. https://www.csoonline.com/article/3295877/what-is-malware-viruses-worms-trojans-and-beyond.html.

      11. Fruhlinger, J., What is phishing? How this cyber attack works and how to prevent it CSO|, 4 September 2020. https://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html.

      12. Fruhlinger, J., Ransomware explained: How it works and how to remove it, CSO |, 19 June 2020. https://www.csoonline.com/article/3236183/what-is-ransomware-how-it-works-and-how-to-remove-it.html.

      13. Wikipedia, https://en.wikipedia.org/wiki/Spyware

      14. Gunjan, V.K., Kumar, A., Avdhanam, S., A Survey of Cyber Crime in India. Conference: ICACT, 2013.

      15. https://www.ntsc.org/assets/pdfs/cyber-security-report-2020.pdf

      16. Hilt, S., Kropotov, V., Mercês, F., Rosario, M., Sancho, D., The Internet of Things in the Cybercrime Underground, Trend Micro Research, For Raimund Genes, 1963–2017.

      17. Kaufman, L.M., BAE Systems, Data Security in the World of Cloud Computing, Security & Privacy IEEE, ieeexplore.ieee.org, 2009.

      18. IBM cloud education, in: Cloud Storage 24th, June 2019, https://www.ibm.com/cloud/learn/cloud-storage.

      19. Wikipedia, https://en.wikipedia.org/wiki/Cloud_computing_security.

      20. Carroll, M., van der Merwe, A., Kotzé, P., Secure Cloud Computing: Benefits, Risks and Controls. Conference: Information Security South Africa (ISSA), IEEE Xplore, 2011.

      22. Russel, S.J. and Norvig, P., Artificial Intelligence: A modern Approach, 2nd Edition, Pearson Education, Inc., Dorling Kindersley (India) Pvt. Ltd, 2007.

      23. Sethi, A., Supervised Learning vs. Unsupervised Learning, 2020. Скачать книгу