Analyzing Traffic Behavior in IoT-Cloud Systems : A Review of Analytical Frameworks

Authors

  • Vaidehi Shah   Independent Researcher

Keywords:

IoT-data, Cloud, IoT-Cloud Systems, Traffic Behavior Analysis, Network Traffic Modeling, Cyber–Physical Systems.

Abstract

The tasks of the network administrator will be to monitor the numerous applications running on the network and perform a deep analysis of the network traffic. This encompasses tasks such as anomaly detection, network surveillance, and system optimization to derive meaningful information about network traffic. The article explores IoT-cloud designs in detail, examining their performance against network traffic and identifying critical security objectives. It looks at different traffic analysis methods, packet, flow statistics, and behavior modeling and looks at key security threats sarcastically, Distributed Denial of Service (DDoS), phishing, and SQL injection attacks. The paper further describes the most important security objectives that are needed to defend IoT-cloud environments, including confidentiality, integrity, and availability and reviews various cyber threats, like DDoS, man-in-the-middle, phishing, as well as SQL injection threat. Based on a literature review, this paper examines modern tools and techniques to implement traffic monitoring and anomaly detection, outlining their advantages and drawbacks in the existing solutions. By methodologically reviewing recent developments, the article will help researchers and practitioners to innovate more secure and smarter systems to conduct IoT-cloud traffic analysis.

References

  1. A. Subahi and G. Theodorakopoulos, “Detecting IoT User Behavior and Sensitive Information in Encrypted IoT-App Traffic,” Sensors, vol. 19, no. 21, Nov. 2019, doi: 10.3390/s19214777.
  2. S. Garg, “Next-Gen Smart City Operations with AIOps & IoT: A Comprehensive look at Optimizing Urban Infrastructure,” J. Adv. Dev. Res., vol. 12, no. 1, pp. 1–9, 2021, doi: https://doi.org/10.5281/zenodo.15364012.
  3. A. Sivanathan et al., “Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics,” IEEE Trans. Mob. Comput., vol. 18, no. 8, pp. 1745–1759, Aug. 2019, doi: 10.1109/TMC.2018.2866249.
  4. C. Patil and A. Chaware, “Integration of Internet of Things, Cloud Computing: Review,” IOP Conf. Ser. Mater. Sci. Eng., vol. 1022, no. 1, pp. 1–9, Jan. 2021, doi: 10.1088/1757-899X/1022/1/012099.
  5. E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, and B. Stiller, “Landscape of IoT security,” Comput. Sci. Rev., vol. 44, May 2022, doi: 10.1016/j.cosrev.2022.100467.
  6. Y. Sharma, H. Gupta, and S. K. Khatri, “A Security Model for the Enhancement of Data Privacy in Cloud Computing,” in 2019 Amity International Conference on Artificial Intelligence (AICAI), IEEE, Feb. 2019, pp. 898–902. doi: 10.1109/AICAI.2019.8701398.
  7. M. F. Umer, M. Sher, and Y. Bi, “Flow-based intrusion detection: Techniques and challenges,” Comput. Secur., vol. 70, pp. 238–254, Sep. 2017, doi: 10.1016/j.cose.2017.05.009.
  8. J. Wang and I. C. Paschalidis, “Botnet Detection Based on Anomaly and Community Detection,” IEEE Trans. Control Netw. Syst., vol. 4, no. 2, pp. 392–404, Jun. 2017, doi: 10.1109/TCNS.2016.2532804.
  9. Y. Tian, M. M. Kaleemullah, M. A. Rodhaan, B. Song, A. Al-Dhelaan, and T. Ma, “A privacy preserving location service for cloud-of-things system,” J. Parallel Distrib. Comput., vol. 123, pp. 215–222, Jan. 2019, doi: 10.1016/j.jpdc.2018.09.005.
  10. A. Basit, M. Zafar, X. Liu, A. R. Javed, Z. Jalil, and K. Kifayat, “A comprehensive survey of AI-enabled phishing attacks detection techniques,” Telecommun. Syst., vol. 76, no. 1, pp. 139–154, Jan. 2021, doi: 10.1007/s11235-020-00733-2.
  11. S. Singamsetty, “Fuzzy-Optimized Lightweight Cyber-Attack Detection For Secure Edge-Based IoT Networks,” J. Crit. Rev., vol. 6, no. 07, pp. 1028–1033, 2019, doi: 10.53555/jcr.v6.
  12. K. M. R. Seetharaman, “Internet of Things (IoT) Applications in SAP: A Survey of Trends, Challenges, and Opportunities,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 2, pp. 499–508, Mar. 2021, doi: 10.48175/IJARSCT-6268B.
  13. M. Konopa, J. Fesl, and J. Janecek, “Promising new Techniques for Computer Network Traffic Classification: A Survey,” in 2020 10th International Conference on Advanced Computer Information Technologies (ACIT), IEEE, Sep. 2020, pp. 418–421. doi: 10.1109/ACIT49673.2020.9208995.
  14. E. Papadogiannaki and S. Ioannidis, “A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures,” ACM Comput. Surv., vol. 54, no. 6, pp. 1–35, Jul. 2022, doi: 10.1145/3457904.
  15. H. Nguyen-An, T. Silverston, T. Yamazaki, and T. Miyoshi, “IoT Traffic: Modeling and Measurement Experiments,” IoT, vol. 2, no. 1, pp. 140–162, Feb. 2021, doi: 10.3390/iot2010008.
  16. L. Deri and D. Sartiano, “Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis,” in 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, Dec. 2020, pp. 1–6. doi: 10.23919/ICITST51030.2020.9351330.
  17. I. Hafeez, M. Antikainen, A. Y. Ding, and S. Tarkoma, “IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge,” IEEE Trans. Netw. Serv. Manag., vol. 17, no. 1, pp. 45–59, Mar. 2020, doi: 10.1109/TNSM.2020.2966951.
  18. K. Kim and Y. G. Hong, “Autonomous network traffic control system based on intelligent edge computing,” in 2019 21st International Conference on Advanced Communication Technology (ICACT), IEEE, Feb. 2019, pp. 164–167. doi: 10.23919/ICACT.2019.8701939.

Downloads

Published

2023-06-25

Issue

Section

Research Articles

How to Cite

[1]
Vaidehi Shah , " Analyzing Traffic Behavior in IoT-Cloud Systems : A Review of Analytical Frameworks" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 3, pp.877-885, May-June-2023.