MADS Based on DL Techniques on the Internet of Things (IoT): Survey

被引:4
作者
Talal, Hussah [1 ]
Zagrouba, Rachid [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 7059, Dammam 32252, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, POB 1982, Dammam 31441, Saudi Arabia
关键词
anomaly detection system; machine learning techniques; Deep Learning (DL) techniques; IoT devices; IoT networks; malware detection; INTRUSION DETECTION SYSTEM; NETWORK; SECURITY; CHALLENGES; DEVICES; PRIVACY; ATTACK;
D O I
10.3390/electronics10212598
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Technologically speaking, humanity lives in an age of evolution, prosperity, and great development, as a new generation of the Internet has emerged; it is the Internet of Things (IoT) which controls all aspects of lives, from the different devices of the home to the large industries. Despite the tremendous benefits offered by IoT, still there are some challenges regarding privacy and information security. The traditional techniques used in Malware Anomaly Detection Systems (MADS) could not give us as robust protection as we need in IoT environments. Therefore, it needed to be replaced with Deep Learning (DL) techniques to improve the MADS and provide the intelligence solutions to protect against malware, attacks, and intrusions, in order to preserve the privacy of users and increase their confidence in and dependence on IoT systems. This research presents a comprehensive study on security solutions in IoT applications, Intrusion Detection Systems (IDS), Malware Detection Systems (MDS), and the role of artificial intelligent (AI) in improving security in IoT.
引用
收藏
页数:37
相关论文
共 110 条
[1]  
Aalsalem MY, 2017, 2017 INTERNATIONAL CONFERENCE ON RADAR, ANTENNA, MICROWAVE, ELECTRONICS, AND TELECOMMUNICATIONS (ICRAMET), P124, DOI 10.1109/ICRAMET.2017.8253159
[2]   Ransomware Prediction Using Supervised Learning Algorithms [J].
Adamu, Umaru ;
Awan, Irfan .
2019 7TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2019), 2019, :57-63
[3]   Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization [J].
Adebayo, Olawale Surajudeen ;
Aziz, Normaziah Abdul .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[4]  
Agrawal R, 2019, INT CONF ACOUST SPEE, P3222, DOI [10.1109/ICASSP.2019.8682899, 10.1109/icassp.2019.8682899]
[5]   Machine learning approaches to IoT security: A systematic literature review [J].
Ahmad, Rasheed ;
Alsmadi, Izzat .
INTERNET OF THINGS, 2021, 14
[6]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[7]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[8]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[9]  
Alrashdi I, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P305, DOI 10.1109/CCWC.2019.8666450
[10]  
Anitha A., 2017, INT J TECHNOL, V7, P20, DOI [10.5958/2231-3915.2017.00005.0, DOI 10.5958/2231-3915.2017.00005.0]