INTEGRATION AND PROTECTION OF IOT DEVICES IN THE AVAILABLE INFRASTRUCTURE OF THE COMPUTER NETWORK OF THE EDUCATIONAL INSTITUTIONS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2021.11.8599

Keywords:

cybersecurity, computer network, IoT device, integration of security systems

Abstract

The development of computer networks is gaining momentum. There are new challenges to data security and the end users themselves. With the advent of the Internet of Things, this problem has become quite acute for network engineers and cyber analysts. Increasingly, there are illegal actions to interfere with the work of the network itself and the use of users' devices for criminal purposes. Various distributed attacks, SQL injections and identity theft are becoming more complex. Given the growing infrastructure of both the network and IoT devices, there is a need to protect them. Especially when it comes to the computer network of a higher education institution. Where little attention is usually paid to full infrastructure protection, and with the integration of IoT devices, such possible gaps can occur quite a lot.

This article attempts to reveal theoretical approaches to the design and implementation of a computer network of higher education institutions, which in recent years are increasingly beginning to suffer from outside interference. Possible attacks on the infrastructure of higher education institutions are analyzed, as well as the possibility of attack and interference in the work of IoT devices based on the killer chain approach. Internet The possibility of using a web application firewall and appropriate software for security and incident management at the L5-L7 OSI level is considered in such networks. Preliminary testing of the network for the ability to respond to L3-L4 level attacks using standard firewall capabilities. And with the response to interventions at the upper levels of the OSI L5-L7 model, namely: SQL injections, distributed DDoS, bot-net attacks. The results are summarized and further directions of research are determined, which are based on the improvement of the group security policy for the higher education institution. Development of security infrastructure for IoT devices and the ability to respond quickly to non-standard attacks.

Downloads

Download data is not yet available.

References

Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 65-88.

Weber, R. H., & Studer, E. (2016). Cybersecurity in the Internet of Things: Legal aspects. Computer Law & Security Review, 32(5), 715-728.

Zhao, S., Li, S., Qi, L., & Da Xu, L. (2020). Computational intelligence enabled cybersecurity for the internet of things. IEEE Transactions on Emerging Topics in Computational Intelligence, 4(5), 666-674.

Sani, A. S., Yuan, D., Jin, J., Gao, L., Yu, S., & Dong, Z. Y. (2019). Cyber security framework for Internet of Things-based Energy Internet. Future Generation Computer Systems, (93), 849-859.

Lu, Y., & Da Xu, L. (2018). Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103-2115.

Zavgorodniy, VV, Drozdova, EA, & Kozel, VM (2020). Analysis of Iot device security issues. Bulletin of Kherson National Technical University, 4 (75), 59-66.

Trokhimenko, DV, & Kurdecha, VV (2019). Data protection on the Internet of Things. International scientific and technical conference 228 "Radio fields, signals, devices and systems", 228-230.

Altiparmak, F., Dengiz, B., & Smith, A. E. (2003). Optimal design of reliable computer networks: A comparison of metaheuristics. Journal of heuristics, 9(6), 471-487.

Cononelos, T., & Oliva, M. (1993). Using computer networks to enhance foreign language/culture education. Foreign Language Annals, 26(4), 527-534.

Lee, H. C., & Ke, K. H. (2018). Monitoring of large-area IoT sensors using a LoRa wireless mesh network system: Design and evaluation. IEEE Transactions on Instrumentation and Measurement, 67(9), 2177-2187.

Downloads


Abstract views: 304

Published

2021-03-25

How to Cite

Lakhno, V. ., Blozva, A. ., Husiev, B. ., Osypova, T. ., & Matus, Y. . (2021). INTEGRATION AND PROTECTION OF IOT DEVICES IN THE AVAILABLE INFRASTRUCTURE OF THE COMPUTER NETWORK OF THE EDUCATIONAL INSTITUTIONS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(11), 85–99. https://doi.org/10.28925/2663-4023.2021.11.8599

Most read articles by the same author(s)

1 2 > >>