2021
DOI: 10.3390/sym13061011
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection System for the Internet of Things Based on Machine Learning: Review and Challenges

Abstract: An intrusion detection system (IDS) is an active research topic and is regarded as one of the important applications of machine learning. An IDS is a classifier that predicts the class of input records associated with certain types of attacks. In this article, we present a review of IDSs from the perspective of machine learning. We present the three main challenges of an IDS, in general, and of an IDS for the Internet of Things (IoT), in particular, namely concept drift, high dimensionality, and computational … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 56 publications
(64 reference statements)
0
13
0
Order By: Relevance
“…However, none of these works present countermeasures of threats and attacks based on ubiquitous technology such as BC, FC, EC, and ML. Such ubiquitous technologies in analyzing the threats and attacks have been surveyed in scattered ways by the authors in [27][28][29][30][31][32][33][34][35][36][37]. A comprehensive review of all these technologies to combat IoT threats and attacks is not available.…”
Section: Comparison With Existing Surveysmentioning
confidence: 99%
See 1 more Smart Citation
“…However, none of these works present countermeasures of threats and attacks based on ubiquitous technology such as BC, FC, EC, and ML. Such ubiquitous technologies in analyzing the threats and attacks have been surveyed in scattered ways by the authors in [27][28][29][30][31][32][33][34][35][36][37]. A comprehensive review of all these technologies to combat IoT threats and attacks is not available.…”
Section: Comparison With Existing Surveysmentioning
confidence: 99%
“…The authors also propose a similar approach of using BC with ML to enhance security on the IoT data ecosystem. The state-of-the-art review on the application of ML for intrusion detection in IoT environment has been presented by Adnan in [37]. The authors consider the three dominant attributes, namely, computational complexity, concept drift, and dimensionality, which are mitigated by integrating ML in IoT, envisioning the security of the IoT-based applications.…”
Section: Comparison With Existing Surveysmentioning
confidence: 99%
“…Numerous investigations have demonstrated promising outcomes in the field of IDS through the application of machine learning (ML) and deep learning techniques [ 14 ]. However, many of these studies have relied on static data sources, failing to take into account the dynamic nature of the technology [ 15 ].…”
Section: Introductionmentioning
confidence: 99%
“…It makes sense to send out a team of guards to monitor and police a safe space. Therefore, having a monitoring system [1], [2], [3] remains the best engagement solution for well-being. Moreover, thanks to the development of the Internet of Things (IoT), we can now keep in real-time an eye out for our own assets remotely.…”
Section: Introductionmentioning
confidence: 99%