A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

被引:209
作者
Khraisat, Ansam [1 ]
Alazab, Ammar [1 ]
机构
[1] Federat Univ Australia, Ballarat, Vic, Australia
关键词
Malware; Intrusion detection system; IoT; Anomaly detection; Machine learning; Deep learning; Internet of things; Attacks; IoT security; ANOMALY DETECTION; DETECTION SCHEME; SECURITY; ENSEMBLE; IOT; ALGORITHMS; NETWORKS; DATABASE; BOTNET; MODEL;
D O I
10.1186/s42400-021-00077-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation strategy, and deployment strategy. This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS. We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT. It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure. These purposes help IoT security researchers by uniting, contrasting, and compiling scattered research efforts. Consequently, we provide a unique IoT IDS taxonomy, which sheds light on IoT IDS techniques, their advantages and disadvantages, IoT attacks that exploit IoT communication systems, corresponding advanced IDS and detection capabilities to detect IoT attacks.
引用
收藏
页数:27
相关论文
共 98 条
[1]  
Abbasi A, 2014, 17 INT S RAID 2014 G, P384, DOI [10.1007/978-3-319-11379-1_19, DOI 10.1007/978-3-319-11379-1_19]
[2]   A survey of intrusion detection systems based on ensemble and hybrid classifiers [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
COMPUTERS & SECURITY, 2017, 65 :135-152
[3]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[4]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[5]   Using response action with Intelligent Intrusion detection and prevention System against web application malware [J].
Alazab, Ammar ;
Hobbs, Michael ;
Abawajy, Jemal ;
Khraisat, Ansam ;
Alazab, Mamoun .
Information Management and Computer Security, 2014, 22 (05) :431-449
[6]  
Alazab A., 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT), P296, DOI 10.1109/ISCIT.2012.6380910
[7]   CLOUD-ASSISTED DYNAMIC RESILIENCE FOR CYBER-PHYSICAL CONTROL SYSTEMS [J].
Alcaraz, Cristina .
IEEE WIRELESS COMMUNICATIONS, 2018, 25 (01) :76-82
[8]   Hidden Markov models for malware classification [J].
Annachhatre, Chinmayee ;
Austin, Thomas H. ;
Stamp, Mark .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02) :59-73
[9]  
[Anonymous], 2013, INT J OMPUT SCI ISSU
[10]  
[Anonymous], 2012, International Journal of Network Security & Its Applications