Stout Implementation of Firewall and Network Segmentation for Securing IoT Devices
2023; Indian Society for Education and Environment; Volume: 16; Issue: 33 Linguagem: Inglês
10.17485/ijst/v16i33.1262
ISSN0974-6846
AutoresMansoor Farooq, Rafi A. Khan, Mubashir Hassan Khan,
Tópico(s)Advanced Malware Detection Techniques
ResumoObjectives: To develop algorithms for different types of firewalls and their implementation for securing IoT devices. Assess the effectiveness of the developed algorithms and highlights the importance of a comprehensive approach to securing IoT devices, including maintaining strong authentication and encryption, secure communication protocols, and keeping devices updated with the latest security measures. Methods: The present study focuses on creating algorithms that can be used to secure IoT devices through various types of firewalls, including traditional firewalls, Next-generation (NGFW), stateful inspection, packet filtering firewalls, application-level gateways, and network segmentation. These algorithms can be integrated into existing infrastructure or used to design a completely new system. The firewalls are then configured to properly filter network traffic, monitor communication trends, and implement IoT-specific security regulations. The integrated firewall system is thoroughly tested and evaluated to assess its functionality, performance, and effectiveness in securing IoT devices. Findings: To evaluate the effectiveness of the developed algorithms, several experiments were conducted and the system achieved an accuracy of 99% which results a high level of success in protecting IoT devices from cyber threats. These algorithms are specifically designed to address the vulnerabilities and security challenges associated with IoT devices. Novelty and applications: The novelty of this paper lies in the development of algorithms for different types of firewalls and their implementation specifically for securing IoT devices. The focus on IoT devices and their unique vulnerabilities is an important aspect of this research. Each type of firewall has its strengths and weaknesses, and the paper likely discusses how they can be effectively employed to secure IoT devices. This suggests that the proposed firewall algorithms are effective in mitigating cyber threats and enhancing the security of IoT devices. Keywords: Firewalls; NGFW; Stateful Inspection Firewalls; IoT; Cyberattacks; cybersecurity; VPN; AES; IKE; L2TP; NAC; 8021X Authentication and DHCP
Referência(s)