Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature

被引:6
作者
Saadouni, Rafika [1 ]
Gherbi, Chirihane [1 ]
Aliouat, Zibouda [1 ]
Harbi, Yasmine [1 ]
Khacha, Amina [1 ]
机构
[1] Ferhat Abbas Univ Setif 1, LRSD Lab, Setif, Algeria
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 07期
基金
英国科研创新办公室;
关键词
Intrusion detection systems (IDSes); Internet of things (IoT); Machine learning (ML); Deep learning (DL); Bio-inspired; SLR; HYBRID; OPTIMIZATION; INTERNET; THINGS; MODEL;
D O I
10.1007/s10586-024-04388-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent technological advancements have significantly expanded both networks and data, thereby introducing new forms of attacks that pose considerable challenges to intrusion detection and network security. With intruders deploying increasingly diverse attack vectors, the need for robust Intrusion Detection Systems (IDSes) has become paramount. IDS serves as a crucial tool for monitoring network traffic to uphold the integrity, confidentiality, and availability of systems. Despite the integration of Machine Learning (ML) and Deep Learning (DL) algorithms into IDS frameworks, achieving higher accuracy levels while minimizing false alarms remains a challenging task, especially when handling large datasets. In response to this challenge, researchers have turned to bio-inspired algorithms as potential solutions to enhance IDS models. This paper undertakes a comprehensive literature review focusing on augmenting the security of Internet of Things (IoT) networks by integrating bio-inspired methodologies with ML and DL techniques. Among 145 published articles, 25 relevant studies were selected to address the defined research objectives. The findings underscore the efficacy of combining bio-inspired techniques with ML and DL approaches in enhancing IDS performance, highlighting their potential to bolster IoT network security. Furthermore, the review incorporates a comparative analysis of the selected articles, considering various factors, and outlines ongoing challenges and future directions in integrating bio-inspired techniques with ML and DL algorithms.
引用
收藏
页码:8655 / 8681
页数:27
相关论文
共 88 条
  • [1] Abd Jalil K, 2010, INT CONF NETWORK INF, P221, DOI 10.1109/ICNIT.2010.5508526
  • [2] Agrawal R., 1994, P 20 INT C VER LARG, P487
  • [3] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [4] Al Tawil Arar, 2021, 2021 International Conference on Information Technology (ICIT), P377, DOI 10.1109/ICIT52682.2021.9491690
  • [5] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
    Al-Garadi, Mohammed Ali
    Mohamed, Amr
    Al-Ali, Abdulla Khalid
    Du, Xiaojiang
    Ali, Ihsan
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
  • [6] Al-Yaseen Wathiq Laftah, 2019, IAENG International Journal of Computer Science, V46, P534
  • [7] Review on Feature Selection Algorithms for Anomaly-Based Intrusion Detection System
    Alamiedy, Taief Alaa
    Anbar, Mohammed
    Al-Ani, Ahmed K.
    Al-Tamimi, Bassam Naji
    Faleh, Nameer
    [J]. RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 605 - 619
  • [8] A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System
    Almomani, Omar
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 409 - 429
  • [9] Anushiya R, 2023, Measur Sensors, V26, DOI DOI 10.1016/J.MEASEN.2023.100700
  • [10] Atashpaz-Gargari E, 2007, IEEE C EVOL COMPUTAT, P4661, DOI 10.1109/cec.2007.4425083