Skip to main content

2023 | OriginalPaper | Buchkapitel

Attack Detection in IoT Using Machine Learning—A Survey

verfasst von : Saeed Ali Haifa Ali, J. Vakula Rani

Erschienen in: Intelligent Cyber Physical Systems and Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the last decade, the İnternet Of Things(IoT) increased dramatically until it became an integral part of our daily lives. These devices are interconnected to the internet without the need for human intervention. Due to the weak configuration and unique characteristics of the internet of things has become a robust target for cyber-attack that worry the general user of these devices. Furthermore, IoT security challenges are increasing day by day and are subject to a variety of attacks. The traditional security measures, such as authentication, access control, network security, and encryption, for IoT devices and their vulnerabilities, are insufficient, ineffective, and cannot process these issues. Existing security methods must be improved to protect the IoT environment. ML/DL provided many solutions that assisted solve the challenges of the IoT and provided safety for it. The goal of this paper is to provide a study on the attacks in IoT architectures such as the sensing layer, network layer, and application layer, then present ML and DL that contributed to the solution in attack detection. In addition, we discuss the challenges of IoT architectures.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zaman S et al (2021) Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey. IEEE Access Zaman S et al (2021) Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey. IEEE Access
2.
Zurück zum Zitat Lin J et al (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE İnternet of Things J 4(5):1125–1142 Lin J et al (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE İnternet of Things J 4(5):1125–1142
3.
Zurück zum Zitat Liang X, Kim Y (2021) A survey on security attacks and solutions in the IoT network. In: 2021 IEEE 11th annual computing and communication workshop and conference (CCWC). IEEE Liang X, Kim Y (2021) A survey on security attacks and solutions in the IoT network. In: 2021 IEEE 11th annual computing and communication workshop and conference (CCWC). IEEE
4.
Zurück zum Zitat Upadhyaya B, Sun S, Sikdar B (2019) Machine learning-based jamming detection in wireless iot networks. In: 2019 IEEE VTS Asia Pacific wireless communications symposium (APWCS). IEEE Upadhyaya B, Sun S, Sikdar B (2019) Machine learning-based jamming detection in wireless iot networks. In: 2019 IEEE VTS Asia Pacific wireless communications symposium (APWCS). IEEE
5.
Zurück zum Zitat Khatun MA, Chowdhury N, Uddin MN (2019) Malicious nodes detection based on artificial neural network in IoT environments. In: 2019 22nd International conference on computer and ınformation technology (ICCIT). IEEE Khatun MA, Chowdhury N, Uddin MN (2019) Malicious nodes detection based on artificial neural network in IoT environments. In: 2019 22nd International conference on computer and ınformation technology (ICCIT). IEEE
6.
Zurück zum Zitat Liu G et al (2021) Softwarized iot network immunity against eavesdropping with programmable data planes. IEEE Internet of Things J 8(8):6578–6590 Liu G et al (2021) Softwarized iot network immunity against eavesdropping with programmable data planes. IEEE Internet of Things J 8(8):6578–6590
7.
Zurück zum Zitat Shaniqua A, Mehmood A, Elhadef M (2021) Detecting signal spoofing attack in uavs using machine learning models. IEEE Access 9:93803–93815CrossRef Shaniqua A, Mehmood A, Elhadef M (2021) Detecting signal spoofing attack in uavs using machine learning models. IEEE Access 9:93803–93815CrossRef
8.
Zurück zum Zitat Pathak AK et al (2021) Anomaly detection using machine learning to discover sensor tampering in IoT systems. In: ICC 2021-IEEE ınternational conference on communications. IEEE Pathak AK et al (2021) Anomaly detection using machine learning to discover sensor tampering in IoT systems. In: ICC 2021-IEEE ınternational conference on communications. IEEE
9.
Zurück zum Zitat Mrabet H et al (2020) A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 20(13):3625. Mrabet H et al (2020) A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 20(13):3625.
10.
Zurück zum Zitat Hassija V et al (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743 Hassija V et al (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743
11.
Zurück zum Zitat Amrish R, Bavapriyan K, Gopinaath V, Jawahar A, Vinoth Kumar C (2022) DDoS detection using machine learning techniques. J IoT Soc Mobile Analytics Cloud 4(1):24–32 Amrish R, Bavapriyan K, Gopinaath V, Jawahar A, Vinoth Kumar C (2022) DDoS detection using machine learning techniques. J IoT Soc Mobile Analytics Cloud 4(1):24–32
12.
Zurück zum Zitat Kiran KVVNLS et al (2020) Building a intrusion detection system for iot environment using machine learning techniques. Procedia Comput Sci 171:2372–2379‏ Kiran KVVNLS et al (2020) Building a intrusion detection system for iot environment using machine learning techniques. Procedia Comput Sci 171:2372–2379‏
13.
Zurück zum Zitat Newaz AKMI et al (2020) Heka: a novel intrusion detection system for attacks to personal medical devices. In: 2020 IEEE conference on communications and network security (CNS). IEEE Newaz AKMI et al (2020) Heka: a novel intrusion detection system for attacks to personal medical devices. In: 2020 IEEE conference on communications and network security (CNS). IEEE
14.
Zurück zum Zitat Farzaneh B et al (2020) A new method for intrusion detection on RPL routing protocol using fuzzy logic. In: 2020 6th International conference on web research (ICWR). IEEE Farzaneh B et al (2020) A new method for intrusion detection on RPL routing protocol using fuzzy logic. In: 2020 6th International conference on web research (ICWR). IEEE
15.
Zurück zum Zitat Alaiz-Moreton H et al (2019) Multiclass classification procedure for detecting attacks on MQTT-IoT protocol. Complexity 2019 Alaiz-Moreton H et al (2019) Multiclass classification procedure for detecting attacks on MQTT-IoT protocol. Complexity 2019
16.
Zurück zum Zitat Anthi E et al (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things J 6(5):9042–9053 Anthi E et al (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things J 6(5):9042–9053
17.
Zurück zum Zitat Tawalbeh L et al (2020) IoT privacy and security: challenges and solutions. Appl Sci 10(12):4102 Tawalbeh L et al (2020) IoT privacy and security: challenges and solutions. Appl Sci 10(12):4102
18.
Zurück zum Zitat Asharf J et al (2020) A review of intrusion detection systems using machine and deep learning in internet of things: challenges, solutions and future directions. Electronics 9(7):1177 Asharf J et al (2020) A review of intrusion detection systems using machine and deep learning in internet of things: challenges, solutions and future directions. Electronics 9(7):1177
19.
Zurück zum Zitat Azmoodeh A, Dehghantanha A, Choo KKR (2018) Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans Sustain Comput 4(1):88–95 Azmoodeh A, Dehghantanha A, Choo KKR (2018) Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans Sustain Comput 4(1):88–95
20.
Zurück zum Zitat Mao J et al (2019) Phishing page detection via learning classifiers from page layout feature. EURASIP J Wirel Commun Netw 2019(1):1–14. Mao J et al (2019) Phishing page detection via learning classifiers from page layout feature. EURASIP J Wirel Commun Netw 2019(1):1–14.
21.
Zurück zum Zitat Moti Z et al (2021) Generative adversarial network to detect unseen internet of things malware. Ad Hoc Netw 122(2021):102591 Moti Z et al (2021) Generative adversarial network to detect unseen internet of things malware. Ad Hoc Netw 122(2021):102591
22.
Zurück zum Zitat Shafiq M et al (2020) CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet of Things J 8(5):3242–3254 Shafiq M et al (2020) CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet of Things J 8(5):3242–3254
23.
Zurück zum Zitat Abdulwahab HM, Ajitha S, Saif MAN (2022) Feature selection techniques in the context of big data: taxonomy and analysis. Appl Intell 1–46 Abdulwahab HM, Ajitha S, Saif MAN (2022) Feature selection techniques in the context of big data: taxonomy and analysis. Appl Intell 1–46
24.
Zurück zum Zitat Sarkar S, Liu J, Jovanov E (2019) A robust algorithm for sniffing ble long-lived connections in real-time. In: 2019 IEEE global communications conference (GLOBECOM). IEEE Sarkar S, Liu J, Jovanov E (2019) A robust algorithm for sniffing ble long-lived connections in real-time. In: 2019 IEEE global communications conference (GLOBECOM). IEEE
25.
Zurück zum Zitat Goel A et al (2019) DeepRing: protecting deep neural network with blockchain. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops Goel A et al (2019) DeepRing: protecting deep neural network with blockchain. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops
26.
Zurück zum Zitat Aref MA, Jayaweera SK, Machuzak S (2017) Multi-agent reinforcement learning based cognitive anti-jamming. In: 2017 IEEE wireless communications and networking conference (WCNC). IEEE Aref MA, Jayaweera SK, Machuzak S (2017) Multi-agent reinforcement learning based cognitive anti-jamming. In: 2017 IEEE wireless communications and networking conference (WCNC). IEEE
27.
Zurück zum Zitat Han G, Xiao L, Vincent Poor H (2017) Two-dimensional anti-jamming communication based on deep reinforcement learning. In: 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE Han G, Xiao L, Vincent Poor H (2017) Two-dimensional anti-jamming communication based on deep reinforcement learning. In: 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE
28.
Zurück zum Zitat Xiao L, Wan X, Han Z (2017) PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wireless Commun 17(3):1676–1687CrossRef Xiao L, Wan X, Han Z (2017) PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wireless Commun 17(3):1676–1687CrossRef
29.
Zurück zum Zitat Shi C et al (2017) Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In: Proceedings of the 18th ACM ınternational symposium on mobile Ad Hoc networking and computing Shi C et al (2017) Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In: Proceedings of the 18th ACM ınternational symposium on mobile Ad Hoc networking and computing
30.
Zurück zum Zitat Singh R, Singh J, Singh R (2017) Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks. Wirel Commun Mobile Comput 2017 Singh R, Singh J, Singh R (2017) Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks. Wirel Commun Mobile Comput 2017
31.
Zurück zum Zitat Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in IoT networks. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in IoT networks. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE
32.
Zurück zum Zitat Napiah MN et al (2018) Compression header analyzer intrusion detection system (CHA-IDS) for 6LoWPAN communication protocol. IEEE Access 6:16623–16638 Napiah MN et al (2018) Compression header analyzer intrusion detection system (CHA-IDS) for 6LoWPAN communication protocol. IEEE Access 6:16623–16638
33.
Zurück zum Zitat Li Q et al (2017) Channel-based sybil detection in industrial wireless sensor networks: a multi-kernel approach. In; GLOBECOM 2017–2017 IEEE global communications conference. IEEE Li Q et al (2017) Channel-based sybil detection in industrial wireless sensor networks: a multi-kernel approach. In; GLOBECOM 2017–2017 IEEE global communications conference. IEEE
34.
Zurück zum Zitat Dovom EM et al (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. J Syst Architect 97:1–7 Dovom EM et al (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. J Syst Architect 97:1–7
35.
Zurück zum Zitat Parra GDLT et al (2020) Detecting Internet of Things attacks using distributed deep learning. J Netw Comput Appl 163:102662 Parra GDLT et al (2020) Detecting Internet of Things attacks using distributed deep learning. J Netw Comput Appl 163:102662
36.
Zurück zum Zitat Ahmad Z et al (2021) Anomaly detection using deep neural network for IoT architecture. Appl Sci 11(15):7050 Ahmad Z et al (2021) Anomaly detection using deep neural network for IoT architecture. Appl Sci 11(15):7050
37.
Zurück zum Zitat Kamel DK (2021) Wireless IoT with blockchain-enabled technology amidst attacks. IRO J Sustain Wirel Syst 2(3):133–137CrossRef Kamel DK (2021) Wireless IoT with blockchain-enabled technology amidst attacks. IRO J Sustain Wirel Syst 2(3):133–137CrossRef
38.
Zurück zum Zitat Amrish R, Bavapriyan K, Gopinaath V, Jawahar A, Vinoth Kumar C (2022) DDoS detection using machine learning techniques. J IoT Soc Mob Analytics Cloud 4(1):24–32 Amrish R, Bavapriyan K, Gopinaath V, Jawahar A, Vinoth Kumar C (2022) DDoS detection using machine learning techniques. J IoT Soc Mob Analytics Cloud 4(1):24–32
Metadaten
Titel
Attack Detection in IoT Using Machine Learning—A Survey
verfasst von
Saeed Ali Haifa Ali
J. Vakula Rani
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_16

Premium Partner