Securing Digital Lives: Personalized Measures for Comprehensive Data Protection for Home Networks

Authors

  • Rishi Vora Gifted Gabber
  • Sarada Prasad Gochhayat Indian Institute of Technology Jammu
  • Virgel Torremocha University of Southeastern Phillipines
  • Jothsna Kethar Gifted Gabber

DOI:

https://doi.org/10.47611/jsrhs.v13i2.6748

Keywords:

home network security, federated learning, data privacy, automated protection

Abstract

This research paper addresses the increasing cyber threats targeting home networks and the lack of comprehensive security solutions tailored for consumers. It proposes a comprehensive solution that addresses data protection, threat monitoring, and impact mitigation, which could be automated through AI and Federated Learning (FL) to simplify security for non-experts. The paper conducts a literature review and qualitative analysis to examine cyber threats and security research, proposing an architecture that utilizes FL across home devices. It discusses challenges such as handling biases and diverse devices, limitations of interoperability, and hardware requirements. The paper emphasizes the urgent need for automated and personalized cybersecurity tailored for consumers to address the escalating threats to home networks, arguing that FL has the potential to enable this while addressing privacy concerns associated with centralized AI.

Downloads

Download data is not yet available.

References or Bibliography

Arabo, A. (2015). Cyber security challenges within the connected home ecosystem futures. Procedia Computer Science, 61, 227-232.

Borky, J. M., & Bradley, T. H. (2018). Protecting Information with Cybersecurity. Effective Model-Based Systems Engineering, 345–404. https://doi.org/10.1007/978-3-319-95669-5_10

Comcast Business. (n.d.). 2023 Comcast Business Cybersecurity Threat Report. Comcast Business - Official Site. https://business.comcast.com/community/browse-all/details/2023-comcast-business-cybersecurity-threat-report

Cunningham, C., Hannon, C., Malik, M., Paik, R., Paramesh, R., Samford, H., ... & Beyer, J. ADDRESSING SYSTEMIC CYBERSECURITY RISK.

Deloitte. (2020, January 9). 91% of all cyber attacks begin with a phishing email to an unexpected victim: Deloitte Malaysia: Risk advisory: Press releases. Deloitte Malaysia. https://www2.deloitte.com/my/en/pages/risk/articles/91-percent-of-all-cyber-attacks-begin-with-a-phishing-email-to-an-unexpected-victim.html

DPM. (2023, December 19). 10 things you need to know about data breaches. Data Privacy Manager. https://dataprivacymanager.net/10-things-you-need-to-know-about-data-breaches/

FINRA. (n.d.). Common cybersecurity threats. FINRA.org. https://www.finra.org/rules-guidance/guidance/common-cybersecurity-threats

Forrester. (n.d.). Forrester: The emergence of offensive Ai - Darktrace. https://www.darktrace.com/de/resources/research-forrester-offensive-ai.pdf

Google Cloud. (n.d.). Cybersecurity forecast 2024. https://services.google.com/fh/files/misc/google-cloud-cybersecurity-forecast-2024.pdf

Ikonen, M. (2014). Cyber Security: Home User's Perspective.

Jančis, M. (2023, November 15). 8 most popular password cracking techniques: learn how to protect your privacy. Cybernews. https://cybernews.com/best-password-managers/password-cracking-techniques/

Maurer, T., & Nelson, A. (2021). The global cyber threat. Finance & Development, 24-27.

McLean, M. (2024, January 4). 2024 must-know cyber attack statistics and Trends. Embroker. https://www.embroker.com/blog/cyber-attack-statistics/

McMahan, B., & Ramage, D. (2017, April 6). Federated learning: Collaborative machine learning without centralized training data. Google Research Blog. https://blog.research.google/2017/04/federated-learning-collaborative.html

Mohsin, K. (2022). Data Privacy and Cybersecurity. Available at SSRN 4299439.

NSA. (2023, February). Best practices for securing your home network. Department of Defense. https://media.defense.gov/2023/Feb/22/2003165170/-1/-1/0/CSI_BEST_PRACTICS_FOR_SECURING_YOUR_HOME_NETWORK.PDF

Osakwe, M. (2021, May 13). The guide to identifying and securing pii leakage. Nightfall AI. https://www.nightfall.ai/blog/identifying-and-securing-pii-leakage-in-2021

Pratt, M. (2023, September 7). Emerging cyber threats in 2023 from AI to Quantum to data poisoning. CSO Online. https://www.csoonline.com/article/651125/emerging-cyber-threats-in-2023-from-ai-to-quantum-to-data-poisoning.html

Purplesec. (2023, February 22). 2023 Cyber Security Statistics Trends & Data. PurpleSec. https://purplesec.us/resources/cyber-security-statistics/

Taylor, P. (2024, January 18). U.S. households with Broadband internet 2021. Statista. https://www.statista.com/statistics/183614/us-households-with-broadband-internet-access-since-2009/#:~:text=Number%20of%20U.S.%20households%20with%20broadband%20internet%20access%202000%2D2021&text=The%20number%20of%20households%20in,the%20biggest%20online%20markets%20worldwide

Trend Micro. (2018, February 27). A look into the most noteworthy home network security threats of 2017. Security Roundup. https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/a-look-into-the-most-noteworthy-home-network-security-threats-of-2017

Victor, N., Alazab, M., Bhattacharya, S., Magnusson, S., Maddikunta, P. K. R., Ramana, K., & Gadekallu, T. R. (2022). Federated learning for iout: Concepts, applications, challenges and opportunities. arXiv preprint arXiv:2207.13976.

Published

05-31-2024

How to Cite

Vora, R., Gochhayat, S. P., Torremocha, V., & Kethar, J. (2024). Securing Digital Lives: Personalized Measures for Comprehensive Data Protection for Home Networks. Journal of Student Research, 13(2). https://doi.org/10.47611/jsrhs.v13i2.6748

Issue

Section

HS Research Projects