0% found this document useful (0 votes)
21 views

Syllabus

Uploaded by

umarani-rs
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Syllabus

Uploaded by

umarani-rs
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

CYBER DETECTION AND PREVENTION SYSTEM L T P E C

23IC22C INTERNET OF THINGS LTPC3003


INTRODUCTION
COURSE OUTCOMES 8
UponIntroduction
the successfulto Intrusion
completion– Need
of thisof Intrusion
course, Detection
the student will –
beClassification
able to: of Intrusion Detection
Systems - Components and– Source of vulnerabilities – Attacks against
CO1: analyze various design methodologies and enabling technologies for Internet of Things various Security
platform.
Objectives – Countermeasures of attacks.
CO2: apply the appropriate model for building things in IoT.
CO3:INTRUSION DETECTION
examine the standard AND by
IoT protocols PREVENTION
emphasizing theirTECHNOLOGIES
characteristics and interoperability. 10
CO4:Host Based
apply IDS – Network
the utilities of ESP32Based IDS – Information
for implementing Source
diverse IoT for IDS – Host and Network
applications.
CO5: analyze the applications
vulnerabilities of IoT in real-time
and countermeasures –, misusescenarios.
detection: pattern matching, rule based and state-
IoT DESIGN
based METHODOLOGIES
anomaly 9
detection: Statistical based, machine learning based, data mining-based hybrid
Internet of
detection.Things - Physical Design- Logical Design- IoT Enabling Technologies - IoT Levels and
Deployment
IDS ANDTemplates - Domain Specific IoTs - IoT and M2M - IoT System Management with NETCONF-
IPS ARCHITECTURE
YANG- IoT Platforms Design Methodology.
10
IoT MODELING 9
Tiered architecture: Single-tiered, multi-tiered, peer-to-peer – Sensor: Functions, deployment and
IoT Reference architecture - High-level M2M ETSI architecture - IETF architecture - OGC architecture -
securitymodels:
Reference – Agent: Functions,
Domain model Manager component:
- Information Functions,model
model - Functional deployment and security
- Communication – - Case
model
Information
Studies: Monitoringflowsoilin conditions,
IDS and IPS – Defending
Smart IDS/IPS – Case study on Commercial and open-
fridge solutions.
source
IoT PROTOCOLSIDS. 9
Protocol Standardization for IoT - MQTT - CoAP – AMQP - Zigbee - BLE - 6LowPAN - LoRaWAN- Z- 8
ALERT MANAGEMENT AND CORRELATION DATA FUSION
WaveAlert correlation – Preprocess – Correlation techniques – post process – Alert correlation
- NarrowBand-IoT.
IoTArchitecture
APPLICATIONS - - Cooperative discovery of intrusion chain – abstraction-based
9 intrusion detection –
Role of ESP32
Interest in IoT
based applications - and
communication ESP-IoT Development
cooperation Framework(IDF)-
– Agent Architecture and GPIO
based cooperation
Programming
WIRELESS - Interfacing
IDPS sensors - Creating a web server -Data Storage - Edge computing with ESP32 9 -
Applications: LED Blinking,
Threats against WLANs,Maintaining the distance
802.11 Wireless of Things,Attacks,
Infrastructure Bluetooth
WEPcommunication, Humidity
Attacks, Wireless Client
measurement
Attacks, Bluetooth Attacks, Cell phones, Other Hybrid Devices Attack Detection, Jail breaking -
REAL TIME IoT SYSTEM 9
Threat Briefing – Quantifying risk - Return on Investment (ROI)
Smart lighting - Intrusion detection system - Emergency response - Smart parking -Weather monitoring -
L: 45, TOTAL: 45 PERIODS
Forest fire detection - Smart grid - Inventory management - Smart payment - Smart irrigation - Wearable
REFERENCES
electronics.
1.Ali A. Ghorbani, Wei Lu, “Network Intrusion Detection and Prevention: Concepts
L: 45, TOTAL: and
45 PERIODS
Techniques”,
REFERENCE BOOKS First Edition, Springer US, 2019
1. 2. Al-Sakib
Arshdeep Khan
Bahga andPathan, “The State
Vijay Madisetti, of the Art
“Internet in Intrusion
of Things Prevention
– A Hands-on and Detection”,
Approach” First Orient
Second Edition,
Edition,Private
Blackswan CRC Press,Limited 2014
- New Delhi, 2019.
2. Simone Cirani, Gianluigi Ferrari, Marco Picone and Luca Veltri, “Internet of Things: Architectures,
Protocols and Standards” First Edition,Wiley, 2018.
3. David Hanes, Gonzalo Salgueiro,Patrick Grossetete, Robert Barton and Jerome Henry, “IoT Fundamentals:
Networking Technologies, Protocols, and Use Cases for the Internet of Things”, First Edition, Cisco Press,
2017.
4. Vedat Ozan Oner, “Developing IoT Projects with ESP32”, First Edition, Packt Publishing, 2021.
5. Olivier Hersent, David Boswarthick and Omar Elloumi, “The Internet of Things - Key applications and
Protocols”, Second Edition, Wiley, 2018.
6. Rajkumar Buyya and Amir Vahid Dastjerdi , "Internet of Things: Principles and Paradigms", Second
Edition, Elsevier, 2020.
7. Marco Zappatore, "Internet of Things- Architectures, Protocols and Standards" First Edition, Springer,
2018.
23CT22C MACHINE LEARNING
ALGORITHMS LTPC 3 00 4
CO1: apply the mathematical and statistical prospective of
machine learning. 9
Components of learning – Learning models – Types of
learning – supervised -unsupervised – reinforcement – Curse
of Dimensionality – Bias and Variance – Learning Curve –
Classification – Training versus testing – Error and Noise
CO2: build the Predictive and Probabilistic modeling
techniques for regression and classification.
9
Predictive Models: Univariate linear regression – Multivariate
linear regression – Logistic regression – Stochastic Gradient
Descent – Linear Multiclass Prediction – Probabilistic Models:
Density Estimation – Naïve Bayes Models – Statistical
Estimation – Conditional Models
CO3: apply the supervised and unsupervised learning
techniques and optimize the models.
9
Supervised Models: Neural Networks – Multilayer Networks
with Backpropagation Algorithm – Case Study: Face
Recognition – Kernel Tricks – Soft-SVM with Kernels.
Unsupervised Models:Measuring dissimilarity – Spectral
clustering –Hierarchical clustering – K- Means clustering –
Fuzzy C-Means Clustering – Dimensionality Reduction using
PCA
CO4: develop the reinforcement learning algorithms to
solve complex problems.
9
Passive reinforcement learning: Direct utility estimation –
Adaptive Dynamic Programming – Temporal-Difference
Learning – Active reinforcement learning: exploration –
learning an action- utility function – Generalization in
reinforcement learning – policy search – Applications in game
playing – applications in healthcare using AutoML (Google).
CO5: evaluate the machine learning models to extract and
optimize the features. 9
Analytical Learning: Discovering new features – Deductive
Learning – Knowledge level learning - Feature Learning :
Feature Selection – Greedy Selection Approaches – Feature
Manipulation and Normalization – Perceptron Learning

You might also like