{"title":"物联网异常检测的最新进展:现状、挑战和前景","authors":"Deepak Adhikari , Wei Jiang , Jinyu Zhan , Danda B. Rawat , Asmita Bhattarai","doi":"10.1016/j.cosrev.2024.100665","DOIUrl":null,"url":null,"abstract":"<div><p>This paper provides a comprehensive survey of anomaly detection for the Internet of Things (IoT). Anomaly detection poses numerous challenges in IoT, with broad applications, including intrusion detection, fraud monitoring, cybersecurity, industrial automation, etc. Intensive attention has been received by network security analytics and researchers, particularly on anomaly detection in the network, deliberately crucial in network security. It is of critical importance to detect network anomalies timely. Due to various issues and resource-constrained features, conventional anomaly detection strategies cannot be implemented in the IoT. Hence, this paper attempts to highlight various recent techniques to detect anomalies in IoT and its applications. We also present anomalies at multiple layers of the IoT architecture. In addition, we discuss multiple computing platforms and highlight various challenges of anomaly detection. Finally, the potential future directions of the methods are suggested, leading to various open research issues to be analyzed afterward. With this survey, we hope that readers can get a better understanding of anomaly detection, as well as research trends in this domain.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100665"},"PeriodicalIF":13.3000,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives\",\"authors\":\"Deepak Adhikari , Wei Jiang , Jinyu Zhan , Danda B. Rawat , Asmita Bhattarai\",\"doi\":\"10.1016/j.cosrev.2024.100665\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>This paper provides a comprehensive survey of anomaly detection for the Internet of Things (IoT). Anomaly detection poses numerous challenges in IoT, with broad applications, including intrusion detection, fraud monitoring, cybersecurity, industrial automation, etc. Intensive attention has been received by network security analytics and researchers, particularly on anomaly detection in the network, deliberately crucial in network security. It is of critical importance to detect network anomalies timely. Due to various issues and resource-constrained features, conventional anomaly detection strategies cannot be implemented in the IoT. Hence, this paper attempts to highlight various recent techniques to detect anomalies in IoT and its applications. We also present anomalies at multiple layers of the IoT architecture. In addition, we discuss multiple computing platforms and highlight various challenges of anomaly detection. Finally, the potential future directions of the methods are suggested, leading to various open research issues to be analyzed afterward. With this survey, we hope that readers can get a better understanding of anomaly detection, as well as research trends in this domain.</p></div>\",\"PeriodicalId\":48633,\"journal\":{\"name\":\"Computer Science Review\",\"volume\":\"54 \",\"pages\":\"Article 100665\"},\"PeriodicalIF\":13.3000,\"publicationDate\":\"2024-08-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Science Review\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1574013724000492\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013724000492","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives
This paper provides a comprehensive survey of anomaly detection for the Internet of Things (IoT). Anomaly detection poses numerous challenges in IoT, with broad applications, including intrusion detection, fraud monitoring, cybersecurity, industrial automation, etc. Intensive attention has been received by network security analytics and researchers, particularly on anomaly detection in the network, deliberately crucial in network security. It is of critical importance to detect network anomalies timely. Due to various issues and resource-constrained features, conventional anomaly detection strategies cannot be implemented in the IoT. Hence, this paper attempts to highlight various recent techniques to detect anomalies in IoT and its applications. We also present anomalies at multiple layers of the IoT architecture. In addition, we discuss multiple computing platforms and highlight various challenges of anomaly detection. Finally, the potential future directions of the methods are suggested, leading to various open research issues to be analyzed afterward. With this survey, we hope that readers can get a better understanding of anomaly detection, as well as research trends in this domain.
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.