A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges

被引:157
作者
Thakkar, Ankit [1 ]
Lohiya, Ritika [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad, Gujarat, India
关键词
NETWORK INTRUSION DETECTION; RECURRENT NEURAL-NETWORKS; FEATURE-SELECTION; ANOMALY DETECTION; DETECTION SYSTEM; DETECTION SCHEME; RANDOM FOREST; K-MEANS; INTERNET; THINGS;
D O I
10.1007/s11831-020-09496-0
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical environment with the cyber world and create one big intelligent network. This technology has been applied to various application domains such as developing smart home, smart cities, healthcare applications, wireless sensor networks, cloud environment, enterprise network, web applications, and smart grid technologies. These wide emerging applications in variety of domains raise many security issues such as protecting devices and network, attacks in IoT networks, and managing resource-constrained IoT networks. To address the scalability and resource-constrained security issues, many security solutions have been proposed for IoT such as web application firewalls and intrusion detection systems. In this paper, a comprehensive survey on Intrusion Detection System (IDS) for IoT is presented for years 2015-2019. We have discussed various IDS placement strategies and IDS analysis strategies in IoT architecture. The paper discusses various intrusions in IoT, along with Machine Learning (ML) and Deep Learning (DL) techniques for detecting attacks in IoT networks. The paper also discusses security issues and challenges in IoT.
引用
收藏
页码:3211 / 3243
页数:33
相关论文
共 193 条
[1]  
Aazam M, 2014, INT BHURBAN C APPL S, P414, DOI 10.1109/IBCAST.2014.6778179
[2]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[3]  
Ahamed J, 2016, INT C ELECT DEVICE S
[4]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[5]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[6]  
Al-Fuqaha A, 2015, IEEE COMMUN MAG, V53, P72, DOI 10.1109/MCOM.2015.7263375
[7]   Using adaptive neural networks to provide self-healing autonomic software [J].
Al-Jumeily, Dhiya ;
Hussain, Abir ;
Fergus, Paul .
INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (03) :129-140
[8]  
Alhajri R, 2019, INT J APPL ENG RES, V14, P2417
[9]   Deep Pain: Exploiting Long Short-Term Memory Networks for Facial Expression Classification [J].
Rodriguez, Pau ;
Cucurull, Guillem ;
Gonzalez, Jordi ;
Gonfaus, Josep M. ;
Nasrollahi, Kamal ;
Moeslund, Thomas B. ;
Roca, F. Xavier .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (05) :3314-3324
[10]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160