IoT security: a systematic literature review of feature selection methods for machine learning-based attack classification

被引:1
作者
Li, Jing [1 ]
Othman, Mohd Shahizan [1 ]
Hewan, Chen [2 ]
Yusuf, Lizawati Mi [3 ]
机构
[1] Univ Teknol Malaysia UTM, Fac Comp, Johor Baharu, Malaysia
[2] China Jiliang Univ, Digital Reform Res Ctr, Hangzhou, Peoples R China
[3] Univ Teknol Malaysia, Fac Comp, Skudai, Malaysia
关键词
internet of things; IoT; feature selection; FS; IoT dataset; attack detection; classification; IoT security; systematic literature review; SLR; machine learning; ML; deep learning; DL; BOTNET; INTERNET; THINGS; THREATS;
D O I
10.1504/IJESDF.2025.143475
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the age of the internet of things (IoT), ensuring security is crucial to protect the interconnected devices and systems. The capacity to identify cyberattacks is essential for IoT security, hence many academics have focused their efforts on developing powerful classification models that can identify intrusions to protect IoT infrastructure. One key factor in creating successful classification models for IoT security is feature selection. To assist researchers and practitioners in selecting the appropriate feature selection methods, this paper presents a systematic literature review of the literature on feature selection approaches for machine learning-based attack classification models in IoT security using IoT datasets. By analysing data from 1,272 studies published between January 2018 and December 2022 using preferred reporting items for systematic literature reviews and meta-analyses (PRISMA) guidelines, the review identifies 63 primary studies that meet inclusion criteria. The primary studies are analysed and categorised to answer research questions related to current practices, feature selection methods, benchmark IoT datasets, feature selection validation methods, limitations, challenges, and future directions. The review provides valuable insights for researchers and practitioners seeking to incorporate effective feature selection approaches in IoT security.
引用
收藏
页码:60 / 107
页数:49
相关论文
共 83 条
[1]   Machine learning approaches to IoT security: A systematic literature review [J].
Ahmad, Rasheed ;
Alsmadi, Izzat .
INTERNET OF THINGS, 2021, 14
[2]  
Ahmed A., 2022, 2022 INT C EL COMP E, P1, DOI [10.1109/ICECET55527.2022.9872817, DOI 10.1109/ICECET55527.2022.9872817]
[3]   A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions [J].
Ahmetoglu, Huseyin ;
Das, Resul .
INTERNET OF THINGS, 2022, 20
[4]   Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection [J].
Al Shorman, Amaal ;
Faris, Hossam ;
Aljarah, Ibrahim .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (07) :2809-2825
[5]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[6]   Anomaly Detection for Internet of Things Cyberattacks [J].
Alanazi, Manal ;
Aljuhani, Ahamed .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01) :261-279
[7]   A discrete time-varying greywolf IoT botnet detection system [J].
Alazab, Moutaz .
COMPUTER COMMUNICATIONS, 2022, 192 :405-416
[8]   IoT Botnet Attack Detection Based on Optimized Extreme Gradient Boosting and Feature Selection [J].
Alqahtani, Mnahi ;
Mathkour, Hassan ;
Ben Ismail, Mohamed Maher .
SENSORS, 2020, 20 (21) :1-21
[9]   Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection [J].
Aminanto, Muhamad Erza ;
Choi, Rakyong ;
Tanuwidjaja, Harry Chandra ;
Yoo, Paul D. ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :621-636
[10]   Detecting botnet by using particle swarm optimization algorithm based on voting system [J].
Asadi, Mehdi ;
Jamali, Mohammad Ali Jabraeil ;
Parsa, Saeed ;
Majidnezhad, Vahid .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :95-111