Bogus IOT intruder Detection system

Abstract

In this modern age, there is an increasing amount of IOT device used in almost every corner of the world. Even though these devices are smarter, users will have a chance of falling into the vulnerabilities and the insecurities of these devices. With these vulnerabilities, threat agents like intruders will take this opportunity to exploit and to cause unnecessary harm to the victim in many ways as possible. One way of causing a harm to a victim is by using a programmed IOT devices technology to connect to the Victims network to launch an attack without the user’s knowing about it. With such an attack, factors such as privacy and security of the user will be exploited, and certain actions will have to implemented to avoid such threats to the user. To connect to the victim’s network, usually the threat agent will use an IOT device to establish a connection in the network and the intruder device will try to maintain itself as an authorized device within the network. So, to avoid the threat, it would be efficient to monitor the devices in the network and to detect the intruder device on time without having to face any consequences. Therefore, with my “Bogus IOT detection system” project, I will be able to help users to scan their network and to detect any intruder IOT device that might have been connected to the network to cause harm to the victim users in various unimaginable ways.

Description

Citation

Jayasekara, H. & Attanayaka, C. (2021)Bogus IOT intruder Detection system, International Conference On Business Innovation (ICOBI), NSBM Green University, Sri Lanka. P.297

Endorsement

Review

Supplemented By

Referenced By