2021
DOI: 10.9734/ajrcos/2021/v9i230218
|View full text |Cite
|
Sign up to set email alerts
|

Attack and Anomaly Detection in IoT Networks using Machine Learning Techniques: A Review

Abstract: The Internet of Things (IoT) is one of today's most rapidly growing technologies. It is a technology that allows billions of smart devices or objects known as "Things" to collect different types of data about themselves and their surroundings using various sensors. They may then share it with the authorized parties for various purposes, including controlling and monitoring industrial services or increasing business services or functions. However, the Internet of Things currently faces more security threats tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 81 publications
(32 citation statements)
references
References 56 publications
0
24
0
Order By: Relevance
“…Zhang et al [44] have developed a Deterministic Finite Automaton (DFA) model for every smart device activity and used it to identify misbehavior in the traffic, similarly to the Goldenberg-Wool model [17] used on industrial control systems' traffic. Other papers applied machine learning algorithms in order to identify anomalies in the traffic [18,21,38] using statistics such as mean and standard deviation of inter-arrival times as feature vectors. Sridharan et al [38] implemented modules for both cases of unsupervised and supervised learning and demonstrated how they can identify different types of attacks.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Zhang et al [44] have developed a Deterministic Finite Automaton (DFA) model for every smart device activity and used it to identify misbehavior in the traffic, similarly to the Goldenberg-Wool model [17] used on industrial control systems' traffic. Other papers applied machine learning algorithms in order to identify anomalies in the traffic [18,21,38] using statistics such as mean and standard deviation of inter-arrival times as feature vectors. Sridharan et al [38] implemented modules for both cases of unsupervised and supervised learning and demonstrated how they can identify different types of attacks.…”
Section: Related Workmentioning
confidence: 99%
“…We consider 3 kinds of adversaries: the local adversary, the external adversary [1,6] and the active adversary [18,21,38].…”
Section: Adversary Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…We select the appropriate r statistic based on the sample size η. By default, we use r 10 as the Dixon statistic where a sample of data packet must lie within the range of [3,7]. However, one can change the range and r statistic according to the need to adjust with the packet size.…”
Section: Iotdixon Algorithmmentioning
confidence: 99%
“…Sensors are used in IoT-based ecosystems to generate data streams in regular intervals to provide real-time monitoring support to the owner of the given IoT system [1]. Such sensors may sometimes become faulty or generate erroneous data which must be detected at an early stage; otherwise, it can create serious troubles for decision making in the following stage of the applications [2,3].…”
Section: Introductionmentioning
confidence: 99%