MUMBAI, India, Jan. 2 -- Intellectual Property India has published a patent application (202541123772 A) filed by Ms. Gunanandhini S; Ms. Ananthi. S. N; Ms. Aswathy M P; and S. A. Engineering College, Chennai, Tamil Nadu, on Dec. 8, 2025, for 'hybrid multi-domain steganography system with cryptographic protection and adaptive embedding selection.'

Inventor(s) include Ms. Gunanandhini S; Ms. Ananthi. S. N; and Ms. Aswathy M P.

The application for the patent was published on Jan. 2, under issue no. 01/2026.

According to the abstract released by the Intellectual Property India: "Intrusion detection in Software-Defined Networking (SDN) for IoT environments faces challenges in accuracy, scalability, and real-time mitigation, leading to increased network vulnerabilities. This project proposes an ensemble model integrating K-Nearest Neighbors (KNN) and Light GBM to enhance intrusion detection efficiency. KNN classifies network traffic based on proximity, ensuring fast anomaly detection, while Light GBM leverages boosting techniques to improve accuracy and adaptability to evolving threats. The combined approach reduces false positives, enhances detection speed, and dynamically mitigates attacks through SDN controllers, ensuring minimal disruption to IoT networks. Compared to traditional methods, the proposed system achieves better scalability and faster response times, making it suitable for large-scale IoT deployments. Additionally, real-time decision-making capabilities allow for proactive threat management, preventing potential security breaches before they escalate. The model is validated using benchmark intrusion datasets, demonstrating superior performance in terms of accuracy, precision, and recall. By leveraging the complementary strengths of KNN and Light GBM, this solution enhances the security and resilience of IoT networks against sophisticated cyber threats. The proposed framework contributes to the development of an intelligent and adaptive intrusion detection system, improving overall IoT network protection and reducing the impact of malicious attacks."

Disclaimer: Curated by HT Syndication.