Intrusion detection and prevention in fog based IoT environments: A systematic literature review

被引:23
作者
de Souza, Cristiano Antonio [1 ]
Westphall, Carlos Becker [1 ]
Machado, Renato Bobsin [2 ]
Loffi, Leandro [1 ]
Westphall, Carla Merkle [1 ]
Geronimo, Guilherme Arthur [1 ]
机构
[1] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
[2] State Univ Western Parana, Foz Do Iguacu, PR, Brazil
关键词
Internet of Things; Fog computing; Intrusion detection and prevention; DISTRIBUTED ATTACK DETECTION; ANOMALY DETECTION FRAMEWORK; DEEP LEARNING APPROACH; INTERNET; THINGS; SECURITY; MACHINE; CLOUD; NETWORKS; PRIVACY;
D O I
10.1016/j.comnet.2022.109154
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, the Internet of Things is spreading in all areas that apply computing resources. An important ally of the IoT is fog computing. It extends cloud computing and services to the edge of the network. Smart environments are becoming real and possible through IoT and fog computing. However, they are not free from security threats and vulnerabilities. This makes special security techniques indispensable. Security is one of the biggest challenges to ensuring an optimal IoT and Fog environment. Combined with the significant damage generated by application attacks, this fact creates the need to focus efforts in this area. This need can be proven through existing reviews of the state-of-the-art that pointed out several open aspects that need greater research effort. In this way, this article presents a Systematic Literature Review (SLR) considering the context of intrusion detection and prevention in environments based on fog computing and IoT. This review addresses more than 100 studies that were included after undergoing an extensive inclusion/exclusion process with well-defined criteria. From these studies, information was extracted to build a view of the current state-of-the-art and answer the research questions of this study. In this way, we identify the state-of-the-art, open questions and possibilities for future research.
引用
收藏
页数:38
相关论文
共 237 条
[1]   Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey [J].
Abbasi, Mahmoud ;
Shahraki, Amin ;
Taherkordi, Amir .
COMPUTER COMMUNICATIONS, 2021, 170 :19-41
[2]   Semi-Supervised Spatiotemporal Deep Learning for Intrusions Detection in IoT Networks [J].
Abdel-Basset, Mohamed ;
Hawash, Hossam ;
Chakrabortty, Ripon K. ;
Ryan, Michael J. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15) :12251-12265
[3]   Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment [J].
Abdel-Basset, Mohamed ;
Chang, Victor ;
Hawash, Hossam ;
Chakrabortty, Ripon K. ;
Ryan, Michael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) :7704-7715
[4]   Principal component analysis [J].
Abdi, Herve ;
Williams, Lynne J. .
WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (04) :433-459
[5]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[6]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[7]   Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model [J].
Al-Khafajiy, Mohammed ;
Otoum, Safa ;
Baker, Thar ;
Asim, Muhammad ;
Maamar, Zakaria ;
Aloqaily, Moayad ;
Taylor, Mark ;
Randles, Martin .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
[8]  
Albdour Layla, 2020, International Journal of Communication Networks and Information Security, V12, P83
[9]   Ensemble Detection Model for IoT IDS [J].
Alhowaide, Alaa ;
Alsmadi, Izzat ;
Tang, Jian .
INTERNET OF THINGS, 2021, 16
[10]   Human Immune-Based Intrusion Detection and Prevention System for Fog Computing [J].
Aliyu, Farouq ;
Sheltami, Tarek ;
Deriche, Mohamed ;
Nasser, Nidal .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (01)