Phaneendra Kanakamedala, Yarra Harika, Mamilla Krishnaveni, B. Nallani
{"title":"使用机器对机器(M2M)框架的物联网(IoT)设备调查分析","authors":"Phaneendra Kanakamedala, Yarra Harika, Mamilla Krishnaveni, B. Nallani","doi":"10.47392/irjash.2023.s007","DOIUrl":null,"url":null,"abstract":"As we know that now a days the possibility of the uninterrupted attacks on the IOT devices are increasing. The less memory and the minute process-ing power of these appliances make it tough for the security analyst to store the records of the different attacks. The forensic analysis is used to evaluate the damage done on the devices due to numerous attacks. In this mecha-nism the attacks on the IOT devices are detects undoubtedly by using machine-to-machine (M2M) framework. In addition to the using machine-to-machine framework the machine learning algorithms also been used to identify various attacks automatically. Here we use the third-party logging server in order to issue. The execution will be studied in the form of accuracy, precision and the Random Forest gives the most accuracy.","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"313 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Internet of Things (IoT) Device Investigative Analysis Using Machine-to-Machine (M2M) Framework\",\"authors\":\"Phaneendra Kanakamedala, Yarra Harika, Mamilla Krishnaveni, B. Nallani\",\"doi\":\"10.47392/irjash.2023.s007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As we know that now a days the possibility of the uninterrupted attacks on the IOT devices are increasing. The less memory and the minute process-ing power of these appliances make it tough for the security analyst to store the records of the different attacks. The forensic analysis is used to evaluate the damage done on the devices due to numerous attacks. In this mecha-nism the attacks on the IOT devices are detects undoubtedly by using machine-to-machine (M2M) framework. In addition to the using machine-to-machine framework the machine learning algorithms also been used to identify various attacks automatically. Here we use the third-party logging server in order to issue. The execution will be studied in the form of accuracy, precision and the Random Forest gives the most accuracy.\",\"PeriodicalId\":244861,\"journal\":{\"name\":\"International Research Journal on Advanced Science Hub\",\"volume\":\"313 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Research Journal on Advanced Science Hub\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47392/irjash.2023.s007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Research Journal on Advanced Science Hub","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47392/irjash.2023.s007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet of Things (IoT) Device Investigative Analysis Using Machine-to-Machine (M2M) Framework
As we know that now a days the possibility of the uninterrupted attacks on the IOT devices are increasing. The less memory and the minute process-ing power of these appliances make it tough for the security analyst to store the records of the different attacks. The forensic analysis is used to evaluate the damage done on the devices due to numerous attacks. In this mecha-nism the attacks on the IOT devices are detects undoubtedly by using machine-to-machine (M2M) framework. In addition to the using machine-to-machine framework the machine learning algorithms also been used to identify various attacks automatically. Here we use the third-party logging server in order to issue. The execution will be studied in the form of accuracy, precision and the Random Forest gives the most accuracy.