International Journal of LNCT

ISSN (Online):2456-9895

 

 

Volume-07 Issue-31 Month Aug-2023

[1]   Navigating the Cybersecurity Landscape: An In-Depth Survey of Contemporary Challenges and Mitigation Strategies


Joy Bhattacharjee, Dr Manish Agrawal, Amit Dubey, & Dr Bhagwati Charan Patel



Today's interconnected world dominated by technology, understanding and effectively implementing cyber security is of paramount importance. Systems, critical files, data, and other valuable digital assets are vulnerable without adequate protection. Regardless of whether a company is an IT firm or not, every organization must prioritize security equally. As new technologies emerge in the field of cyber security, malicious actors are also keeping pace. They are continuously improving their hacking techniques and targeting the vulnerabilities present in numerous businesses. Cyber security holds great significance because military, government, financial, medical, and corporate entities amass, process, and store vast amounts of data on computers and other devices. A significant portion of this data can consist of sensitive information, including financial records, intellectual property, personal details, and various other types of data that, if accessed or exposed illegally, could lead to detrimental consequences.

[2]   A Review on IOT Botnet Detection Techniques


Harshita Patel, Laxmi, Mayank Raj & Ravi Ranjan



IoT devices are vulnerable to a wide range of security risks and attacks, including assaults from botnets, due to basic security weaknesses. Because of this, developers of botnets continue to exploit the security flaws present in IoT devices to take control of several host devices on networks and execute cyberattacks against their intended target systems. Finding IoT bot vulnerabilities is challenging since methods to get around detection and security measures are constantly being developed. In this paper, various machine-learning-based botnet detection strategies will be examined together with the conceptual frameworks of IoT botnet assaults. The Bot-IoT Dataset, a current realistic IoT dataset that includes state-of-the-art IoT botnet attack scenarios, is used in this study to assess and compare several botnet detection approaches.

[3]   Cluster and Cluster Head Selection And Formation Scenario In VANET: A Comparative Study


Megha Napit, Shikha Gupta, Siddharth Singh Tiwari & Vaibhav Porwal



Vehicular Ad-hoc Network (VANET), enables the communication between groups of vehicles to offer data exchange, entertainment, traffic updates, and driver safety. By using local coordination, clustering is an effective way to address the frequent changes in the topology of the VANET. In this paper, we address various clustering techniques implemented in VANET for vehicle clusters. These techniques use various parameters of the vehicle's mobility, which include position, velocity, packet-forwarding capacity, speed, direction, no of vehicles, etc. the various schemes proposed establishes stable and consistent clusters based on these parameters. For cluster head (CH) selection, RSU agent, size of the cluster, and distance are used in these approaches. However, security, stability, communication, and consistency are some major issues that wireless VANET networks must deal with. We use MATLAB simulators to find the results of these schemes for their comparison. We formed a VANET on Matlab and compared them to various parameters.