2020
DOI: 10.3390/electronics9071177
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions

Abstract: The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast proliferation in many areas such as wearable devices, smart sensors and home appliances. IoT devices are characterized by their connectivity, pervasiveness and limited processing capability. The number of IoT devices in the world is increasing rapidly and it is expected that there will be 50 billion devices connected to the Internet by the end of the year 2020. This explosion of IoT devices, which can be easily increase… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
97
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 189 publications
(130 citation statements)
references
References 177 publications
(239 reference statements)
0
97
0
1
Order By: Relevance
“…erefore, most of the domestic Internet of ings is a wired monitoring system, and the technical approach is active FIRD combined with communication methods such as Ethernet [5]. In order to effectively respond to cyber threats, various research institutions and functional departments have strengthened their protection efforts [6], building a single-point defense system [7]. However, these defense tools often only focus on the partial information of cyber threats and timely and accurately detect threat behaviors and their internal associations, resulting in large deviations in detection results and formulating security strategies for network administrators [8].…”
Section: Introductionmentioning
confidence: 99%
“…erefore, most of the domestic Internet of ings is a wired monitoring system, and the technical approach is active FIRD combined with communication methods such as Ethernet [5]. In order to effectively respond to cyber threats, various research institutions and functional departments have strengthened their protection efforts [6], building a single-point defense system [7]. However, these defense tools often only focus on the partial information of cyber threats and timely and accurately detect threat behaviors and their internal associations, resulting in large deviations in detection results and formulating security strategies for network administrators [8].…”
Section: Introductionmentioning
confidence: 99%
“…They surveyed more than 95 papers in the literature that applied machine learning to deal with the issue of IoT intrusion detection. Another recent review presents and analyzes different machine learning and deep learning-based methods in order to identify the intrusion activities of IoT applications [46]. Both reviews emphasize the advantage of machine learning techniques against other approaches in intrusion detection problems.…”
Section: Related Workmentioning
confidence: 99%
“…Further, the readers can refer these literature [31], [32], [33] to understand the challenges, solutions and future directions in applying deep learning approaches for IDS within IoT.…”
Section: A Applied For Securing Iot Networkmentioning
confidence: 99%