2018
DOI: 10.1109/comst.2018.2844742
|View full text |Cite
|
Sign up to set email alerts
|

A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems

Abstract: The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous nature of devices and protocols in use, the sensitivity of the data contained within, as well as the legal and privacy issues, make security for the IoT a growing research priority and industry concern. With many security practices being unsuitable due to their resource intensive nature, it is deemed important to include second line defences into IoT networks. These systems will also need to be assessed for their efficacy in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
82
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 163 publications
(89 citation statements)
references
References 71 publications
1
82
0
Order By: Relevance
“…Finally, an architecture-focused survey on IDS in IoT is carried out by Benkhelifa et al [132]. This survey highlights the existing protocols, detection methods, and points out the future research challenges in this direction.…”
Section: Anomaly/intrusion Detectionmentioning
confidence: 99%
“…Finally, an architecture-focused survey on IDS in IoT is carried out by Benkhelifa et al [132]. This survey highlights the existing protocols, detection methods, and points out the future research challenges in this direction.…”
Section: Anomaly/intrusion Detectionmentioning
confidence: 99%
“…The standard benchmark dataset NSL-KDDand KDD Cup 99 are applied for evaluating the proposed system for network intrusion detection. Many literature works [10,11,16,28] have utilized this benchmark dataset for evaluating their research on intrusion detection. NSL-KDD, an enhanced dataset of the KDD CUP'99, was employed in this research work.…”
Section: Dataset Descriptionmentioning
confidence: 99%
“…Considering the plausible threats relevant to all of the aforementioned detection, the deployment of IDS is an absolute necessity that would provide efficient surveillance and also detect any malicious activity in the network data traffic [8]. There are typically five types of IDS deployment, namely [9][10][11][12][13]:…”
Section: Introductionmentioning
confidence: 99%
“…In an IoT network, due to the complex environment, the different standards and communication stacks involved, the limited resources, as well as lack of a physical line of defense (i.e., there are no gateways or switches to monitor the information flow), traditional IDS techniques are difficult to apply. Current IDSs for IoT technologies is focused on the architecture type, and from this point of view, the future development direction of IoT IDS is proposed and evaluated [30]. Zarpelao [8] classified the IDSs into four attributes which include detection method, IDS placement strategy, security threat and validation strategy, and introduced the work of making specific IDS schemes for IoT or developing an attack detection strategy that may be embedded in IDSs.…”
Section: Idss For Iotmentioning
confidence: 99%