Effective Cyber Security Using IoT to Prevent E-Threats and Hacking During Covid-19

Website: www.ijeer.forexjournal.co.in Effective Cyber Security Using IoT to Prevent E-Threats ░ ABSTRACT- This research work is conducted to make the analysis of digital technology is one of the most admired and effective technologies that has been applied in the global context for faster data management. Starting from business management to connectivity, everywhere the application of IoT and digital technology is undeniable. Besides the advancement of the data management, cyber security is also important to prevent the data stealing or accessing from the unauthorized data. In this context the IoT security technology focusing on the safeguarding the IoT devices connected with internet. Different technologies are taken under the consideration for developing the IoT based cyber security such as Device authentication, Secure on boarding, data encryption and creation of the bootstrap server. All of these technologies are effective to its ground for protecting the digital data. In order to prevent cyber threats and hacking activities like SQL injection, Phishing, and DoS, this research paper has proposed a newer technique of the encryption process by using the python codes and also shown the difference between typical conventional system and proposed system for understanding both the system in a better way.


Background
Advanced technology has widely changed today's world. By utilizing, IoT based digital technology, various complex tasks can be done faster without any error. Moreover, the digitalbased technology also offers to operate the tasks like business operation, progress monitoring, and financial transaction through online processes. Moreover, data management also gets quite easier and more efficient as well after the rapid implementation of IoT technology. These kinds of wide diversified facilities effectively help the spread the usage of the IoT technology in the market faster [1].

Figure 1: Cyberattacks during a pandemic
During pandemics, the incidents of cyber-attacks have been increased regardless of the location and industry. More specifically, most of the cyber-attacks that happened during this time are related to data exfiltration leakage and phishing the sensitive emails. This helps in analyzing the fact that the need of identifying the different IoT tools and methods used are needed to be analyzed.

Purpose
The main purpose of this research work is to demonstrate the ways the different cyber security methods and tools used in the time of pandemics to protect users from hackers or cyber

Effective Cyber Security Using IoT to Prevent E-Threats and Hacking During Covid-19
Website: www.ijeer.forexjournal.co.in Effective Cyber Security Using IoT to Prevent E-Threats attackers.

The role of cyber security to prevent ethreats and hacking
E-threats are a kind of serious threat to mankind that causes due to unethical malpractices over the internet. The e-threats involve the unfair means of the intention like frauding, stealing data and developing security breaches for fulfilling the purpose of the data theft. In order to prevent this, the concept of cyber security has been introduced [2]. It is working as one of the major effective drivers of business success in the competitive business market. The main function of cyber security is that provide constant support and security by creating an encrypted environment. IoT based encrypted environment is usually developed with numerous loops in which hacking software fails to freely works. In such a process, the monetary transaction can be done flawlessly [3]. Although the main obstacles of developing and using IoT is already outlines, others are visualized in the diagram. In the functional area of the IoT, the integration and updating the infrastructure, heterogeneity and inherent complexity is count as a security challenge.

Understanding of the problem domain
An effective application of a cyber-security system within a business helps an organization achieve its desired position in the global market. However, cybersecurity issues are rapidly increasing in organizations affecting their market reputation and customer satisfaction largely. The domain of cyber security includes various challenges that include -breaching of cyber security, unauthorized access to data, and several others [4]. Third-party unlawful intervention causing misuse of the network is one of the biggest challenges faced by the modernday along with other challenges that include mobile malware as well. Artificial intelligence as one of the most rapidly growing technologies has the potential to deal with cybersecurity issues. The growing popularity of IoT technology and AI has paved the way for minimizing the negative impact of cyber security and its challenges significantly. Social engineering, data breaches and phishing is increasing exponentially in the recent years. In this context critical and high risk factor based threats are marked with H& C resp. In case the threats increased too high to critical, then both letters are noted. Based on the Okiru and Mirai malware this paper has developed the security system by using machine learning.
The rapid increase of cyber-attacks and multiplication of devices occurring in today's technology-driven world accelerated the necessity of adopting artificial intelligence to address these cybersecurity issues. Cybersecurity threats can broadly be divided into 7 types including Malware, Emotet, Service Denial, Man in the middle, Phishing, Password Attacks, and SQL injection [5]. A detailed discussion of the above-mentioned cyber threats might help in developing an understanding of the problems that this domain faces.

Malware
Malware is a kind of malicious software that includes ransomware, viruses, spyware, and others that are activated by cybercriminals to block access to major network components. This kind of cyber threat also causes the automated installation of harmful software and obtains data covertly by transmitting them from the system hard drive [6]. Malware threats to a system can also disrupt individual parts of that system making them completely inactive. To mitigate such threats, effective infrastructure is required. The circulation of this type of malicious software got common, especially during Covid-19. Based on a survey it has been found that during the time of global pandemic situation, hackers have been spread some fake news related to Covid-19 along with links where they injected the malicious virus [7]. Now, when a major number of social media users have shared the same circular message without knowing anything in-depth, the malware effectively captures more devices. Thus in the following way, it has been impacted the digital transmission of the data.

Emotes
Emotet malware is regarded as a Trojan initially developed as a banking malware for sneaking onto the computers of others to steal private information. However, the later versions included the addition of malware delivery and spamming devices in the system along with other banking Trojan. The use of worm-like capabilities by this software has helped in spreading to other connected computers ensuring the distribution of the malware [7]. The extensive spread of this malware needs the intervention of advanced technology to stop spreading.

Service denial
DoS or denial of service is a kind of cyber-attack that swamps a computer or a network making it able to respond to requests. A flood attack is often used by cyber attackers to hamper the handshake process and to execute DoS [8]. Distributed DoS works similarly to DoS, however, the origination of the attack is done from a computer network. Through DDoS or distributed DoS, millions of systems can get affected by the control of the attackers or hackers.

Threat detection and incident response framework
Threat detection is an essential aspect to prevent cyber-attacks. On that note, the steps that are needed to be taken are identified through such a response framework. The major advantage of this type of system is that it can help in reducing resource and time wastage. However, the different schools of thought have expressed that having no insider threat program can be disadvantageous when it is not incorporated into such a system [9].

IPS (INTRUSION PREVENTION SYSTEM)
IPS is identified to be another existing tool used by the cyber security teams to prevent cyber attackers from obtaining personal or sensitive information. The major benefit of using this tool is that malicious activities can be identified in realtime and it has included the next-generation firewall in the system. On the other hand, this technology is criticized for lacking speed when an organization does not have high bandwidth capacity. Besides, it has also been identified that this type of technology requires high network capacity and a company lacking such an aspect can face this type of issue [10]. Therefore, loss of performance due to incapable operations is a major disadvantage of using this tool.

Phishing
This unique attack is executed by cyber attackers through fake communication such as e-mail to trick the receiver into opening that mail and making them carry out information such as debit or credit card details to steal money from the respective bank account [11].

SQL Injection
Structured query language or SQL injection is a type of cyberattack that is caused by the insertion of malicious code into a SQL using server. Getting infected by the code the server starts releasing information regarding the network. This is one of the easiest ways of attacking a network using SQL.

Password attacks
Access to people's passwords allows hackers to a plethora of information regarding the victim and their confidential accounts [12]. This attacking strategy is highly dependent on human interaction or manipulation of people, compelling them to break standard security practices which were common during Covid-19.

░ 3. RESEARCH METHODOLOGY
Research methodology is one of the significant parts of this research in which the researcher has been highlighted all the evidence of the research topic for satisfying the research objectives. It is quite evident that during the Covid-19 pandemic most customers have started to gain digital experience due to the national and international lockdowns imposed by the government of the UK and other countries. The restriction on the mobility suddenly increase the usage of the IoT for functioning digital transaction and other works. It

International Journal of Electrical and Electronics Research (IJEER) Open Access | Rapid and quality publishing
Research Article | Volume 10, Issue 2| Pages 111-116 | e-ISSN: 2347-470X is to be noted that with the increment of the usage of the cybersecurity, the chances of data hacking also gets higher. In this context, the protection of customers' information is crucial since the hacking of customers' data can cause trouble and financial losses for the companies as well as the individuals. Hence, with the immense efforts made by the researcher in the research, this study has demonstrated a range of research evidence, which depicted that the use of IoT and other technologies could reduce the threats of cyber hacking during the covid-19 pandemic. Cross domain. An advanced data driven approaches to develop the security refers to the umbrella term Cybersecurity data science.

Figure 5: Knowledge discovery of Paradigm
Synergetic is usually applied for the different tactics to determining the significant relationship between the diverse research fields to finding out the optimal solution. In the selection of sample method, the researcher has chosen one of the appropriate sampling methods for gathering the responses of the people belonging to the UK market. There are two types of sampling methods that are "The probability sampling method and the Non-probability sampling method". Therefore, the researcher has used the probability sampling method in which people from the UK industry has chosen randomly for obtaining the responses so that he could complete the research work within time. Moreover, the main reason for ignoring the non-probability sampling by the researcher is it could not be beneficial for the researcher in obtaining the research evidence. Therefore, the help of probability sampling method has helped the researcher in obtaining the responses about the necessities of IoT during the Covid-19 pandemic for reducing the risk and threats of cybercrime. Lastly, it is illustrating that the experimental sampling method could also be beneficial for the researcher in obtaining reliable information from different experiments in the research.
From the above discussions that the experimental method of data collection has played a significant role for the researcher in completing the research work with much ease and accuracy. On the basis of the research study it has been found that there are usually 7 types of cyber security threats may appear, such as Emotet, Malware, and Man in the middle, Denial of services, SQL injection, Phishing and Password attack. In order to protect the data from such kind of cyber-attack, the precautionary measures like network security, cloud security and IoT security can be implement. In this context, this research paper has followed IDPS method.

░ 4. RESULT, ANALYSIS AND INTERPRETATION
This research paper has considered mixed methods such as primary quantitative or survey and secondary qualitative methods to develop a better understanding based on the role of cyber security using IoT for preventing hacking and e-threats during Covid-19. To develop the quantitative information, the survey strategy has been chosen effective and on that note, 31 people or respondents have been selected from whom the required information is taken.   The Naïve Bayes classifier (NB) has shown the worst performance among the other models Support vector machine (SVM) and Logistic Regression (LR).

Figure 8: Metrics variation
The above figure has demonstrated the result by comparing the metrics variation in between NB, SVM and LR.

Threat recovery using python coding
In the present context, socially engineered attacks are the most common. Social engineering attacks are not limited to phishing, emails, and others, which work through the manipulation of human psychology. In order to protect this, In order to protect the system from the threats, python coding based antivirus and cybersecurity can be build up. In this context, at the initial stage, python libraries are need to import. Nan value in Python programming is considered as a floatingpoint value that is subject to conversion into other data types of float. In the analysis of data, the NAN value is regarded as unnecessary that needs to be removed to ensure proper analysis of data. Here the above-mentioned figure is reflecting the various NaN value of Antivirus that include external_ips, vulume_bytes, source app_app packets, and others.

Figure 11: Object to the integer conversion
Object to integer conversion in Pandas programming converts data into a numeric type. Through the function of Pamdas. to_numeric () this conversion into an integer is executed. In the above-mentioned figure, numeric objects have been converted into integers. Such kind of numeric data is not readable by other devices that effectively provides an efficient protection by establishing IDBS.
Updating devices and their firmware regularly is another mitigating strategy. Backup of all kinds of sensitivities and non-sensitivities data is also essential that usually performed by AI system under the encrypted environment. Thus in the following way, e-threats and hacking like activities can be mitigated.

Integration and implementation of AI with IoT
To implicate artificial intelligence in different organizations having the concept regarding human intelligence, simulation has been evaluated. To protect sensitive data from theft and to avoid malware, especially during the higher usage of IoT, like the Covid-19 pandemic, these types of intelligence are applicable. Some critical steps of implementing artificial intelligence are, (i) Being familiar with the AI is the primary step (ii) Identification of the problems is the next step (iii)The values that are being prioritized to deal with the scenario is the most concerning step that needs to be understood while integrating AI (iv)Development of a pilot project to bring up the expert opinion and to set the plan is the ultimate step to implicating AI (v) Formation of the task force to deal with the integrated data is important in this scenario.
(vi)Choosing the right artificial intelligence systems that can work better than human intelligence with the machine learning process to simplify the algorithms is the ultimate state that needs to be maintained as well.

░ 6. CONCLUSION
Cyber-attacks are on the rise with more sophisticated technology arriving at the scene. Ransomware has been the most recent which nearly disrupted the entire data processing services in the digital world. The business has become vulnerable to these kinds of attacks due to some structural deficiency in the industry as well as unethical business practices. The deficiency of robust security systems and infrastructure comes as a secondary threat. As per the above discussion, it has been noticed that during the time of Covid-19, while the usage and demand of IoT is high due to physical mobility restrictions, that time try to take a higher level of the chance of data hacking. Considering this fact, IoT based cyber security has been considered in this study for protecting digital devices. Encryption based approaches are also has been considered in this study for meeting the purpose of it. In terms of explaining the future direction of cyber security the increased rate of attacks is seen. The demand taking place in cyber security is going to be increased quickly in the coming future due to its successfully stopping e-threats. To develop this technique to some extent, the python coding can be executed by aligning with the AI technology. Such a method may assist to discover the internet pressure in a smarter way and could be able to implement the hacking tools.