Aryan Practical Training Report
Aryan Practical Training Report
Aryan Practical Training Report
Report
Submitted in partial fulfillment of the
requirements for the award of the degree of
BACHELOR OF TECHNOLOGY IN
COMPUTER SCIENCE &
ENGINEERING/INFORMATION
TECHNOLOGY
I take this opportunity to express my profound gratitude and deep regards to my guide “
_ms. Jyoti Sehgal_ DEPARTMENT” for his exemplary guidance, monitoring and constant
encouragement throughout the course of this thesis.
The blessing, help and guidance given by him from time to time shall carry me a long way in the
journey of life on which I am about to embark. I also take this opportunity to express a deep sense of
gratitude to Dr. Bijendar bansal, Head Department of Computer Science & Engineering, Rohtak for
his/her cordial support, valuable information, and guidance, which helped me in completing this task
through various stages.
I am grateful for their cooperation during the period of my Project. Lastly, I thank Almighty, my
parents, brother, sisters, and friends for their constant encouragement without which this assignment
would not be possible.
Aryan
21/CSE/115
CSE Department
CHAPTER 1: INTRODUCTION
Company Profile:
o Mega Softel Private Limited is a Private company incorporated on 27
October 2015. It is classified as Non-government company and is registered at
Registrar of Companies, Delhi.
o Its authorized share capital is Rs. 100,000 and its paid up capital is Rs.
100,000. It's NIC code is 722 (which is part of its CIN). As per the NIC code,
it is inolved in Software publishing, consultancy and supply [Software
publishing includes production, supply and documentation of ready-made
(non-customized) software, operating systems software, business & other
applications software, computer games software for all platforms. Consultancy
includes providing the best solution in the form of custom software after
analyzing the user?s needs and problems.
Training Objectives:
Scope of Work:
o Network Security:
o Network Automation:
o Developing and implementing network automation scripts using tools like Python,
Ansible, or PowerShell.
o Automating routine network tasks to improve efficiency and reduce errors.
o Cloud Networking:
o Configuring and managing network services in cloud environments (AWS, Azure, GCP).
Point-to-Point network
Wired or wireless
RG-45 cable
Network cables:
Coaxial:
Or use bridges or boosters, repeaters to extend the distance. Finally use fibre optics others
10Base-T
100Base-Tx
1000Base-T 4 pairs of category 5e twisted pair cable supports 1Ghz transmission
speed
Fiber Optic
-100Base-FX 100mb/ps
Serial
-RS-232 20000bps
Broadcast domains
Collision Domains
-Full duplex: You can send and receive at the same time. Act as a server and client
simultaneously.
Encryption: Provide protection over the network to mitigate from hacking. Required key.
Session
Frame Formats
2048 (0x0800) - IP
2054(0x0806) - ARP
Carrier sense:
Layer 2
Just need a switch and the end device. A switch can establish a connection with only
MAC Addresses.
Network layer:
IP packet (0x0800) length 60 bytes, source destination. Time to leave 255-0, packet
dropped afterwards at 0.
-Class B /16
Class D
E.G
Class C 192.168.1.0
Network 6
IP Gateway
Time to live:
ICMP Types
Every link is counted as a hop count and ads to the time required to send a message.
Address Resolution Protocol
Proxy ARP takes longer because of connecting with the proxy gateway.
TCP Wired networks, conjunction control, monitoring packets. Three hand-way shake,
security and sharing of certificates. TCP is the best for safety. UDP. Doesn’t do floor
control or three-way handshake. Company usually wireless network. Wireless access
point is linked to the wired connection so that monitoring occurs on the main router,
called traceback. Logs are maintained according to MAC address, which are constant per
devices.
Multiple collisions.
Data bits 8
Party: None
Stop bits 1
Allows remote access VTY (Virtual teletype terminal) 0-4 five times. Can be changed.
There is one root bridge and following from there are non-root bridges or downstream
bridges.
-Bridge ID (Bridge number and MAC ID): BPDU packet sent to the switches, returning
switch number and MAC address. Only if the bridge ID is the same, the path codes are
used to determine the shortest path according to the cable speed.
The smallest bridge ID is elected as the root bridge. The highest priority or election
criteria. The MAC address is the determinant.
BPDU (Bridge Protocol Data Unit) through STP (Spanning Tree Protocol) for bridges and
switches:
-We are trying to control the management of data to avoid loops and broadcast storms.
The bridge facilitates communication.
-TCN BDPU: Goes from downstream roots to the upstream roots to better understand the
topology of the tree. A status call, these protocols are a notification and update the tree
hierarchy. Hello tree over 2 seconds. The TCN BPDU refreshes/responds every 30
seconds.
Route Path Cost: In order to determine the shortest path that is loop free. The root bridge
path cost is always 0.
The highest port identifier (the lowest port number) represents the port assigned as the
root port with other ports defaulting to the alternative port role.
To propagate a Hello Timer (2 seconds) the upstream will propagate over 1 second. A
maximum ae timer by default represents a period of 20 seconds.
Root Failure:
When a switch is done it cannot send BPDU, so the switches reestablish the bridge root
through the Spanning Tree Protocol (STP). If the device fails
If the port is down. The port table is relabeled. The alternative port is named as a
designated port as it cannot be communicated any other way in this circumstance. Full
recovery of the STP topology occurs after approximately 50 seconds.
STP Modes:
To further mitigate against loops, the switches are not all the same mode and must be
configured by the technician.
-mstp (multiple)
-rstp (rapid)
-stp
If the stp is a priority the priority refers to integers between 0 to 61440 in increments of
4096, 16 increments. With a default value of 32768.
If a legcy stp standard is use the path cost ranges between 1 to 200000
If IEEE 802.1D standard is used the path cost ranges from 1 to 65535
If the IEEE 802.1t standard is used the path cost is ranges from 1 to 200000000.
All root bridges must be designated. Root protection only applies while not an edge port
or a command of loop protection is enabled.
Learning Outcomes:
Technical Skills
Network Fundamentals:
o Strong understanding of networking concepts, including TCP/IP, OSI model,
and network protocols (TCP, UDP, HTTP, FTP, etc.)
o Proficiency in network topologies (star, bus, ring, mesh, etc.)
o Knowledge of network devices (routers, switches, firewalls, load balancers)
and their functions
Network Configuration and Troubleshooting:
o Ability to configure network devices (routers, switches, firewalls) using
command-line interfaces (CLIs) and network management tools
o Proficiency in troubleshooting network issues, such as connectivity problems,
performance bottlenecks, and security breaches
o Skill in using network diagnostic tools (Wireshark, Ping, Traceroute)
Network Security:
o Understanding of network security concepts, including firewalls, intrusion
detection systems, and VPNs
o Ability to implement and maintain network security policies and procedures
o Knowledge of common network security threats and vulnerabilities
Network Automation:
o Proficiency in scripting languages (Python, Perl, Bash) for network
automation
o Ability to use network automation tools (Ansible, Puppet, Chef)
o Skill in creating and maintaining automated network configurations
Cloud Networking:
o Understanding of cloud computing concepts and platforms (AWS, Azure,
GCP)
o Ability to configure and manage virtual networks and network services in
cloud environments
o Skill in implementing hybrid cloud networking solutions
Soft Skills
The skills I've acquired during my time at Mega Softel align seamlessly with my
academic studies and future career goals. My academic background in [Your
Academic Field, e.g., Computer Science, Electrical Engineering] provided a strong
foundation in networking concepts, data structures, and algorithms. The practical
experience at Mega Softel has allowed me to apply these theoretical concepts to real-
world scenarios, solidifying my understanding and enhancing my problem-solving
abilities.
Looking ahead, these skills will be invaluable as I pursue a career in network
engineering or a related field. The ability to design, implement, and troubleshoot
complex networks, combined with a strong understanding of network security, will be
essential for success. Additionally, the skills in network automation and cloud
networking will position me to embrace emerging technologies and contribute to the
evolving landscape of network infrastructure.
Critical Analysis:
RSTP (Rapid spanning tree protocol)
Improvement on STP, backup
STP Weaknesses: Ensures loop-free network however has a slow network topography as
changes occur. Convergence timers (30-50 seconds). Regular service interuptions
.
RSTP: Employs a proposal and agreement process which allows for immediate negotiation of
links to take place, effectively removing the time taken for convergence-based timers to
expire before spanning tree convergence can occur. Proposal & Agreement, immediate
negotiation. Each downstream switch gradually begins to learn of the true root bridge and the
path via which the root bridge can be reached.
RSTP port toles
Backup port role represents the backup for the path for the LAN segment in the direction
leading away from the root bride. An edge port directly connects to a terminal and no other,
where redundant links exist,
RSTP edge ports:
System not participating gin RSTP connect to the edge port. Edge ports do not receive BDPU
and instanly forward data.
Port states of RSTP
-
-
-
-
-
RST BPDU
-00 unknown
-01 Alternate/backup
-10 root port
-Designated port
Static route would have to be reconfigured manually should the route fail. Only use a static
route for small networks of few users.
The convergence of a RSTP follow on from STP. There is an additional port on the LAN side,
the edge port.
RST BDPU Proposal
All designated ports. One is a superior BPDU. When the BDPU is sent, not propagated
downstream. The edge port is connected to the computer.
RST BPDU Agreement
RSTP Converged Link
The downstream port is blocked, and synchronization occurs. RST BPDU sent back and forth.
Link/Root failure
After not receiving three consecutive Hello intervals, the agreement process is reinsitialised in
order to discover port roles for the LAN segment.
Link failure is noticed immediately, the address entries are flushed. An RST BPDU will
negotiate the port states as part of negotiation and agreement process - MAC Addresses are
dropped and updated
No waiting, part of configuration settings. When an STP enabled device is added to an RSTP
system it reverts to STP.
Network Management Station (NMS)
The edge ports that are shut down by the switch can be manually started only by the network
administrator.
STP DPDU-protection command should be ued to enable BDPU protection and is confiugred
globally within the system view.
Distance Vector Routing protocfol (RIP)
Performance is slow, Hop count limit of 15
Loop prevention
Packet is df
RIP has 2 method Extent is UDP.
-Authentication
RIP version 2 is recommended, defauit 1
Does not use I{ adfe
Metric
OSPD
OSPF
For 4 devices
Request + Acknoledgenent X2
10 seconds
4 packets sent over 40 seconds is the limit
Point-to point 10 second interval 40 seconds to withdraw packets
30 second interval
Higher prioirty the better the network
Between 1 - 255 range to select designated and back up value. THe higher the number
the better the network. The higher the authorisation/prioritu on router the beter the
network
OSPF metric: By default, the metric is 10 which can be changed as per user preference,
there can be alternative.
10/8*bandwidth
OSFP tree recommended
Shortest path algorithm with the potential
OSFFP Areas for one domain such as uni campus.
OSFP Authentication simply password
OSPF silent interface only receives updates
DHCP
Dynamically assign IP addresses to users.
Usually wireless
To assign an IP address
-Manual: Administrator visits the machine and the IP address assigned is physically
-Dynamic: Assign to specific machines the
-Dynamic however the address is reassigned regularly
DHCP messages
DISCOVER: CLient can locate DHCP server
OFFer: When available
REQUEST: Client sends request but a message broadcast is sent, it is unicast.
Reply is unicast
Once a user/machine leaves the IP address can be reassigned. Maximum of 24hrs usage of an
IP address. Notification to renew sent at 50% usage. Down to the minute and second.
Without the message sent you can be disconnected.
FTP
Used to transfer files from the server to the client. VRP operating system.
Both the client and server must use the same password otherwise they cannot communicate
with each other. Two port numbers used to exchange packets.
-20 – data control/connections between client and server
-21 – file transfer
Two transmission modes
-ASCII mode for text
-Binary mode for pictures/images
Telnet (VTY) with the limit to trials)
Protocol to connect remotely to manage devices
-Port 23
Authentication modes:
-none: Login without authentication
-AAA: AAA authentication
-Password: Authentication
For some you can determine if a change was made and by who
Basic Knowledge of IP Routing (Routing packets)
-AS (Autonomous Systems):
A clear method of sending the data.
E.g 2 LANs connected by a LAN. LAN a, LAN b, LAN c. Where LAN c is he link between
LAN a,b.
Relying on the IP address a Router uses the routing table, compared to a switch which utilises
MAC Addresses. Routers are responsible for routing decisions because of the routing table.
All network nodes are included.
ROUTING Protocol: RIPv1, RIPv2, ARP
PRE: Preferences. A router selects the best path based on the highest preferences (smallest
val)
Direct = 0 (a direct link)
RIP = 100
OSPF = 10
Static preference = 60
A router command; ‘display’ 10.1.1.0 = router A
Next hop is the next port I.e 20.1.1.2
Routing Decision – preferences
Select the lowest preference value. The protocol helps to decide.
Routing Decision – Metric/cost
The decision maker, the metric.
Routing table forwarding requirements
Inbound: Default gateway
Outbound: To the internet or other network
IP Static (manually, stationery, fixed) Routes
IP static route/path, a unique non-changing path, if unavailable or something changes it is
down.
A static route can be assigned on serial links or on ethernet (data link layer) link/cable.
Configuring/creating a static route
[RTB] IP route-static 192.168.1.0 (router A/destination) 255.255.255.0 (subnet mask)
10.0.12.1 (next hop router B)
[RTB} (On router B) ip route-static 192.168.1.0 255.255.255.0 (Subnet mask) Serial 1/0/0
[RTB] ip route-static 192.168.1.0 24 Serial 1/0/0
Static Route load balancing
More than one static route to a destination. Which comes with additional cost, ISP.
Verifying static route load balancing
[RTB] ip route-static 192.168.1.0 255.255.255.0 10.0.12.1 + 2nd line is equivalent to
*[RTB] display ip routing-table
192.168.1.0/24 static 60 0 RD 10.0.12.1 GigabitEthernet 0/0/0 + 2nd line
Floating static route check but the when a preference is assigned the route chosen might
still be the highest preference by default
Special case of default static route when a destination static route is unknown. Works on any
unassigned network:
[RTA] ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 preference of 60 by default. Can access any +
verification
Display ip route-table:
0.0.0./0 static 60 0 RD 10.0.12.2 GigabitEthernet0/0/0
Distance Vector Routing with RIP – a dynamic routing protocol
Without a static route you are required to have a routing protocol saved on the routing table.
Small organisation
Simple to implement
RIP, according to the Bellman-Ford algorithm, operates a n interior gateway protocol
Principle Behavior
Route advertisements periodically
Only carry best route info
Metric number is important
A hope limit of 15 hops to prevent infinite forwarding/loops.
Hops represent a metric of 1
When a network fails the next best route might have loops, the routers learn among
themselves. The metric cap can be changed.
Through the use of split horizons we can prevent loops.
Split horizon:
A route that is down and learnt on an interface cannot be advertised on the same to prevent
loops.
Enabled by default except on NBMA
Loop prevention-poisoned reverse:
Has additional overheads, the routing message size is increased because of advanced
notifications as the routing table is updated.
Allows the speed of erroneous routes to be timed out to become instantaneous.
On Huawei AR2200 series router split horizon and poisoned reverse cannot be applied at the
same time, poison reverse is preferred and enabled.
Loop prevention-triggered update
Updates of the routing table are sent periodically.
RIP extension authentication (RIPv2)
Additional security fixtures. Process of security comparison.
Malicious packets are filtered.
Plaintext is not completely secure.
If the router is not configured for RIP version 2 authentication it reverts back to RIP version 1
and discards authenticated RIPv2 messages.
RIP load balancing
In case of link being down
RIP network advertisement
[RTA] rip
[RTA-rip-1] version 2
[RTA-rip-1] network 10.0.0.0
RIP metricin/out
Supports manipulation of metrics.
Metricin: Change takes effect
Metricout: Changes do not apply
*Command:
[RTC] interface GigabitEthernet 0/0/0
[RTC-GigabitEthernet0/0/0] rip metricin 2
RIP output: Outbound interface
RIP inbound: Inbound interface
*[RTA-GigabitEthernet0/0/0] undo rip output: restrict advertisement. Update message cease
to be forwarded out of the given interface. Usable where an enterprise does not want to share
its internal routes to an external network via the interface.
*[RTA-rip-1]silent-interface GigabitEthernet 0/0/1 receive no advertisement
OSPF (Open Shortest Path First)
Minimal routing traffic
Rapid convergence
Scalable
Accurate route metrics
Configure on ethernet
Configure on serial but defaulted to point-to-point type
Configure as High-level data link control (HDLC) -data link layer OSI model
IP address on the network layer
OSPF can operate on multiaccess network that does not support broadcast.
Designated Router are implemented by NBMA (Non-broadcast multi access) act as an access
point with backup routers (neighbor(not BDR-backup designated router) or adjacent(linked to
neighbour))
Discussion of Findings:
Link State Establishment: Each router transitions between neighbour and adjacent state.
Each router according to LSA has its own individual unique LSDB
DR election process: Priority set at 1. If priority of 0 then it doesn’t participate in the election.
Highest priority becomes the Designated Router (sends advertisements for efficiency)
Cost metric formula 10^8/bandwidth
By using the bandwidth, the metric accuracy is improved
A link state protocol, uses LSA (link state advertisement) the information is LSA saved on the
LSDB (link state database) on the routing table.
Router ID is 32-bit used to identify each router running OSPF protocol
If a logical interface has been configured the Router ID is the highest configured logical
interfaces IP address
OSPF areas-single area
As the network grows, Area 0 is recommended but can be assigned
Multi area
Allows an OSPF to compartmentalise based on a link state database that is identical for an
area while granting information on destination of the OSPF domain
Default Process id 1
Selects the lowest router ID
[RTA-ospf-1-area-0.0.0.0]network 192.168.1.0 0.0.0.255
The network to be advertised.
OSPF authentication
Once advertisement is concluded, security can be incorporated
[RTA-GigabitEthernet0/0/0]ospf authentication-mode md5 1 huawei
OSPF silent interface
Prevent an interface from forming neighbor relationships with peers (sharing its router table)
DR and BDR use the multicast address 224.0.0.6
DHCP address acquisition
Discover (broadcast)
Offer (unicast)
Request (broadcast)
ACK (unicast)
DHCP lease renewal request (unicast)
DHCP interface pool configuration
Dhcp select interface
Dhco server dns-list 10.1.1.2
Dhcp server excluded-ip-address 10.1.1.2 ***excluded the Ip address of the DNS IP address
server
Exclude the gateway IP address as it is used by everyone as an entry.
DHCP global pool configuration
Dhcp enable
[Huawei-ip-pool-pool2]network 10.2.2.0 mask 24
[Huawei-ip-pool-pool2]gateway-list 10.2.2.1
[Huawei-ip-pool-pool2]lease day 1
[Huawei-ip-pool-pool2]quit
[Huawei-GigabitEthernet0/0/1]dhcp select global
FTP protocol
Sending files
E.g Updating operating system
Telnet protocol principel
Remote access for large organisations
Security, ssh
Telnet client and telnet server
Password vty 0 4
Gateway vs next hop (address)
Switches have a gateway only if it is layer 3 separating full access to private access. On a
router, its port assigned Ip address
Default gateway: IP address door taking your from one subnet to another.
Layer 2 switch have are not gateways they use MAC addresses and are on the same LAN
VLANs isolate into sub interfaces - datalink layer
Next hop is a link for a specific device to another port.
Intermediate Training
Huawei enterprise solutions for performance, scalability, reliability, security and management
Link Aggregation
Optimizing the throughput of data, link aggregation enables the binding of multiple physical
interfaces into a single logical pipe. (Performance, scalability, reliability)
Link Aggregation
Provides for increased bandwidth, enhanced reliability and support of load balancing.
Application in the Enterprise Network
Where is demand for data transmission the highest. Point of departure to foreign destination,
Like Aggregation Modes
on the LACP on a link aggregation
Data Flow Control
Speed 1000.
Frames with the same source MAC addresses are transmitted over the same physical link
Frames with the same destination....
….
….
…
...
L2 Link Aggregation Configuration
L3 Link Aggregation Configuration
Transition the trunk from 2nd layer to the 3rd layer
Use undo port switch, then an IP address can be assigned to the interface.
Displaying Aggrgation
….
VLAN routing
VLAN Disadvantages
Forbidden access
VLAN Routing
VLAN frames are routed over a trunk link for port conservation.
VLAN routing features
2 IP addresses however one IP address is virtual – sub interface
VLAN Routing Config
**[SWA]vlan batch 2 3
[SWA]port link-type access
[SWA]port trunk allow-access all**
[RTA] interface GigabitEthenet0/0/0/1.1... Creating the sub interface
[RTA-GigabitEthernet0/0/1.1]dotlq terminate vid 2
performs port receiving VLAN packet will remove the VLAN tag from the fram and forward
the packet via layer 3 routing
[RTA-GigabitEthernet0/0/1.1]arp broadcast enable
Applied to each logical interface, if it remains disabled on the sub-interface the router will
discard packets!!
*** learn the sequence of all commands****
L3 Switch based VLAN routing
VLANIF (VLAN interfaces) are used by each VLAN as a route gateway.
Benefit over router:
Forwarding VLAN traffic with minimum delay.
Known as line speed forwarding
VLAN Gateway assigned
Technical Skills:
o Mastered network fundamentals, including TCP/IP and OSI model
o Gained proficiency in configuring and troubleshooting network devices
o Developed expertise in network security, implementing measures to protect
the network
o Acquired skills in network automation using Python and Ansible
o Gained knowledge of cloud networking concepts and practices
Soft Skills:
o Enhanced problem-solving and analytical skills
o Improved communication and collaboration skills
o Developed the ability to work effectively in a team environment
[1] S. Kumar, M. K. Chaube and S. Kumar, "Secure and Sustainable Framework for Cattle Recognition Using
Wireless Multimedia Networks and Machine Learning Techniques," in IEEE Transactions on Sustainable
Computing, vol. 7, no. 3, pp. 696-708, 1 July-Sept. 2022, doi: 10.1109/TSUSC.2021.3123496.
[2] P. Kumar et al., "PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-
Learning for IoT-Driven Smart Cities," in IEEE Transactions on Network Science and Engineering, vol. 8,
no. 3, pp. 2326-2341, 1 July-Sept. 2021, doi: 10.1109/TNSE.2021.3089435.
[3] S. Yılmaz, E. Aydogan and S. Sen, "A Transfer Learning Approach for Securing Resource-Constrained IoT
Devices," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4405-4418, 2021, doi:
10.1109/TIFS.2021.3096029.
[4] N. Chawla, A. Singh, H. Kumar, M. Kar and S. Mukhopadhyay, "Securing IoT Devices Using Dynamic
Power Management: Machine Learning Approach," in IEEE Internet of Things Journal, vol. 8, no. 22, pp.
16379-16394, 15 Nov.15, 2021, doi: 10.1109/JIOT.2020.3021594.
[5] D. H. Hagos, A. Yazidi, Ø. Kure and P. E. Engelstad, "A Machine-Learning-Based Tool for Passive OS
Fingerprinting With TCP Variant as a Novel Feature," in IEEE Internet of Things Journal, vol. 8, no. 5, pp.
3534-3553, 1 March1, 2021, doi: 10.1109/JIOT.2020.3024293.
[6] M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali and M. Guizani, "A Survey of Machine and Deep
Learning Methods for Internet of Things (IoT) Security," in IEEE Communications Surveys & Tutorials,
vol. 22, no. 3, pp. 1646-1685, thirdquarter 2020, doi: 10.1109/COMST.2020.2988293.
[7] S. Zafar et al., "A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet
of Bio-Nano Things," in IEEE Access, vol. 9, pp. 93529-93566, 2021, doi:
10.1109/ACCESS.2021.3093442.
[8] W. Y. B. Lim et al., "Hierarchical Incentive Mechanism Design for Federated Machine Learning in Mobile
Networks," in IEEE Internet of Things Journal, vol. 7, no. 10, pp. 9575-9588, Oct. 2020, doi:
10.1109/JIOT.2020.2985694.
[9] M. U. Aftab et al., "A Hybrid Access Control Model With Dynamic COI for Secure Localization of Satellite
and IoT-Based Vehicles," in IEEE Access, vol. 8, pp. 24196-24208, 2020, doi:
10.1109/ACCESS.2020.2969715.
[10] O. Mendsaikhan, H. Hasegawa, Y. Yamaguchi and H. Shimada, "Quantifying the Significance and
Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph," in
IEEE Access, vol. 8, pp. 177041-177052, 2020, doi: 10.1109/ACCESS.2020.3027321.
[11] N. M. Karie, N. M. Sahri, W. Yang, C. Valli and V. R. Kebande, "A Review of Security Standards and
Frameworks for IoT-Based Smart Environments," in IEEE Access, vol. 9, pp. 121975-121995, 2021, doi:
10.1109/ACCESS.2021.3109886.
[12] M. Saharkhizan, A. Azmoodeh, A. Dehghantanha, K. -K. R. Choo and R. M. Parizi, "An Ensemble of Deep
Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic," in IEEE Internet of
Things Journal, vol. 7, no. 9, pp. 8852-8859, Sept. 2020, doi: 10.1109/JIOT.2020.2996425.
[13] A. Kovačević, N. Putnik and O. Tošković, "Factors Related to Cyber Security Behavior," in IEEE Access,
vol. 8, pp. 125140-125148, 2020, doi: 10.1109/ACCESS.2020.3007867.
[14] B. Chatterjee, D. Das, S. Maity and S. Sen, "RF-PUF: Enhancing IoT Security Through Authentication of
Wireless Nodes Using In-Situ Machine Learning," in IEEE Internet of Things Journal, vol. 6, no. 1, pp. 388-
398, Feb. 2019, doi: 10.1109/JIOT.2018.2849324.
[15] M. H. Cintuglu, O. A. Mohammed, K. Akkaya and A. S. Uluagac, "A Survey on Smart Grid Cyber-Physical
System Testbeds," in IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 446-464, Firstquarter
2017, doi: 10.1109/COMST.2016.2627399.
[16] R. Kozik, M. Choraś and W. Hołubowicz, "Packets tokenization methods for web layer cyber security," in
Logic Journal of the IGPL, vol. 25, no. 1, pp. 103-113, Feb. 2017, doi: 10.1093/jigpal/jzw044.