Alsoufi, Muaadh A. and Razak, Shukor and Md. Siraj, Maheyzah and Nafea, Ibtehal and Abdoh Ghaleb, Fuad Abdulgaleel and Saeed, Faisal and Nasser, Maged (2021) Anomaly-based intrusion detection systems in IoT using deep learning: a systematic literature review. Applied Sciences (Switzerland), 11 (18). pp. 1-24. ISSN 2076-3417
|
PDF
477kB |
Official URL: http://dx.doi.org/10.3390/app11188383
Abstract
The Internet of Things (IoT) concept has emerged to improve people’s lives by providing a wide range of smart and connected devices and applications in several domains, such as green IoT-based agriculture, smart farming, smart homes, smart transportation, smart health, smart grid, smart cities, and smart environment. However, IoT devices are at risk of cyber attacks. The use of deep learning techniques has been adequately adopted by researchers as a solution in securing the IoT environment. Deep learning has also successfully been implemented in various fields, proving its superiority in tackling intrusion detection attacks. Due to the limitation of signature-based detection for unknown attacks, the anomaly-based Intrusion Detection System (IDS) gains advantages to detect zero-day attacks. In this paper, a systematic literature review (SLR) is presented to analyze the existing published literature regarding anomaly-based intrusion detection, using deep learning techniques in securing IoT environments. Data from the published studies were retrieved from five databases (IEEE Xplore, Scopus, Web of Science, Science Direct, and MDPI). Out of 2116 identified records, 26 relevant studies were selected to answer the research questions. This review has ex-plored seven deep learning techniques practiced in IoT security, and the results showed their effectiveness in dealing with security challenges in the IoT ecosystem. It is also found that supervised deep learning techniques offer better performance, compared to unsupervised and semi-supervised learning. This analysis provides an insight into how the use of data types and learning methods will affect the performance of deep learning techniques for further contribution to enhancing a novel model for anomaly intrusion detection and prediction.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | deep learning, IDS, IoT, resource constraint, systematic literature review |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computing |
ID Code: | 93986 |
Deposited By: | Yanti Mohd Shah |
Deposited On: | 28 Feb 2022 13:27 |
Last Modified: | 28 Feb 2022 13:27 |
Repository Staff Only: item control page