Intelligent agents defending for an IoT world: A review

被引:31
作者
Coulter, Rory [1 ]
Pan, Lei [2 ]
机构
[1] Swinburne Univ Technol, Sch Software & Elect Engn, Fac Sci Engn & Technol, Hawthorn, Vic 3122, Australia
[2] Fac Sci Engn & Built Environm, Sch Informat Technol, Geelong, Vic 3220, Australia
关键词
Intrusion detection; Artificial intelligence; Machine learning; Internet of Things; Cyber security; Data driven cyber security; INTRUSION DETECTION SYSTEM; FEATURE-SELECTION; INTERNET; NETWORKS; MACHINE; THINGS; PREVENTION; SECURITY; INTRUDER; MODEL;
D O I
10.1016/j.cose.2017.11.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Transition to the Internet of Things (IoT) is progressing without realization. In light of this securing traditional systems is still a challenging role requiring a mixture of solutions which may negatively impact, or simply, not scale to a desired operational level. Rule and signature based intruder detection remains prominent in commercial deployments, while the use of machine learning for anomaly detection has been an active research area. Behavior detection means have also benefited from the widespread use of mobile and wireless applications. For the use of smart defense systems we propose that we must widen our perspective to not only security, but also to the domains of artificial intelligence and the IoT in better understanding the challenges that lie ahead in hope of achieving autonomous defense. We investigate how intruder detection fits within these domains, particularly as intelligent agents. How current approaches of intruder detection fulfill their role as intelligent agents, the needs of autonomous action regarding compromised nodes that are intelligent, distributed and data driven. The requirements of detection agents among IoT security are vulnerabilities, challenges and their applicable methodologies. In answering aforementioned questions, a survey of recent research work is presented in avoiding refitting old solutions into new roles. This survey is aimed toward security researchers or academics, IoT developers and information officers concerned with the covered areas. Contributions made within this review are the review of literature of traditional and distributed approaches to intruder detection, modeled as intelligent agents for an IoT perspective; defining a common reference of key terms between fields of intruder detection, artificial intelligence and the IoT, identification of key defense cycle requirements for defensive agents, relevant manufacturing and security challenges; and considerations to future development. As the turn of the decade draws nearer we anticipate 2020 as the turning point where deployments become common, not merely just a topic of conversation but where the need for collective, intelligent detection agents work across all layers of the IoT becomes a reality. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:439 / 458
页数:20
相关论文
共 81 条
[11]   A Distributed Agent for Computational Pool [J].
Archibald, Christopher ;
Altman, Alon ;
Shoham, Yoav .
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, 2016, 8 (02) :190-202
[12]   Local Feature Selection for Data Classification [J].
Armanfard, Narges ;
Reilly, James P. ;
Komeili, Majid .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2016, 38 (06) :1217-1227
[13]   Reverse TCP and Social Engineering Attacks in the Era of Big Data [J].
Atwell, Christine ;
Blasi, Thomas ;
Hayajneh, Thaier .
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, :90-95
[14]   Multi-Agent System in Urban Traffic Signal Control [J].
Balaji, P. G. ;
Srinivasan, D. .
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 2010, 5 (04) :43-51
[15]   Representation Learning: A Review and New Perspectives [J].
Bengio, Yoshua ;
Courville, Aaron ;
Vincent, Pascal .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (08) :1798-1828
[16]   Two-Stage Decomposition of SNORT Rules towards Efficient Hardware Implementation [J].
Chen, Hao ;
Summerville, Douglas H. ;
Chen, Yu .
2009 7TH INTERNATIONAL WORKSHOP ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN 2009), 2009, :359-366
[17]   The Application of Extreme Learning Machines to the Network Intrusion Detection Problem [J].
Creech, Gideon ;
Jiang, Frank .
NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B, 2012, 1479 :1506-1511
[18]  
Desai P, 2015, IEEE INT CONF MO, P313, DOI [10.1109/MS.2015.51, 10.1109/MobServ.2015.51]
[19]   Efficient parallel implementation of kernel methods [J].
Diaz-Morales, Roberto ;
Navia-Vazquez, Angel .
NEUROCOMPUTING, 2016, 191 :175-186
[20]   Ensemble based collaborative and distributed intrusion detection systems: A survey [J].
Folino, Gianluigi ;
Sabatino, Pietro .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :1-16