Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review

被引:119
作者
Abdullahi, Mujaheed [1 ]
Baashar, Yahia [2 ]
Alhussian, Hitham [1 ]
Alwadain, Ayed [3 ]
Aziz, Norshakirah [1 ]
Capretz, Luiz Fernando [4 ]
Abdulkadir, Said Jadid [1 ]
机构
[1] Univ Teknol PETRONAS, Dept Comp & Informat Sci, Seri Iskandar 32610, Perak, Malaysia
[2] Univ Tenaga Nas, Inst Sustainable Energy ISE, Kajang 43000, Malaysia
[3] King Saud Univ, Community Coll, Comp Sci Dept, Riyadh 145111, Saudi Arabia
[4] Western Univ, Dept Elect & Comp Engn, London, ON N6A 5B9, Canada
关键词
systematic literature review; internet of things; artificial intelligence; machine learning; deep learning; intrusion detection systems; cybersecurity; cyberattacks; INTRUSION DETECTION SYSTEM; DEEP LEARNING APPROACH; DETECTION FRAMEWORK; IOT; SECURITY; AI; PRIVACY; CHALLENGES; ALGORITHM; NETWORKS;
D O I
10.3390/electronics11020198
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0), where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have evolved exponentially on a large scale. The rapid development of IoT devices and networks in various forms generate enormous amounts of data which in turn demand careful authentication and security. Artificial intelligence (AI) is considered one of the most promising methods for addressing cybersecurity threats and providing security. In this study, we present a systematic literature review (SLR) that categorize, map and survey the existing literature on AI methods used to detect cybersecurity attacks in the IoT environment. The scope of this SLR includes an in-depth investigation on most AI trending techniques in cybersecurity and state-of-art solutions. A systematic search was performed on various electronic databases (SCOPUS, Science Direct, IEEE Xplore, Web of Science, ACM, and MDPI). Out of the identified records, 80 studies published between 2016 and 2021 were selected, surveyed and carefully assessed. This review has explored deep learning (DL) and machine learning (ML) techniques used in IoT security, and their effectiveness in detecting attacks. However, several studies have proposed smart intrusion detection systems (IDS) with intelligent architectural frameworks using AI to overcome the existing security and privacy challenges. It is found that support vector machines (SVM) and random forest (RF) are among the most used methods, due to high accuracy detection another reason may be efficient memory. In addition, other methods also provide better performance such as extreme gradient boosting (XGBoost), neural networks (NN) and recurrent neural networks (RNN). This analysis also provides an insight into the AI roadmap to detect threats based on attack categories. Finally, we present recommendations for potential future investigations.
引用
收藏
页数:27
相关论文
共 98 条
[21]   Unsupervised machine learning for network-centric anomaly detection in IoT [J].
Bhatia, Randeep ;
Benno, Steven ;
Esteban, Jairo ;
Lakshman, T., V ;
Grogan, John .
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS, 2019, :42-48
[22]   Machine Learning Cyberattack and Defense Strategies [J].
Bland, John A. ;
Petty, Mikel D. ;
Whitaker, Tymaine S. ;
Maxwell, Katia P. ;
Cantrell, Walter Alan .
COMPUTERS & SECURITY, 2020, 92
[23]  
Chatterjee S., ARXIV210615349
[24]   Discussion on IoT Security Recommendations against the State-of-the-Art Solutions [J].
Chmiel, Marta ;
Korona, Mateusz ;
Koziol, Fryderyk ;
Szczypiorski, Krzysztof ;
Rawski, Mariusz .
ELECTRONICS, 2021, 10 (15)
[25]   Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities [J].
Choo, K. -K. R. ;
Yan, Z. ;
Meng, W. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) :4119-4121
[26]  
Dilek S., 2015, International Journal of Artificial Intelligence Applications (IJAIA), V6, DOI DOI 10.5121/IJAIA.2015.6102
[27]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768
[28]   Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure [J].
Djenna, Amir ;
Harous, Saad ;
Saidouni, Djamel Eddine .
APPLIED SCIENCES-BASEL, 2021, 11 (10)
[29]   Machine Learning DDoS Detection for Consumer Internet of Things Devices [J].
Doshi, Rohan ;
Apthorpe, Noah ;
Feamster, Nick .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :29-35
[30]   Fuzzy pattern tree for edge malware detection and categorization in IoT [J].
Dovom, Ensieh Modiri ;
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Newton, David Ellis ;
Parizi, Reza M. ;
Karimipour, Hadis .
JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 97 :1-7