Intelligent agents defending for an IoT world: A review

被引:31
作者
Coulter, Rory [1 ]
Pan, Lei [2 ]
机构
[1] Swinburne Univ Technol, Sch Software & Elect Engn, Fac Sci Engn & Technol, Hawthorn, Vic 3122, Australia
[2] Fac Sci Engn & Built Environm, Sch Informat Technol, Geelong, Vic 3220, Australia
关键词
Intrusion detection; Artificial intelligence; Machine learning; Internet of Things; Cyber security; Data driven cyber security; INTRUSION DETECTION SYSTEM; FEATURE-SELECTION; INTERNET; NETWORKS; MACHINE; THINGS; PREVENTION; SECURITY; INTRUDER; MODEL;
D O I
10.1016/j.cose.2017.11.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Transition to the Internet of Things (IoT) is progressing without realization. In light of this securing traditional systems is still a challenging role requiring a mixture of solutions which may negatively impact, or simply, not scale to a desired operational level. Rule and signature based intruder detection remains prominent in commercial deployments, while the use of machine learning for anomaly detection has been an active research area. Behavior detection means have also benefited from the widespread use of mobile and wireless applications. For the use of smart defense systems we propose that we must widen our perspective to not only security, but also to the domains of artificial intelligence and the IoT in better understanding the challenges that lie ahead in hope of achieving autonomous defense. We investigate how intruder detection fits within these domains, particularly as intelligent agents. How current approaches of intruder detection fulfill their role as intelligent agents, the needs of autonomous action regarding compromised nodes that are intelligent, distributed and data driven. The requirements of detection agents among IoT security are vulnerabilities, challenges and their applicable methodologies. In answering aforementioned questions, a survey of recent research work is presented in avoiding refitting old solutions into new roles. This survey is aimed toward security researchers or academics, IoT developers and information officers concerned with the covered areas. Contributions made within this review are the review of literature of traditional and distributed approaches to intruder detection, modeled as intelligent agents for an IoT perspective; defining a common reference of key terms between fields of intruder detection, artificial intelligence and the IoT, identification of key defense cycle requirements for defensive agents, relevant manufacturing and security challenges; and considerations to future development. As the turn of the decade draws nearer we anticipate 2020 as the turning point where deployments become common, not merely just a topic of conversation but where the need for collective, intelligent detection agents work across all layers of the IoT becomes a reality. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:439 / 458
页数:20
相关论文
共 81 条
[1]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[2]   Self-Organized Things (SoT): An energy efficient next generation network management [J].
Akgul, Ozgur Umut ;
Canberk, Berk .
COMPUTER COMMUNICATIONS, 2016, 74 :52-62
[3]   Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection [J].
Al-Jarrah, Omar Y. ;
Alhussein, Omar ;
Yoo, Paul D. ;
Muhaidat, Sami ;
Taha, Kamal ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (08) :1796-1806
[4]   Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure [J].
Ali, Muhammad Qasim ;
Al-Shaer, Ehab .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 18 (02)
[5]   Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning [J].
Ali, Muhammad Qasim ;
Al-Shaer, Ehab ;
Khan, Hassan ;
Khayam, Syed Ali .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2013, 15 (04)
[6]   Security of Software Defined Networks: A survey [J].
Alsmadr, Izzat ;
Xu, Dianxiang .
COMPUTERS & SECURITY, 2015, 53 :79-108
[7]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[8]  
[Anonymous], COMMUNICATIONS SURVE
[9]  
[Anonymous], 2007, P 21 INT C ADV INFOR
[10]  
[Anonymous], 2014, P 2014 WORKSH ART IN, DOI DOI 10.1145/2666652.2666664