Phaneendra Kanakamedala, Yarra Harika, Mamilla Krishnaveni, B. Nallani
{"title":"Internet of Things (IoT) Device Investigative Analysis Using Machine-to-Machine (M2M) Framework","authors":"Phaneendra Kanakamedala, Yarra Harika, Mamilla Krishnaveni, B. Nallani","doi":"10.47392/irjash.2023.s007","DOIUrl":null,"url":null,"abstract":"As we know that now a days the possibility of the uninterrupted attacks on the IOT devices are increasing. The less memory and the minute process-ing power of these appliances make it tough for the security analyst to store the records of the different attacks. The forensic analysis is used to evaluate the damage done on the devices due to numerous attacks. In this mecha-nism the attacks on the IOT devices are detects undoubtedly by using machine-to-machine (M2M) framework. In addition to the using machine-to-machine framework the machine learning algorithms also been used to identify various attacks automatically. Here we use the third-party logging server in order to issue. The execution will be studied in the form of accuracy, precision and the Random Forest gives the most accuracy.","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"313 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Research Journal on Advanced Science Hub","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47392/irjash.2023.s007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As we know that now a days the possibility of the uninterrupted attacks on the IOT devices are increasing. The less memory and the minute process-ing power of these appliances make it tough for the security analyst to store the records of the different attacks. The forensic analysis is used to evaluate the damage done on the devices due to numerous attacks. In this mecha-nism the attacks on the IOT devices are detects undoubtedly by using machine-to-machine (M2M) framework. In addition to the using machine-to-machine framework the machine learning algorithms also been used to identify various attacks automatically. Here we use the third-party logging server in order to issue. The execution will be studied in the form of accuracy, precision and the Random Forest gives the most accuracy.