Machine learning approaches to IoT security: A systematic literature review

被引:139
作者
Ahmad, Rasheed [1 ]
Alsmadi, Izzat [2 ]
机构
[1] Univ Cumberlands, 6178 Coll Stn Dr, Williamsburg, KY 40769 USA
[2] Univ Texas A&M San Antonio, One Univ Way, San Antonio, TX 78224 USA
关键词
Internet of things (IoT); Large-scale attacks; Machine learning; Deep learning; NETWORK INTRUSION DETECTION; THINGS SECURITY; INTERNET; ARCHITECTURES;
D O I
10.1016/j.iot.2021.100365
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous expansion and evolution of IoT applications, attacks on those IoT applications continue to grow rapidly. In this systematic literature review (SLR) paper, our goal is to provide a research asset to researchers on recent research trends in IoT security. As the main driver of our SLR paper, we proposed six research questions related to IoT security and machine learning. This extensive literature survey on the most recent publications in IoT security identified a few key research trends that will drive future research in this field. With the rapid growth of large scale IoT attacks, it is important to develop models that can integrate state of the art techniques and technologies from big data and machine learning. Accuracy and efficiency are key quality factors in finding the best algorithms and models to detect IoT attacks in real or near real-time (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页数:42
相关论文
共 161 条
[1]  
Agazzi A.E., 2020, Smart home, security concerns of iot
[2]  
Ahanger Tariq Ahamed, 2019, 2019 International Conference on Smart Systems and Inventive Technology (ICSSIT). Proceedings, P293, DOI 10.1109/ICSSIT46314.2019.8987779
[3]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[4]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[5]  
Al-Taleb N., 2020, ARXIV200713233CS
[6]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[7]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[8]  
Aldaej A., 2019, IEEE Access, DOI [DOI 10.1109/ACCESS.2019.2893445, 10.1109/ACCESS.2019.2893445]
[9]  
Alsamiri Jadel, 2019, International Journal of Advanced Computer Science and Applications, V10, P627
[10]  
Alzahrani S., 2018, Journal of Information Security, V9, P225