Network Intrusion Detection for IoT Security Based on Learning Techniques

被引:493
作者
Chaabouni, Nadia [1 ,2 ]
Mosbah, Mohamed [3 ]
Zemmari, Akka [3 ]
Sauvignac, Cyrille [2 ]
Faruki, Parvez [4 ]
机构
[1] Univ Bordeaux, Bordeaux Lab Res Comp Sci, CNRS, Bordeaux INP, F-33405 Bordeaux, France
[2] Atos Innovat Aquitaine Lab, F-33600 Pessac, France
[3] Univ Bordeaux, Bordeaux Lab Res Comp Sci, CNRS, Bordeaux INP,UMR 5800, F-33405 Bordeaux, France
[4] Govt Gujarat, Dept Tech Educ, AV Parekh Tech Inst Rajkot, Rajkot, Gujarat, India
关键词
Internet of Things; security; network security; intrusion detection; databases; machine learning; learning (artificial intelligence); DETECTION SYSTEMS; DATA ANALYTICS; INTERNET; THINGS; FRAMEWORK; MACHINE; MOBILE; ATTACK; CHALLENGES; PRIVACY;
D O I
10.1109/COMST.2019.2896380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn cyberattack exposed the critical fault-lines among smart networks. Security of IoT has become a critical concern. The danger exposed by infested Internet-connected Things not only affects the security of IoT but also threatens the complete Internet eco-system which can possibly exploit the vulnerable Things (smart devices) deployed as botnets. Mirai malware compromised the video surveillance devices and paralyzed Internet via distributed denial of service attacks. In the recent past, security attack vectors have evolved both ways, in terms of complexity and diversity. Hence, to identify and prevent or detect novel attacks, it is important to analyze techniques in IoT context. This survey classifies the IoT security threats and challenges for IoT networks by evaluating existing defense techniques. Our main focus is on network intrusion detection systems (NIDSs); hence, this paper reviews existing NIDS implementation tools and datasets as well as free and open-source network sniffing software. Then, it surveys, analyzes, and compares state-of-the-art NIDS proposals in the IoT context in terms of architecture, detection methodologies, validation strategies, treated threats, and algorithm deployments. The review deals with both traditional and machine learning (ML) NIDS techniques and discusses future directions. In this survey, our focus is on IoT NIDS deployed via ML since learning algorithms have a good success rate in security and privacy. The survey provides a comprehensive review of NIDSs deploying different aspects of learning techniques for IoT, unlike other top surveys targeting the traditional systems. We believe that, this paper will be useful for academia and industry research, first, to identify IoT threats and challenges, second, to implement their own NIDS and finally to propose new smart techniques in IoT context considering IoT limitations. Moreover, the survey will enable security individuals differentiate IoT NIDS from traditional ones.
引用
收藏
页码:2671 / 2701
页数:31
相关论文
共 154 条
[1]   On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks [J].
Abduvaliyev, Abror ;
Pathan, Al-Sakib Khan ;
Zhou, Jianying ;
Roman, Rodrigo ;
Wong, Wai-Choong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1223-1237
[2]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[3]   The role of big data analytics in Internet of Things [J].
Ahmed, Ejaz ;
Yaqoob, Ibrar ;
Hashem, Ibrahim Abaker Targio ;
Khan, Imran ;
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Imran, Muhammad ;
Vasilakos, Athanasios V. .
COMPUTER NETWORKS, 2017, 129 :459-471
[4]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[5]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[6]   Confidential smart-sensing framework in the IoT era [J].
Al-Turjman, Fadi ;
Alturjman, Sinem .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (10) :5187-5198
[7]   Fog-based caching in software-defined information-centric networks [J].
Al-Turjman, Fadi .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :54-67
[8]   Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications [J].
Al-Turjman, Fadi ;
Alturjman, Sinem .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) :2736-2744
[9]   RETRACTED: QoS-aware data delivery framework for safety-inspired multimedia in integrated vehicular-IoT (Retracted article. See vol. 145, pg. 345, 2019) [J].
Al-Turjman, Fadi .
COMPUTER COMMUNICATIONS, 2018, 121 :33-43
[10]   Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks [J].
Al-Turjman, Fadi ;
Ever, Yoney Kirsal ;
Ever, Enver ;
Nguyen, Huan X. ;
David, Deebak Bakkiam .
IEEE ACCESS, 2017, 5 :24617-24631