Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio
{"title":"基于ML和DL的物联网入侵检测系统综述","authors":"Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio","doi":"10.1109/iCoMET57998.2023.10099142","DOIUrl":null,"url":null,"abstract":"The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL\",\"authors\":\"Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio\",\"doi\":\"10.1109/iCoMET57998.2023.10099142\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.\",\"PeriodicalId\":369792,\"journal\":{\"name\":\"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iCoMET57998.2023.10099142\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iCoMET57998.2023.10099142","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL
The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.