Work place: Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India
E-mail: manoj.kumar.nitj@gmail.com
Website:
Research Interests: Cryptography
Biography
Dr. Manoj Kumar is working as an Associate Professor in the Department of Computer Science and Engineering at Graphic Era Deemed to be University, Dehradun, Uttarakhand, India-248802. He has almost 14 years of experience in academics and mostly on an Industrial scale in the field of Cyber Security. He has B.Tech (CSE) from Cochin University of Science and Technology, MTech(CSE), and Ph.D. (CSE) with specialization in Cyber Security from the National Institute of Technology Jalandhar (Punjab)-144011. He has published several research articles in reputed journals. He is an active reviewer board member in various national/International Journals and Conferences. He has memberships in ACM (Senior Member), IAENG, ACEEE, and ISOC (USA). His research interests include Visual Cryptography, Identity-based encryption, ID-based signature, Elliptical curve cryptography, Zero Knowledge Proof based authentication, and Signcryption Techniques.
By Umang Garg Santosh Kumar Manoj Kumar
DOI: https://doi.org/10.5815/ijcnis.2024.05.08, Pub. Date: 8 Oct. 2024
The Internet of Things (IoT) is revolutionizing the technological market with exponential growth year wise. This revolution of IoT applications has also brought hackers and malware to gain remote access to IoT devices. The security of IoT systems has become more critical for consumers and businesses because of their inherent heterogenous design and open interfaces. Since the release of Mirai in 2016, IoT malware has gained an exponential growth rate. As IoT system and their infrastructure have become critical resources that triggers IoT malware injected by various shareholders in different settings. The enormous applications cause flooding of insecure packets and commands that fueled threats for IoT applications. IoT botnet is one of the most critical malwares that keeps evolving with the network traffic and may harm the privacy of IoT devices. In this work, we presented several sets of malware analysis mechanisms to understand the behavior of IoT malware. We devise an intelligent and hybrid model (IHBOT) that integrates the malware analysis and distinct machine learning algorithms for the identification and classification of the different IoT malware family based on network traffic. The clustering mechanism is also integrated with the proposed model for the identification of malware families based on similarity index. We have also applied YARA rules for the mitigation of IoT botnet traffic.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals