A Survey of Intrusion Detection Systems Based On Deep Learning for IoT Data
محورهای موضوعی : Machine learningmehrnaz moudi 1 , Arefeh Soleimani 2 , AmirHossein Hojjati nia 3
1 - University of Torbat Heydarieh
2 - University of Torbat Heydarieh
3 - University of Torbat Heydarieh
کلید واژه: Internet of Things, Artificial intelligence, Machine learning, Deep learning, Intrusion detection systems,
چکیده مقاله :
Today, the scope of using the Internet of Things is growing by taking science and technology as the first place in human life, and as these networks get bigger, more data are exchanged. It performs high-speed data exchanges on the Internet and in a pre-defined network. The more the Internet of Things penetrates into people's lives, the more important data it transmits. This causes attackers to draw attention to these data, and Internet of Things network devices that have limited resources are exposed to attacks. With the complexity of hardware and software for the ease of human's use, naturally more intelligent attacks will happen, which is the reason of presenting many methods in this field. For this reason, in this article, we are going to discuss the most important methods used in intrusion detection systems based on deep learning and machine that can identify these interruptions. In this article, we have compared many articles from 2020 to 2022 based on the type of dataset used, the type of classification (binary or multi-class) and the accuracy rates obtained from each method, and we have been able to see a comprehensive overview for researchers who intend to work in IoT data security.
[1] B. I. Farhan and A. D.Jasim, “A survey of intrusion detection using deep learning in internet of things,” ijcsm, pp. 83–93, 2022.
[2] U. Lakshmanna , N. Tariq, M. Asim, T. Baker, and A. Al-Shamma’a, “Machine learning and the Internet of Things security: Solutions and open challenges,” J. Parallel Distrib. Comput., vol. 162, pp. 89–104, 2022.
[3] K. Lakshmanna et al., “A review on Deep Learning techniques for IoT data,” Electronics (Basel), vol. 11, no. 10, p. 1604, 2022.
[4] M. A. Alsoufi et al., “Anomaly-based intrusion detection systems in IoT using deep learning: A systematic literature review,” Appl. Sci. (Basel), vol. 11, no. 18, p. 8383, 2021.
[5] A. Alsoufi , A. Muhammed, A. A. Abd Ghani, A. Abdullah, and F. Hakim, “An intrusion detection system for the Internet of Things based on machine learning: Review and challenges,” Symmetry (Basel), vol. 13, no. 6, p. 1011, 2021.
[6] T. Hossain, M. Ariful Islam, A. B. R. Khan, and M. Sadekur Rahman, “A robust and accurate IoT-based fire alarm system for residential use,” in Computer Networks, Big Data and IoT, Singapore: Springer Nature Singapore, 2022, pp. 479–492.
[7] B. Lahasan and H. Samma, “Optimized deep autoencoder model for internet of things intruder detection,” IEEE Access, vol. 10, pp. 8434–8448, 2022.
[8] S. Ullah et al., “A new intrusion detection system for the Internet of Things via deep convolutional neural network and feature engineering,” Sensors (Basel), vol. 22, no. 10, p. 3607, 2022.
[9] N. Tariq, M. Asim, Z. Maamar, M. Z. Farooqi, N. Faci, and T. Baker, “A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT,” J. Parallel Distrib. Comput., vol. 134, pp. 198–206, 2019.
[10] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications,” IEEE Internet Things J., vol. 4, no. 5, pp. 1125–1142, 2017.
[11] P. Prasdika and B. Sugiantoro, “A review paper on big data and data mining concepts and techniques,” IJID (International Journal on Informatics for Development), vol. 7, no. 1, p. 33, 2018.
[12] “داده کاوی چیست؟ - کاربردهای Data Mining - سحاب,” سحاب, 27-Jul-2021. [Online]. Available: https://www.sahab.ir/insights/what-is-data-mining/. [Accessed: 13-Dec-2022].
[13] G. Kumar, K. Kumar, and M. Sachdeva, “The use of artificial intelligence based techniques for intrusion detection: a review,” Artif. Intell. Rev., vol. 34, no. 4, pp. 369–387, 2010.
[14] A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Comput. netw., vol. 51, no. 12, pp. 3448–3470, 2007.
[15] D. Minh, H. X. Wang, Y. F. Li, and T. N. Nguyen, “Explainable artificial intelligence: a comprehensive review,” Artif. Intell. Rev., vol. 55, no. 5, pp. 3503–3568, 2022.
[16] P. Shukla, “ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things,” in 2017 Intelligent Systems Conference (IntelliSys), 2017.
[17] C. Janiesch, P. Zschech, and K. Heinrich, “Machine learning and deep learning,” Electron. Mark., vol. 31, no. 3, pp. 685–695, 2021.
[18] A. Paleyes, R.-G. Urma, and N. D. Lawrence, “Challenges in deploying machine learning: A survey of case studies,” ACM Comput. Surv., vol. 55, no. 6, pp. 1–29, 2023.
[19] S. Dong, P. Wang, and K. Abbas, “A survey on deep learning and its applications,” Comput. Sci. Rev., vol. 40, no. 100379, p. 100379, 2021.
[20] A. Thakkar and R. Lohiya, “A review on machine learning and deep learning perspectives of IDS for IoT: Recent updates, security issues, and challenges,” Arch. Comput. Methods Eng., vol. 28, no. 4, pp. 3211–3243, 2021.
[21] “Cybercrime Magazine - page one for the cybersecurity industry,” Cybercrime Magazine, 26-Dec-2018. [Online]. Available: https://cybersecurityventures.com/. [Accessed: 13-Dec-2022].
[22] S. B. Saad, A. Ksentini, and B. Brik, “A Trust architecture for the SLA management in 5G networks,” in ICC 2021 - IEEE International Conference on Communications, 2021.
[23] A. Thakkar and R. Lohiya, “Role of swarm and evolutionary algorithms for intrusion detection system: A survey,” Swarm Evol. Comput., vol. 53, no. 100631, p. 100631, 2020.
[24] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey. .
[25] Y. Yue, S. Li, P. Legg, and F. Li, “Deep learning-based security behaviour analysis in IoT environments: A survey,” Secur. Commun. Netw., vol. 2021, pp. 1–13, 2021.
[26] S. Bharati and P. Podder, “Machine and deep learning for IoT security and privacy: Applications, challenges, and future directions,” Secur. Commun. Netw., vol. 2022, pp. 1–41, 2022.
[27] F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, “Machine learning in IoT security: Current solutions and future challenges,” IEEE Commun. Surv. Tutor., vol. 22, no. 3, pp. 1686–1721, 2020.
[28] Security challenges and solutions in the internet of Nordic and Baltic Journal of Information and Communications Technologies.
[29] J. Wurm, K. Hoang, O. Arias, A.-R. Sadeghi, and Y. Jin, “Security analysis on consumer and industrial IoT devices,” in 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), 2016.
[30] M. Mohammadi, A. Al-Fuqaha, S. Sorour, and M. Guizani, “Deep learning for IoT big data and streaming analytics: A survey,” IEEE Commun. Surv. Tutor., vol. 20, no. 4, pp. 2923–2960, 2018.
[31] J. Franklin, “The elements of statistical learning: data mining, inference and prediction,” Math. Intelligencer, vol. 27, no. 2, pp. 83–85, 2005.
[32] G. E. Hinton and R. R. Salakhutdinov, “Reducing the dimensionality of data with neural networks,” Science, vol. 313, no. 5786, pp. 504–507, 2006.
[33] Z. M. Fadlullah et al., “State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelligent network traffic control systems,” IEEE Commun. Surv. Tutor., vol. 19, no. 4, pp. 2432–2455, 2017.
[34] H. Li, K. Ota, and M. Dong, “Learning IoT in edge: Deep learning for the internet of things with edge computing,” IEEE Netw., vol. 32, no. 1, pp. 96–101, 2018.
[35] R. V. Mendonça, J. C. Silva, R. L. Rosa, M. Saadi, D. Z. Rodriguez, and A. Farouk, “A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithm,” Expert Syst., 2021.
[36] S. K. Gupta, M. Tripathi, and J. Grover, “Hybrid optimization and deep learning based intrusion detection system,” Comput. Electr. Eng., vol. 100, no. 107876, p. 107876, 2022.
[37] A. Basati and M. M. Faghih, “DFE: efficient IoT network intrusion detection using deep feature extraction,” Neural Comput. Appl., vol. 34, no. 18, pp. 15175–15195, 2022.
[38] A. Sagu, N. S. Gill, P. Gulia, J. M. Chatterjee, and I. Priyadarshini, “A hybrid deep learning model with self-improved optimization algorithm for detection of security attacks in IoT environment,” Future internet, vol. 14, no. 10, p. 301, 2022.
[39] I. Idrissi, O. Moussaoui, and M. Azizi, “A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT,” Int. J. Comput. Digit. Syst., vol. 11, no. 1, pp. 209–216, 2022.
[40] Y. Masoudi-Sobhanzadeh and S. Emami-Moghaddam, “A real-time IoT-based botnet detection method using a novel two-step feature selection technique and the support vector machine classifier,” Comput. netw., vol. 217, no. 109365, p. 109365, 2022.
[41] Article Lightweight Internet of Things Botnet Detection Using One-Class Classification. .
[42] I. Idrissi, M. Boukabous, M. Azizi, O. Moussaoui, and H. El Fadili, “Toward a deep learning-based intrusion detection system for IoT against botnet attacks,” IAES Int. J. Artif. Intell. (IJ-AI), vol. 10, no. 1, p. 110, 2021.
[43] H. Alkahtani and T. H. H. Aldhyani, “Intrusion detection system to advance Internet of Things infrastructure-based deep learning algorithms,” Complexity, vol. 2021, pp. 1–18, 2021.
[44] L. Liu, P. Wang, J. Lin, and L. Liu, “Intrusion detection of imbalanced network traffic based on machine learning and deep learning,” IEEE Access, vol. 9, pp. 7550–7563, 2021.
[45] J. Ashraf, A. D. Bakhshi, N. Moustafa, H. Khurshid, A. Javed, and A. Beheshti, “Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems,” IEEE Trans. Intell. Transp. Syst., vol. 22, no. 7, pp. 4507–4518, 2021.
[46] B. B. Borisenko, S. D. Erokhin, A. S. Fadeev, and I. D. Martishin, “Intrusion detection using multilayer perceptron and neural networks with long short-term memory,” in 2021 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO, 2021.
[47] T. H. Hai and L. H. Nam, “A practical comparison of deep learning methods for network intrusion detection,” in 2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), 2021.
[48] P. Ts and P. Shrinivasacharya, “Evaluating neural networks using Bi-Directional LSTM for network IDS (intrusion detection systems) in cyber security,” Global Transitions Proceedings, vol. 2, no. 2, pp. 448–454, 2021.
[49] H. Jia, J. Liu, M. Zhang, X. He, and W. Sun, “Network intrusion detection based on IE-DBN model,” Comput. Commun., vol. 178, pp. 131–140, 2021.
[50] R. Biswas and S. Roy, “Botnet traffic identification using neural networks,” Multimed. Tools Appl., vol. 80, no. 16, pp. 24147–24171, 2021.
[51] F. Laghrissi, S. Douzi, K. Douzi, and B. Hssina, “Intrusion detection systems using long short-term memory (LSTM),” J. Big Data, vol. 8, no. 1, 2021.
[52] M. S. ElSayed, N.-A. Le-Khac, M. A. Albahar, and A. Jurcut, “A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique,” J. Netw. Comput. Appl., vol. 191, no. 103160, p. 103160, 2021.
[53] C. Joshi, R. K. Ranjan, and V. Bharti, “A Fuzzy Logic based feature engineering approach for Botnet detection using ANN,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 9, pp. 6872–6882, 2022.
[54] K. Sethi, Y. V. Madhav, R. Kumar, and P. Bera, “Attention based multi-agent intrusion detection systems using reinforcement learning,” J. Inf. Secur. Appl., vol. 61, no. 102923, p. 102923, 2021.
[55] F. Hussain et al., “A framework for malicious traffic detection in IoT healthcare environment,” Sensors (Basel), vol. 21, no. 9, 2021.
[56] I. Vaccari, S. Narteni, M. Aiello, M. Mongelli, and E. Cambiaso, “Exploiting internet of things protocols for malicious data exfiltration activities,” IEEE Access, vol. 9, pp. 104261–104280, 2021.
[57] Y. Imrana, Y. Xiang, L. Ali, and Z. Abdul-Rauf, “A bidirectional LSTM deep learning approach for intrusion detection,” Expert Syst. Appl., vol. 185, no. 115524, p. 115524, 2021.
[58] I. A. Khan, N. Moustafa, D. Pi, W. Haider, B. Li, and A. Jolfaei, “An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 12, pp. 25469–25478, 2022.
[59] G. De La Torre Parra, P. Rad, K.-K. R. Choo, and N. Beebe, “Detecting Internet of Things attacks using distributed deep learning,” J. Netw. Comput. Appl., vol. 163, no. 102662, p. 102662, 2020.
[60] S. Latif, Z. Idrees, Z. Zou, and J. Ahmad, “DRaNN: A deep random neural network model for intrusion detection in industrial IoT,” in 2020 International Conference on UK-China Emerging Technologies (UCET), 2020.
[61] M. Roopak, G. Y. Tian, and J. Chambers, “An intrusion detection system against DDoS attacks in IoT networks,” in 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), 2020.
[62] D. S. Smys, D. A. Basar, and D. H. Wang, “Hybrid intrusion detection system for internet of things (IoT),” December 2020, vol. 2, no. 4, pp. 190–199, 2020.
[63] S. Diddi, S. Lohidasan, S. Arulmozhi, and K. R. Mahadik, “Standardization and Ameliorative effect of Kalyanaka ghrita in β-amyloid induced memory impairment in wistar rats,” J. Ethnopharmacol., vol. 300, no. 115671, p. 115671, 2023.
[64] R. A. Khamis and A. Matrawy, “Evaluation of adversarial training on different types of neural networks in deep learning-based IDSs,” in 2020 International Symposium on Networks, Computers and Communications (ISNCC), 2020.
[65] S. M. Kasongo and Y. Sun, “Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset,” J. Big Data, vol. 7, no. 1, 2020.
[66] Y. Li et al., “Robust detection for network intrusion of industrial IoT based on multi-CNN fusion,” Measurement (Lond.), vol. 154, no. 107450, p. 107450, 2020.
[67] K. Babaei, Z. Chen and T. Maul, “A Study of Fraud Types, Challenges and Detection Approaches in Telecommunication,” Journal of Information Systems and Telecommunication, vol. 7, no. 4, pp.248-261, 2019.
[68] M. Loukili, F. Messaoudi and R. El Youbi, “Implementation of Machine Learning Algorithms for Customer Churn Prediction,” Journal of Information Systems and Telecommunication, vol. 11, no. 43, pp.196-208, 2023.
[69] K. Jindal, R. Aron, “A Hybrid Machine Learning Approach for Sentiment Analysis of Beauty Products Reviews,” Journal of Information Systems and Telecommunication, vol. 10, no. 37, pp.1-10, 2022.