2021
DOI: 10.1142/s2424922x21430014
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Anomaly Intrusion Detection Systems in IoT using Deep Learning Techniques

Abstract: The rise of the Internet of things (IoT) provides an intelligent environment. However, it demands a higher security effort due to its vulnerabilities. A number of studies have emphasized the area of anomaly intrusion detection and its use in various types of applications. The development of a robust anomaly intrusion detection system relies heavily on understanding complex structures from noisy data, identifying dynamic anomaly patterns, and detecting anomalies with insufficient labels. Therefore, an advanced … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 62 publications
0
2
0
Order By: Relevance
“…Such data represent the behavioral aspect of the malicious software, hence can be used to detect the attacks [34,44]. Like static data, dynamic data can be introspected, and malicious patterns can be extracted [45]. Due to its efficacy for countering the sophisticated ransomware families that employ polymorphic techniques to deceive detection, the dynamic analysis gained popularity in the research community [23,41,42,[46][47][48][49][50].…”
Section: Related Workmentioning
confidence: 99%
“…Such data represent the behavioral aspect of the malicious software, hence can be used to detect the attacks [34,44]. Like static data, dynamic data can be introspected, and malicious patterns can be extracted [45]. Due to its efficacy for countering the sophisticated ransomware families that employ polymorphic techniques to deceive detection, the dynamic analysis gained popularity in the research community [23,41,42,[46][47][48][49][50].…”
Section: Related Workmentioning
confidence: 99%
“…Ransomware uses the operating system's own cryptographic libraries to encrypt the files on a victim's device [1]. It can target several environments and platforms including cloud-based systems, Internet of Things, wireless sensor networks, power grid SCADA (Supervisory Control and Data Acquisition (SCADA)), and intelligent transportation systems [2][3][4][5][6]. Although the nature of the ransomware infection process is similar to other malware categories, the employment of cryptographic means makes the effect of an attack irreversible if the decryption key is not available [7].…”
Section: Introductionmentioning
confidence: 99%