Journal of Defense Resources Management (Oct 2023)

DETECTION OF EXTERNAL INTERVENTIONS IN THE INTERNET OF THINGS

  • Namazov Asim TAHIR

Journal volume & issue
Vol. 14, no. 2
pp. 97 – 106

Abstract

Read online

The importance of ensuring the security of Internet of Things (IoT) devices is just as crucial as accelerating the implementation process of IoT. Like other devices, IoT devices can be vulnerable to various types of attacks over the internet. To identify these attacks, attention should be paid to the system itself and the activity sequence of certain resources. This article discusses various types of security solutions for IoT devices. Additionally, a new solution is proposed to identify the potential impact of IoT devices. The experiments were conducted using a Mikrotik router as a gateway have shown that it is possible to detect cyber attacks by monitoring the device's internal resources for various activities. Login attempts using different usernames recorded in the router's logs and the processor's jump activity were monitored to identify metrics indicating potential attacks based on increased sequential jumps. An algorithm was developed using these metrics, and a program was written in Python to detect cyber attack threats against the device.

Keywords