Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems

被引:6
作者
AboulEla, Samar [1 ]
Ibrahim, Nourhan [1 ,2 ]
Shehmir, Sarama [1 ]
Yadav, Aman [1 ]
Kashef, Rasha [1 ]
机构
[1] Toronto Metropolitan Univ, Elect Comp & Biomed Engn, Toronto, ON M5B 2K3, Canada
[2] Alexandria Univ, Fac Engn, Alexandria 5424041, Egypt
关键词
cybersecurity; cyberattacks; intrusion detection; Transformers; deep learning (DL); machine learning (ML); Internet of Things (IoT); HEALTH-CARE-SYSTEMS; INTRUSION DETECTION; TRANSFORMER; ROBUST; MODEL;
D O I
10.3390/ai5020037
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) is seeing significant growth, as the quantity of interconnected devices in communication networks is on the rise. The increased connectivity of devices has heightened their susceptibility to hackers, underscoring the need to safeguard IoT devices. This research investigates cybersecurity in the context of the Internet of Medical Things (IoMT), which encompasses the cybersecurity mechanisms used for various healthcare devices connected to the system. This study seeks to provide a concise overview of several artificial intelligence (AI)-based methodologies and techniques, as well as examining the associated solution approaches used in cybersecurity for healthcare systems. The analyzed methodologies are further categorized into four groups: machine learning (ML) techniques, deep learning (DL) techniques, a combination of ML and DL techniques, Transformer-based techniques, and other state-of-the-art techniques, including graph-based methods and blockchain methods. In addition, this article presents a detailed description of the benchmark datasets that are recommended for use in intrusion detection systems (IDS) for both IoT and IoMT networks. Moreover, a detailed description of the primary evaluation metrics used in the analysis of the discussed models is provided. Ultimately, this study thoroughly examines and analyzes the features and practicality of several cybersecurity models, while also emphasizing recent research directions.
引用
收藏
页码:704 / 732
页数:29
相关论文
共 62 条
[1]  
Admass Wasyihun Sema, 2024, Cyber Security and Applications, V2, DOI 10.1016/j.csa.2023.100031
[2]   ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things [J].
Ahmed, Mohiuddin ;
Byreddy, Surender ;
Nutakki, Anush ;
Sikos, Leslie F. ;
Haskell-Dowland, Paul .
AD HOC NETWORKS, 2021, 122
[3]  
Ahmed Syed Wahaj, 2023, 2023 International Telecommunications Conference (ITC-Egypt), P663, DOI 10.1109/ITC-Egypt58155.2023.10206134
[4]   Deep learning for cyber threat detection in IoT networks: A review [J].
Aldhaheri A. ;
Alwahedi F. ;
Ferrag M.A. ;
Battah A. .
Internet of Things and Cyber-Physical Systems, 2024, 4 :110-128
[5]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[6]   Resilient Security Framework Using TNN and Blockchain for IoMT [J].
Alsemmeari, Rayan A. ;
Dahab, Mohamed Yehia ;
Alsulami, Abdulaziz A. ;
Alturki, Badraddin ;
Algarni, Sultan .
ELECTRONICS, 2023, 12 (10)
[7]  
[Anonymous], IoTdataset-2022
[8]  
[Anonymous], Kitsune Network Attack Dataset
[9]  
[Anonymous], Cyber Attack Suspected in German Woman's Death
[10]  
[Anonymous], CIC-IDS2017 Dataset