MADS Based on DL Techniques on the Internet of Things (IoT): Survey

被引:4
作者
Talal, Hussah [1 ]
Zagrouba, Rachid [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 7059, Dammam 32252, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, POB 1982, Dammam 31441, Saudi Arabia
关键词
anomaly detection system; machine learning techniques; Deep Learning (DL) techniques; IoT devices; IoT networks; malware detection; INTRUSION DETECTION SYSTEM; NETWORK; SECURITY; CHALLENGES; DEVICES; PRIVACY; ATTACK;
D O I
10.3390/electronics10212598
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Technologically speaking, humanity lives in an age of evolution, prosperity, and great development, as a new generation of the Internet has emerged; it is the Internet of Things (IoT) which controls all aspects of lives, from the different devices of the home to the large industries. Despite the tremendous benefits offered by IoT, still there are some challenges regarding privacy and information security. The traditional techniques used in Malware Anomaly Detection Systems (MADS) could not give us as robust protection as we need in IoT environments. Therefore, it needed to be replaced with Deep Learning (DL) techniques to improve the MADS and provide the intelligence solutions to protect against malware, attacks, and intrusions, in order to preserve the privacy of users and increase their confidence in and dependence on IoT systems. This research presents a comprehensive study on security solutions in IoT applications, Intrusion Detection Systems (IDS), Malware Detection Systems (MDS), and the role of artificial intelligent (AI) in improving security in IoT.
引用
收藏
页数:37
相关论文
共 110 条
[11]  
[Anonymous], 2018, LASTLINE
[12]   A Supervised Intrusion Detection System for Smart Home IoT Devices [J].
Anthi, Eirini ;
Williams, Lowri ;
Slowinska, Malgorzata ;
Theodorakopoulos, George ;
Burnap, Pete .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :9042-9053
[13]  
Arshad J., REV PERFORMANCE ENER
[14]   A Comprehensive Review on Malware Detection Approaches [J].
Aslan, Omer ;
Samet, Refik .
IEEE ACCESS, 2020, 8 :6249-6271
[15]   The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo ;
Nitti, Michele .
COMPUTER NETWORKS, 2012, 56 (16) :3594-3608
[16]   Detecting crypto-ransomware in IoT networks based on energy consumption footprint [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Conti, Mauro ;
Choo, Kim-Kwang Raymond .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1141-1152
[17]   Future challenges for smart cities: Cyber-security and digital forensics [J].
Baig, Zubair A. ;
Szewczyk, Patryk ;
Valli, Craig ;
Rabadia, Priya ;
Hannay, Peter ;
Chernyshev, Maxim ;
Johnstone, Mike ;
Kerai, Paresh ;
Ibrahim, Ahmed ;
Sansurooah, Krishnun ;
Syed, Naeem ;
Peacock, Matthew .
DIGITAL INVESTIGATION, 2017, 22 :3-13
[18]  
Bakhtiar Fariz Andri, 2019, 2019 IEEE 1st Global Conference on Life Sciences and Technologies (LifeTech), P41, DOI 10.1109/LifeTech.2019.8884057
[19]  
Balla P.B., 2018, P 2018 INT C SMART C, V7, P1, DOI [10.1109/ICSCET.2018.8537344, DOI 10.1109/ICSCET.2018.8537344]
[20]  
Bohli J.-M., 2015, 2015 international conference on recent advances in internet of things (riot), P1, DOI DOI 10.1109/RIOT.2015.7104906