A Survey on Recent Approaches in Intrusion Detection System in IoTs

Aliya Tabassum, A. Erbad, M. Guizani
{"title":"A Survey on Recent Approaches in Intrusion Detection System in IoTs","authors":"Aliya Tabassum, A. Erbad, M. Guizani","doi":"10.1109/IWCMC.2019.8766455","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoTs) are Internet-connected devices that integrate physical objects and internet in diverse areas of life like industries, home automation, hospitals and environment monitoring. Although IoTs ease daily activities benefiting human operations, they bring serious security challenges worth concerning. IoTs have become potentially vulnerable targets for cybercriminals, so companies are investing billions of dollars to find an appropriate mechanism to detect these kinds of malicious activities in IoT networks. Nowadays intelligent techniques using Machine Learning (ML) and Artificial Intelligence (AI) are being adopted to prevent or detect novel attacks with best accuracy. This survey classifies and categorizes the recent Intrusion Detection approaches for IoT networks, with more focus on hybrid and intelligent techniques. Moreover, it provides a comprehensive review on IoT layers, communication protocols and their security issues which confirm that IDS is required in both layered and protocol approaches. Finally, this survey discusses the limitations and advantages of each approach to identify future directions of potential IDS implementation.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCMC.2019.8766455","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28

Abstract

Internet of Things (IoTs) are Internet-connected devices that integrate physical objects and internet in diverse areas of life like industries, home automation, hospitals and environment monitoring. Although IoTs ease daily activities benefiting human operations, they bring serious security challenges worth concerning. IoTs have become potentially vulnerable targets for cybercriminals, so companies are investing billions of dollars to find an appropriate mechanism to detect these kinds of malicious activities in IoT networks. Nowadays intelligent techniques using Machine Learning (ML) and Artificial Intelligence (AI) are being adopted to prevent or detect novel attacks with best accuracy. This survey classifies and categorizes the recent Intrusion Detection approaches for IoT networks, with more focus on hybrid and intelligent techniques. Moreover, it provides a comprehensive review on IoT layers, communication protocols and their security issues which confirm that IDS is required in both layered and protocol approaches. Finally, this survey discusses the limitations and advantages of each approach to identify future directions of potential IDS implementation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网入侵检测系统研究进展综述
物联网(iot)是将物理对象和互联网集成到工业、家庭自动化、医院和环境监测等不同生活领域的互联网连接设备。物联网在简化日常活动、造福人类运营的同时,也带来了严重的安全挑战,值得关注。物联网已经成为网络犯罪分子的潜在攻击目标,因此公司正在投入数十亿美元寻找一种适当的机制来检测物联网网络中的此类恶意活动。如今,使用机器学习(ML)和人工智能(AI)的智能技术正被用于以最佳准确性预防或检测新型攻击。本调查对最近针对物联网网络的入侵检测方法进行了分类和分类,重点关注混合和智能技术。此外,它还提供了对物联网层,通信协议及其安全问题的全面审查,这些问题证实了分层和协议方法都需要IDS。最后,本调查讨论了每种方法的局限性和优点,以确定潜在IDS实现的未来方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to Relay Experimental Performance Evaluation of TCP Over an Integrated Satellite-Terrestrial Network Environment Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs) Mobility Traffic Model Based on Combination of Multiple Transportation Forms in the Smart City Exploiting Energy Efficient Routing protocols for Void Hole Alleviation in IoT enabled Underwater WSN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1