2021
DOI: 10.3390/s21196432
|View full text |Cite
|
Sign up to set email alerts
|

IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses

Abstract: This paper surveys the deep learning (DL) approaches for intrusion-detection systems (IDSs) in Internet of Things (IoT) and the associated datasets toward identifying gaps, weaknesses, and a neutral reference architecture. A comparative study of IDSs is provided, with a review of anomaly-based IDSs on DL approaches, which include supervised, unsupervised, and hybrid methods. All techniques in these three categories have essentially been used in IoT environments. To date, only a few have been used in the anomal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
25
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(26 citation statements)
references
References 106 publications
(197 reference statements)
1
25
0
Order By: Relevance
“…There are different datasets used to evaluate IoT security solutions. The most used datasets, as listed in [61], are the NSL-KDD, the Bot-IoT, the Botnet, and the Android malware datasets. In this performance analysis, we chose to use the NSL-KDD [55] for two reasons.…”
Section: Quantitative Performance Analysis Of Leading Ais Methods In Iot Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are different datasets used to evaluate IoT security solutions. The most used datasets, as listed in [61], are the NSL-KDD, the Bot-IoT, the Botnet, and the Android malware datasets. In this performance analysis, we chose to use the NSL-KDD [55] for two reasons.…”
Section: Quantitative Performance Analysis Of Leading Ais Methods In Iot Malware Detectionmentioning
confidence: 99%
“…In this performance analysis, we chose to use the NSL-KDD [55] for two reasons. First, unlike the other datasets, the NSL-KDD eliminates the redundant records in the previous dataset (KDD'99), resulting in a reduction of the number of borderline records compared to any other dataset [61]. This leads to more accurate results when evaluating an AIS-based security solution.…”
Section: Quantitative Performance Analysis Of Leading Ais Methods In Iot Malware Detectionmentioning
confidence: 99%
“…Other aspects of IoT security can utilize deep learning, including those we already mentioned in this section. This includes intrusion detection [126][127][128][129] and other types of anomaly detection [130]. A full coverage of these areas would require a separate article.…”
Section: Evolutionary Techniques For Securitymentioning
confidence: 99%
“…It can be defined as the "interconnection of things" having constrained computational power and capabilities. It can be used to send and receive data over the internet without requiring human-to-computer or human-to-human interaction [1]. The word "things" refers to the IP-enabled, networked devices (both physical and virtual).…”
Section: Introductionmentioning
confidence: 99%