基于ML和DL的物联网入侵检测系统综述

Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio
{"title":"基于ML和DL的物联网入侵检测系统综述","authors":"Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio","doi":"10.1109/iCoMET57998.2023.10099142","DOIUrl":null,"url":null,"abstract":"The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL\",\"authors\":\"Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio\",\"doi\":\"10.1109/iCoMET57998.2023.10099142\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.\",\"PeriodicalId\":369792,\"journal\":{\"name\":\"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iCoMET57998.2023.10099142\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iCoMET57998.2023.10099142","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

智能传感器和家用电器等物联网技术的快速扩张可能会产生深远的影响。连接性、无处不在的存在和低计算能力是物联网设备的标志。物联网设备的全球数量正在上升。由于这些设备的激增,基于物联网的网络攻击事件有所增加,这比使用台式电脑要容易得多。需要新的方法来识别从受损物联网设备发起的攻击,以帮助解决这一问题。在这种情况下,对来自物联网设备的攻击进行检测控制的最有效方法是ML和DL技术的应用。本研究的主要目的是提供入侵检测模型的概述,以及由受损的物联网设备对物联网系统造成的威胁的全面审查。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL
The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Evaluating the Effectiveness of Flat Plate Solar Collector for Water Heating in Pakistan Deep learning-based video anonymization for security and privacy Sustainable Performance of Energy sector Organizations through Green Supply Chain Management The Influential factors for Pollution Emissions in manufacturing business Polyimide Substrate based Compact Antenna for Terahertz Wireless Communication Applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1