2022
DOI: 10.3390/electronics11091502
|View full text |Cite
|
Sign up to set email alerts
|

Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects

Abstract: Internet of Things (IoT) is a developing technology that provides the simplicity and benefits of exchanging data with other devices using the cloud or wireless networks. However, the changes and developments in the IoT environment are making IoT systems susceptible to cyber attacks which could possibly lead to malicious intrusions. The impacts of these intrusions could lead to physical and economical damages. This article primarily focuses on the IoT system/framework, the IoT, learning-based methods, and the d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(54 citation statements)
references
References 78 publications
0
54
0
Order By: Relevance
“…In IDS development, different models of DL have been utilized, as high-level features can be represented by them into more intellectual features of data. Selection of appropriate features was attempted by different studies for detection of intrusions [ 14 , 91 ]. Intensive features were automatically extracted by DL approaches from records of data that were unlabeled.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In IDS development, different models of DL have been utilized, as high-level features can be represented by them into more intellectual features of data. Selection of appropriate features was attempted by different studies for detection of intrusions [ 14 , 91 ]. Intensive features were automatically extracted by DL approaches from records of data that were unlabeled.…”
Section: Discussionmentioning
confidence: 99%
“…The Internet of Things (IoT) is an emerging technology that allows objects to quickly and effectively share data across remote networks, such as the cloud or wireless connections. Cyber assaults, which may lead to deadly incursions, are becoming more common due to the changes and advances in the IoT ecosystem [ 91 ].…”
Section: Machine Learning and Deep Learning In Nidsmentioning
confidence: 99%
“…It is hierarchical, self-sufcient, and makes use of machine learning and regression algorithms to identify network-level intrusions and anomalies in sensor data. Subsets of IoMT are subjected to extensive testing, such as wireless body area networks and other related medical devices [47][48][49][50][51][52][53]. Trough simulations, this research demonstrates the potential for achieving high detection accuracy with little resource use.…”
Section: Related Workmentioning
confidence: 99%
“…Signature-based detection method plays a significant role in protecting the system from different types of malwares. This method gained much attention among researchers who conducted numerous studies focused upon its improvement in both academia and industries [10,11]. Signature is the concept built upon this concept of different malware detections.…”
Section: Introductionmentioning
confidence: 99%