A systematic analysis of deep learning methods and potential attacks in internet-of-things surfaces

被引:8
作者
Barnawi, Ahmed [1 ]
Gaba, Shivani [2 ,5 ]
Alphy, Anna [3 ]
Jabbari, Abdoh [4 ]
Budhiraja, Ishan [5 ]
Kumar, Vimal [5 ]
Kumar, Neeraj [1 ,6 ,7 ,8 ,9 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Technol, Jeddah 80221, Saudi Arabia
[2] Panipat Inst Engn & Technol, Panipat 132102, Haryana, India
[3] SRM Inst Sci & Technol, Delhi NCR Campus, Ghaziabad, Uttar Pradesh, India
[4] Jazan Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci Network Engn, Jazan 45142, Saudi Arabia
[5] Bennett Univ, Sch Comp Sci Engn & Technol SCSET, Greater Noida 201310, Uttar Pradesh, India
[6] Thapar Inst Engn & Technol, Dept Comp Sci Engn, Patiala 147004, Punjab, India
[7] Graph Era Univ, Dept Comp Sci Engn, Dehra Dun, Uttaranchal, India
[8] Lebanese Amer Univ, Comp & Elect Engn, Beirut, Lebanon
[9] Chandigarh Univ, Dept Comp Sci & Engn, Chandigarh, Punjab, India
关键词
Deep learning; Artificial intelligence; Internet of things; Convolutional neural networks; Attacks; INTRUSION DETECTION; SECURITY; IOT; SCHEME; CHALLENGES; NETWORKS; DEVICES; DDOS;
D O I
10.1007/s00521-023-08634-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The usage of intelligent IoT devices is exponentially rising, and so the possibility of attacks in the IoT surfaces. The deep leaning algorithms are competent for directing the sanctuary investigation of IoT systems but have not upgraded the analysis of potential attacks in IoT. This paper aims to advance deep learning methods to create upgraded security strategies for IoT frameworks quickly. The study of the IoT security threats identified with inalienable or recently presented risks is done. Also, this paper does a quick examination of different possible attack surfaces for the IoT framework, and the potential risks identified with each character. The systematic survey of deep learning methods for IoT security and the existence of the chances, focal points, and weaknesses of every strategy opens the door significant for future research.
引用
收藏
页码:18293 / 18308
页数:16
相关论文
共 97 条
[1]  
Abdelhakim M, 2011, 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, P810, DOI 10.1109/MILCOM.2011.6127777
[2]   Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review [J].
Abdullahi, Mujaheed ;
Baashar, Yahia ;
Alhussian, Hitham ;
Alwadain, Ayed ;
Aziz, Norshakirah ;
Capretz, Luiz Fernando ;
Abdulkadir, Said Jadid .
ELECTRONICS, 2022, 11 (02)
[3]   Cloud monitoring: A survey [J].
Aceto, Giuseppe ;
Botta, Alessio ;
de Donato, Walter ;
Pescape, Antonio .
COMPUTER NETWORKS, 2013, 57 (09) :2093-2115
[4]  
Aggarwal A., 2021, Transforming Cybersecurity Solutions Using Blockchain, P115, DOI 10.1007/978-981-33-6858-3_7
[5]   A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things [J].
Al-Amiedy, Taief Alaa ;
Anbar, Mohammed ;
Belaton, Bahari ;
Kabla, Arkan Hammoodi Hasan ;
Hasbullah, Iznan H. ;
Alashhab, Ziyad R. .
SENSORS, 2022, 22 (09)
[6]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[7]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[8]  
Alsamiri Jadel, 2019, International Journal of Advanced Computer Science and Applications, V10, P627
[9]  
Aminanto ME, 2017, C INF SEC CRYPT
[10]   Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning [J].
Aminanto, Muhamad Erza ;
Kim, Kwangjo .
INFORMATION SECURITY APPLICATIONS, 2018, 10763 :212-223