Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review

被引:0
作者
Al-Shurbaji, Tamara [1 ]
Anbar, Mohammed [1 ]
Manickam, Selvakumar [1 ]
Hasbullah, Iznan H. [1 ]
Alfriehat, Nadia [1 ]
Alabsi, Basim Ahmad [2 ]
Alzighaibi, Ahmad Reda [3 ]
Hashim, Hasan [3 ]
机构
[1] Univ Sains Malaysia, Natl Adv IPv6 Ctr NAv6, Minden Hts 11800, Penang, Malaysia
[2] Najran Univ, Appl Coll, Najran 61441, Saudi Arabia
[3] Taibah Univ, Coll Comp Sci & Engn, Dept Informat Syst, Madinah 42353, Saudi Arabia
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Internet of Things; Botnet; Reviews; Wireless sensor networks; Security; Service-oriented architecture; Sensors; Medical services; Manufacturing; Radiofrequency identification; Intrusion detection system (IDS); botnet; deep learning; Internet of Things (IoT); IoT Botnet; neural networks; NEURAL-NETWORK; INTERNET; THINGS; SECURITY; CHALLENGES;
D O I
10.1109/ACCESS.2025.3526711
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of Internet of Things (IoT) devices has brought about an increased threat of botnet attacks, necessitating robust security measures. In response to this evolving landscape, deep learning (DL)-based intrusion detection systems (IDS) have emerged as a promising approach for detecting and mitigating botnet activities in IoT environments. Therefore, this paper thoroughly reviews existing literature on botnet detection in the IoT using DL-based IDS. It consolidates and analyzes a wide range of research papers, highlighting key findings, methodologies, advancements, shortcomings, and challenges in the field. Additionally, we performed a qualitative comparison with existing surveys using author-defined metrics to underscore the uniqueness of this survey. We also discuss challenges, limitations, and future research directions, emphasizing the distinctive contributions of our review. Ultimately, this survey serves as a guideline for future researchers, contributing to the advancement of botnet detection methods in IoT environments and enhancing security against botnet threats.
引用
收藏
页码:11792 / 11822
页数:31
相关论文
共 103 条
[51]  
Lueth K. L., 2015, The 10 Most Popular Internet of Things Applications Right Now
[52]  
Lund D., 2014, Worldwide and Regional Internet of Things (IoT) 2014-2020 Forecast: A Virtuous Circle of Proven Value and Demand
[53]   IoT-Based Data Logger for Weather Monitoring Using Arduino-Based Wireless Sensor Networks with Remote Graphical Application and Alerts [J].
Mabrouki, Jamal ;
Azrour, Mourade ;
Dhiba, Driss ;
Farhaoui, Yousef ;
El Hajjaji, Souad .
BIG DATA MINING AND ANALYTICS, 2021, 4 (01) :25-32
[54]  
Micro T., 2020, Tech. Rep.
[55]   Service-oriented architecture for Internet of Things: A semantic approach [J].
Mishra, Sugyan Kumar ;
Sarkar, Anirban .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) :8765-8776
[56]   An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things [J].
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :4815-4830
[57]   Genetic convolutional neural network for intrusion detection systems [J].
Nguyen, Minh Tuan ;
Kim, Kiseon .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 :418-427
[58]   Mapping the values of IoT [J].
Nicolescu, Razvan ;
Huth, Michael ;
Radanliev, Petar ;
De Roure, David .
JOURNAL OF INFORMATION TECHNOLOGY, 2018, 33 (04) :345-360
[59]   Fast-flux Botnet Detection Method Based on Spatiotemporal Feature of Network Traffic [J].
Niu Weina ;
Jiang Tianyu ;
Zhang Xiaosong ;
Xie Jiao ;
Zhang Junzhe ;
Zhao Zhenfei .
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (08) :1872-1880
[60]   The Internet of Things: Review and theoretical framework [J].
Nord, Jeretta Horn ;
Koohang, Alex ;
Paliszkiewicz, Joanna .
EXPERT SYSTEMS WITH APPLICATIONS, 2019, 133 :97-108