Deep learning and big data technologies for IoT security

被引:190
作者
Amanullah, Mohamed Ahzam [1 ]
Habeeb, Riyaz Ahamed Ariyaluran [2 ,3 ]
Nasaruddin, Fariza Hanum [3 ]
Gani, Abdullah [4 ,5 ]
Ahmed, Ejaz [5 ]
Nainar, Abdul Salam Mohamed [6 ]
Akim, Nazihah Md [2 ]
Imran, Muhammad [7 ]
机构
[1] Telekom Res & Dev Sdn Bhd, Res & Innovat Dev, Cyberjaya, Selangor, Malaysia
[2] Int Univ Malaya Wales, Fac Sci Technol Engn & Math, Kuala Lumpur, Malaysia
[3] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Informat Syst, Kuala Lumpur, Malaysia
[4] Univ Malaysia Sabah, Fac Comp & Informat, Kota Kinabalu, Sabah, Malaysia
[5] Univ Malaya, Ctr Res Mobile Cloud Comp, Kuala Lumpur, Malaysia
[6] Greenview Islamic Int Sch, Shah Alam, Selangor, Malaysia
[7] King Saud Univ, Coll Appl Comp Sci, Riyadh, Saudi Arabia
关键词
Deep learning; Big data; IoT security; INTRUSION DETECTION; ATTACK DETECTION; NEURAL-NETWORK; DATA ANALYTICS; ANOMALY DETECTION; ROUTING ATTACKS; APACHE SPARK; INTERNET; FRAMEWORK; AUTHENTICATION;
D O I
10.1016/j.comcom.2020.01.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Technology has become inevitable in human life, especially the growth of Internet of Things (IoT), which enables communication and interaction with various devices. However, IoT has been proven to be vulnerable to security breaches. Therefore, it is necessary to develop fool proof solutions by creating new technologies or combining existing technologies to address the security issues. Deep learning, a branch of machine learning has shown promising results in previous studies for detection of security breaches. Additionally, IoT devices generate large volumes, variety, and veracity of data. Thus, when big data technologies are incorporated, higher performance and better data handling can be achieved. Hence, we have conducted a comprehensive survey on state-of-the-art deep learning, IoT security, and big data technologies. Further, a comparative analysis and the relationship among deep learning, IoT security, and big data technologies have also been discussed. Further, we have derived a thematic taxonomy from the comparative analysis of technical studies of the three aforementioned domains. Finally, we have identified and discussed the challenges in incorporating deep learning for IoT security using big data technologies and have provided directions to future researchers on the IoT security aspects.
引用
收藏
页码:495 / 517
页数:23
相关论文
共 179 条
[61]   Deep learning for visual understanding: A review [J].
Guo, Yanming ;
Liu, Yu ;
Oerlemans, Ard ;
Lao, Songyang ;
Wu, Song ;
Lew, Michael S. .
NEUROCOMPUTING, 2016, 187 :27-48
[62]   A Big Data Analysis Framework Using Apache Spark and Deep Learning [J].
Gupta, Anand ;
Thakur, Hardeo Kumar ;
Shrivastava, Ritvik ;
Kumar, Pulkit ;
Nag, Sreyashi .
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, :9-16
[63]   A Framework for Fast and Efficient Cyber Security Network Intrusion Detection using Apache Spark [J].
Gupta, Govind P. ;
Kulariya, Manish .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 :824-831
[64]   Clustering-based real-time anomaly detection-A breakthrough in big data technologies [J].
Habeeb, Riyaz Ahamed Ariyaluran ;
Nasaruddin, Fariza ;
Gani, Abdullah ;
Amanullah, Mohamed Ahzam ;
Hashem, Ibrahim Abaker Targio ;
Ahmed, Ejaz ;
Imran, Muhammad .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (08)
[65]   Real-time big data processing for anomaly detection: A Survey [J].
Habeeb, Riyaz Ahamed Ariyaluran ;
Nasaruddin, Fariza ;
Gani, Abdullah ;
Hashem, Ibrahim Abaker Targio ;
Ahmed, Ejaz ;
Imran, Muhammad .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2019, 45 :289-307
[66]   A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting [J].
HaddadPajouh, Hamed ;
Dehghantanha, Ali ;
Khayami, Raouf ;
Choo, Kim-Kwang Raymond .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 85 :88-96
[67]  
Han J, 2012, MOR KAUF D, P1
[68]   A Survey of Deep Learning: Platforms, Applications and Emerging Rlesearch Trends [J].
Hatcher, William Grant ;
Yu, Wei .
IEEE ACCESS, 2018, 6 :24411-24432
[69]   Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism [J].
He, Youbiao ;
Mendis, Gihan J. ;
Wei, Jin .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2505-2516
[70]  
Herley C, 2008, PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, P681