Cargando…

IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses

This paper surveys the deep learning (DL) approaches for intrusion-detection systems (IDSs) in Internet of Things (IoT) and the associated datasets toward identifying gaps, weaknesses, and a neutral reference architecture. A comparative study of IDSs is provided, with a review of anomaly-based IDSs...

Descripción completa

Detalles Bibliográficos
Autores principales: Albulayhi, Khalid, Smadi, Abdallah A., Sheldon, Frederick T., Abercrombie, Robert K.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8512890/
https://www.ncbi.nlm.nih.gov/pubmed/34640752
http://dx.doi.org/10.3390/s21196432
_version_ 1784583105078624256
author Albulayhi, Khalid
Smadi, Abdallah A.
Sheldon, Frederick T.
Abercrombie, Robert K.
author_facet Albulayhi, Khalid
Smadi, Abdallah A.
Sheldon, Frederick T.
Abercrombie, Robert K.
author_sort Albulayhi, Khalid
collection PubMed
description This paper surveys the deep learning (DL) approaches for intrusion-detection systems (IDSs) in Internet of Things (IoT) and the associated datasets toward identifying gaps, weaknesses, and a neutral reference architecture. A comparative study of IDSs is provided, with a review of anomaly-based IDSs on DL approaches, which include supervised, unsupervised, and hybrid methods. All techniques in these three categories have essentially been used in IoT environments. To date, only a few have been used in the anomaly-based IDS for IoT. For each of these anomaly-based IDSs, the implementation of the four categories of feature(s) extraction, classification, prediction, and regression were evaluated. We studied important performance metrics and benchmark detection rates, including the requisite efficiency of the various methods. Four machine learning algorithms were evaluated for classification purposes: Logistic Regression (LR), Support Vector Machine (SVM), Decision Tree (DT), and an Artificial Neural Network (ANN). Therefore, we compared each via the Receiver Operating Characteristic (ROC) curve. The study model exhibits promising outcomes for all classes of attacks. The scope of our analysis examines attacks targeting the IoT ecosystem using empirically based, simulation-generated datasets (namely the Bot-IoT and the IoTID20 datasets).
format Online
Article
Text
id pubmed-8512890
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-85128902021-10-14 IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses Albulayhi, Khalid Smadi, Abdallah A. Sheldon, Frederick T. Abercrombie, Robert K. Sensors (Basel) Review This paper surveys the deep learning (DL) approaches for intrusion-detection systems (IDSs) in Internet of Things (IoT) and the associated datasets toward identifying gaps, weaknesses, and a neutral reference architecture. A comparative study of IDSs is provided, with a review of anomaly-based IDSs on DL approaches, which include supervised, unsupervised, and hybrid methods. All techniques in these three categories have essentially been used in IoT environments. To date, only a few have been used in the anomaly-based IDS for IoT. For each of these anomaly-based IDSs, the implementation of the four categories of feature(s) extraction, classification, prediction, and regression were evaluated. We studied important performance metrics and benchmark detection rates, including the requisite efficiency of the various methods. Four machine learning algorithms were evaluated for classification purposes: Logistic Regression (LR), Support Vector Machine (SVM), Decision Tree (DT), and an Artificial Neural Network (ANN). Therefore, we compared each via the Receiver Operating Characteristic (ROC) curve. The study model exhibits promising outcomes for all classes of attacks. The scope of our analysis examines attacks targeting the IoT ecosystem using empirically based, simulation-generated datasets (namely the Bot-IoT and the IoTID20 datasets). MDPI 2021-09-26 /pmc/articles/PMC8512890/ /pubmed/34640752 http://dx.doi.org/10.3390/s21196432 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Albulayhi, Khalid
Smadi, Abdallah A.
Sheldon, Frederick T.
Abercrombie, Robert K.
IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses
title IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses
title_full IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses
title_fullStr IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses
title_full_unstemmed IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses
title_short IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses
title_sort iot intrusion detection taxonomy, reference architecture, and analyses
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8512890/
https://www.ncbi.nlm.nih.gov/pubmed/34640752
http://dx.doi.org/10.3390/s21196432
work_keys_str_mv AT albulayhikhalid iotintrusiondetectiontaxonomyreferencearchitectureandanalyses
AT smadiabdallaha iotintrusiondetectiontaxonomyreferencearchitectureandanalyses
AT sheldonfrederickt iotintrusiondetectiontaxonomyreferencearchitectureandanalyses
AT abercrombierobertk iotintrusiondetectiontaxonomyreferencearchitectureandanalyses