Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review

IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Computers & Electrical Engineering Pub Date : 2024-10-15 DOI:10.1016/j.compeleceng.2024.109725
Amina Khacha , Zibouda Aliouat , Yasmine Harbi , Chirihane Gherbi , Rafika Saadouni , Saad Harous
{"title":"Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review","authors":"Amina Khacha ,&nbsp;Zibouda Aliouat ,&nbsp;Yasmine Harbi ,&nbsp;Chirihane Gherbi ,&nbsp;Rafika Saadouni ,&nbsp;Saad Harous","doi":"10.1016/j.compeleceng.2024.109725","DOIUrl":null,"url":null,"abstract":"<div><div>The IoT has interconnected devices that collaborate via the Internet. Yet, its widespread connectivity and data generation pose cybersecurity risks. Integrating robust intrusion detection systems (IDSs) into the architecture has become crucial. IDSs safeguard data, detect attacks, and ensure network security and privacy. Constructing anomaly-based intrusion detection systems using artificial intelligence methods, often termed learning techniques, has gained significant traction lately. In this context, this study undertakes a systematic literature review to comprehensively analyze the current landscape of research concerning IoT security, explicitly employing learning techniques. These techniques fall under four primary categories: machine learning, deep learning, transfer learning, and federated learning. From a pool of 646 papers published between 2018 and 2023, we have selected 36 papers encompassing all these techniques based on the keywords of the study. These chosen studies were then categorized based on their respective learning techniques, with an additional hybrid classification that combines federated learning and transfer learning. Moreover, the paper provides a comparative analysis of the studied articles across different dimensions. The research outcomes demonstrate the effectiveness of each learning technique, shed light on the datasets and metrics employed, and conclude with a discussion on open challenges and future recommendations in this domain</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109725"},"PeriodicalIF":4.0000,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790624006529","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

The IoT has interconnected devices that collaborate via the Internet. Yet, its widespread connectivity and data generation pose cybersecurity risks. Integrating robust intrusion detection systems (IDSs) into the architecture has become crucial. IDSs safeguard data, detect attacks, and ensure network security and privacy. Constructing anomaly-based intrusion detection systems using artificial intelligence methods, often termed learning techniques, has gained significant traction lately. In this context, this study undertakes a systematic literature review to comprehensively analyze the current landscape of research concerning IoT security, explicitly employing learning techniques. These techniques fall under four primary categories: machine learning, deep learning, transfer learning, and federated learning. From a pool of 646 papers published between 2018 and 2023, we have selected 36 papers encompassing all these techniques based on the keywords of the study. These chosen studies were then categorized based on their respective learning techniques, with an additional hybrid classification that combines federated learning and transfer learning. Moreover, the paper provides a comparative analysis of the studied articles across different dimensions. The research outcomes demonstrate the effectiveness of each learning technique, shed light on the datasets and metrics employed, and conclude with a discussion on open challenges and future recommendations in this domain
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网入侵检测系统学习技术的前景:系统性文献综述
物联网通过互联网将设备相互连接并进行协作。然而,其广泛的连接性和数据生成带来了网络安全风险。在架构中集成强大的入侵检测系统(IDS)已变得至关重要。IDS 可保护数据、检测攻击并确保网络安全和隐私。最近,利用人工智能方法(通常称为学习技术)构建基于异常的入侵检测系统受到了广泛关注。在此背景下,本研究通过系统的文献综述,全面分析了当前明确采用学习技术的物联网安全研究的现状。这些技术主要分为四类:机器学习、深度学习、迁移学习和联合学习。从 2018 年至 2023 年间发表的 646 篇论文中,我们根据研究关键词选出了 36 篇包含所有这些技术的论文。然后,我们根据各自的学习技术对这些被选中的研究进行了分类,并结合联合学习和迁移学习进行了额外的混合分类。此外,本文还对所研究的文章进行了不同维度的比较分析。研究成果证明了每种学习技术的有效性,阐明了所使用的数据集和衡量标准,最后还讨论了该领域的挑战和未来建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computers & Electrical Engineering
Computers & Electrical Engineering 工程技术-工程:电子与电气
CiteScore
9.20
自引率
7.00%
发文量
661
审稿时长
47 days
期刊介绍: The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency. Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.
期刊最新文献
Farm-flow dataset: Intrusion detection in smart agriculture based on network flows A non-functional requirements classification model based on cooperative attention mechanism fused with label embedding A residual deep learning network for smartwatch-based user identification using activity patterns in daily living MarvelHideDroid: Reliable on-the-fly data anonymization based on Android virtualization Editorial Board
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1