FYP LOGBOOK

FYP Logbook 1 (9/11/2021)

The aims of this project to study and analyse the effectiveness of Intrusion Detection System towards security of the Internet of Things (IoT) network. The security of the IoT network very important as the network need to be used in controlling all IoT devices. Sensors and other embedded devices are linked to form the Internet of Things (IoT). As more devices become linked, the likelihood of being harmed by numerous IoT dangers rises. For example, it was being used for medical things such as smart and connected medical devices that enabled continuous real-time patient monitoring, increase in diagnostic accuracy, and effective treatment. Attacks on medical equipment connected to the IoT network have the potential to inflict severe physical injury and even death to patients.

A Software-Defined Networking (SDN) has been widely used nowadays. Software-Defined Networking (SDN) is a networking technique that communicates with underlying hardware infrastructure and directs traffic on a network using software-based controllers or application programming interfaces (APIs). Traditional networks employ specific hardware devices to control network traffic, which is not same with this system. SDN may use software to establish and operate a virtual network, as well as traditional hardware. The problems when using SDN is there are some security issues. Recently, Machine Learning (ML) approaches have been implemented in the SDN to protect computer networks and to overcome network security issues.

An Intrusion Detection Systems (IDS) are designed to monitor potential attacks in network infrastructures. An Intrusion Detection System (IDS) is a hardware and software system that detects and mitigates network threats and attacks. The IDS gathers and analyses data on harmful actions before reporting them. Intrusion Detection Systems (IDS) are one of the greatest network security solutions because they can forecast and alert the network administrator about potential attacks. There are many potential attacks might occur to the system such as Distributed Denial of Service. A distributed denial-of-service (DDoS) attack is a malicious attempt to interrupt a targeted server's, service's, or network's regular traffic by flooding the target or its surrounding infrastructure with Internet traffic. DDoS assaults are effective because they use numerous hacked computer systems as attack traffic sources. Computers and other networked resources, such as IoT devices, are examples of exploited machinery. Server failures and financial losses can result from distributed denial of service attacks, which put IT personnel under a lot of pressure to get resources back up. The correct detection and prevention techniques can help prevent a DDoS attack before it becomes powerful enough to bring down the IoT network.