Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection-Current Research Trends

被引:28
作者
Rafique, Saida Hafsa [1 ]
Abdallah, Amira [1 ]
Musa, Nura Shifa [1 ,2 ]
Murugan, Thangavel [3 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, POB 15551, Abu Dhabi, U Arab Emirates
[2] Al Ain Univ, Coll Engn, POB 15551, Abu Dhabi, U Arab Emirates
[3] United Arab Emirates Univ, Coll Informat Technol, Dept Informat Syst & Secur, POB 15551, Abu Dhabi, U Arab Emirates
关键词
anomaly; intrusion detection; Internet of Things; artificial intelligence; machine learning; deep learning; INTRUSION DETECTION SYSTEM; IOT SECURITY; CHALLENGES; COUNTERMEASURES; TAXONOMY;
D O I
10.3390/s24061968
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With its exponential growth, the Internet of Things (IoT) has produced unprecedented levels of connectivity and data. Anomaly detection is a security feature that identifies instances in which system behavior deviates from the expected norm, facilitating the prompt identification and resolution of anomalies. When AI and the IoT are combined, anomaly detection becomes more effective, enhancing the reliability, efficacy, and integrity of IoT systems. AI-based anomaly detection systems are capable of identifying a wide range of threats in IoT environments, including brute force, buffer overflow, injection, replay attacks, DDos attack, SQL injection, and back-door exploits. Intelligent Intrusion Detection Systems (IDSs) are imperative in IoT devices, which help detect anomalies or intrusions in a network, as the IoT is increasingly employed in several industries but possesses a large attack surface which presents more entry points for attackers. This study reviews the literature on anomaly detection in IoT infrastructure using machine learning and deep learning. This paper discusses the challenges in detecting intrusions and anomalies in IoT systems, highlighting the increasing number of attacks. It reviews recent work on machine learning and deep-learning anomaly detection schemes for IoT networks, summarizing the available literature. From this survey, it is concluded that further development of current systems is needed by using varied datasets, real-time testing, and making the systems scalable.
引用
收藏
页数:32
相关论文
共 108 条
[1]   Semi-Supervised Spatiotemporal Deep Learning for Intrusions Detection in IoT Networks [J].
Abdel-Basset, Mohamed ;
Hawash, Hossam ;
Chakrabortty, Ripon K. ;
Ryan, Michael J. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15) :12251-12265
[2]  
Abrishami M., 2022, P 2022 IEEE 19 INT C, P046
[3]   Deep learning-enabled anomaly detection for IoT systems [J].
Abusitta, Adel ;
de Carvalho, Glaucio H. S. ;
Wahab, Omar Abdel ;
Halabi, Talal ;
Fung, Benjamin C. M. ;
Al Mamoori, Saja .
INTERNET OF THINGS, 2023, 21
[4]   Service discovery and selection in IoT: A survey and a taxonomy [J].
Achir, Meriem ;
Abdelli, Abdelkrim ;
Mokdad, Lynda ;
Benothman, Jalel .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 200
[5]  
Ahmad I., 2023, ARPN J. Eng. Appl. Sci, V18, P1707
[6]   A comprehensive deep learning benchmark for IoT IDS [J].
Ahmad, Rasheed ;
Alsmadi, Izzat ;
Alhamdani, Wasim ;
Tawalbeh, Lo'ai .
COMPUTERS & SECURITY, 2022, 114
[7]  
Ahmed H.I., 2019, INT J ADV COMPUTER R, V9, P325, DOI [10.19101/IJACR.2019.940088, DOI 10.19101/IJACR.2019.940088]
[8]   Service-based Federated Deep Reinforcement Learning for Anomaly Detection in Fog Ecosystems [J].
AL-Naday, Mays ;
Reed, Martin ;
Dobre, Vlad ;
Toor, Salman ;
Volckaert, Bruno ;
De Turck, Filip .
2023 26TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS, ICIN, 2023,
[9]   Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives [J].
Alagheband, Mahdi R. ;
Mashatan, Atefeh .
INTERNET OF THINGS, 2022, 18
[10]   DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System for Industrial IOT [J].
Alani, Mohammed M. ;
Damiani, Ernesto ;
Ghosh, Uttam .
2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2022, :169-174