Skip to main content
Top
Published in: Journal of Network and Systems Management 1/2022

01-01-2022

Deep Learning in IoT Intrusion Detection

Authors: Stefanos Tsimenidis, Thomas Lagkas, Konstantinos Rantos

Published in: Journal of Network and Systems Management | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things (IoT) is the new paradigm of our times, where smart devices and sensors from across the globe are interconnected in a global grid, and distributed applications and services impact every area of human activity. With its huge economic impact and its pervasive influence over our lives, IoT is an attractive target for criminals, and cybersecurity becomes a top priority for the IoT ecosystem. Although cybersecurity has been the subject of research for decades, the large-scale IoT architecture and the emergence of novel threats render old strategies largely inefficient. Deep learning may provide cutting edge solutions for IoT intrusion detection, with its data-driven, anomaly-based approach and ability to detect emerging, unknown attacks. This survey offers a detailed review of deep learning models that have been proposed for IoT intrusion detection. Solutions have been classified by model in a comprehensive, structured analysis of how deep learning has been applied for IoT cybersecurity and their unique contributions to the development of effective IoT intrusion detection solutions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Abdullah, M., Alshannaq, A., Balamash, A., Almabdy, S.: Enhanced intrusion detection system using feature selection method and ensemble learning algorithms. IJCSIS 16(2), 48–55 (2018) Abdullah, M., Alshannaq, A., Balamash, A., Almabdy, S.: Enhanced intrusion detection system using feature selection method and ensemble learning algorithms. IJCSIS 16(2), 48–55 (2018)
3.
go back to reference Abomhara, M., Køien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 4(1), 65–88 (2015)CrossRef Abomhara, M., Køien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 4(1), 65–88 (2015)CrossRef
4.
go back to reference Agarwal, N., Hussain, S.Z.: A closer look at intrusion detection system for web applications. Secur. Commun. Netw. (2018) Agarwal, N., Hussain, S.Z.: A closer look at intrusion detection system for web applications. Secur. Commun. Netw. (2018)
6.
go back to reference Al Jallad, K., Aljnidi, M., Desouki, M.S.: Anomaly detection optimization using big data and deep learning to reduce false-positive. J. Big Data 7(1), 1–12 (2020)CrossRef Al Jallad, K., Aljnidi, M., Desouki, M.S.: Anomaly detection optimization using big data and deep learning to reduce false-positive. J. Big Data 7(1), 1–12 (2020)CrossRef
11.
go back to reference Amanullah, M.A., Habeeb, R.A.A., Nasaruddin, F.H., Gani, A., Ahmed, E., Nainar, A.S.M., Akim, N.M., Imran, M.: Deep learning and big data technologies for IoT security. Comput. Commun. 151, 495–517 (2020)CrossRef Amanullah, M.A., Habeeb, R.A.A., Nasaruddin, F.H., Gani, A., Ahmed, E., Nainar, A.S.M., Akim, N.M., Imran, M.: Deep learning and big data technologies for IoT security. Comput. Commun. 151, 495–517 (2020)CrossRef
12.
go back to reference Bahşi, H., Nõmm, S., La Torre, F.B.: Dimensionality reduction for machine learning based IoT botnet detection. In: 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), pp. 1857–1862. IEEE (2018) Bahşi, H., Nõmm, S., La Torre, F.B.: Dimensionality reduction for machine learning based IoT botnet detection. In: 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), pp. 1857–1862. IEEE (2018)
13.
go back to reference Bassey, J., Adesina, D., Li, X., Qian, L., Aved, A., Kroecker, T.: Intrusion detection for IoT devices based on RF fingerprinting using deep learning. In: 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), pp. 98–104. IEEE (2019) Bassey, J., Adesina, D., Li, X., Qian, L., Aved, A., Kroecker, T.: Intrusion detection for IoT devices based on RF fingerprinting using deep learning. In: 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), pp. 98–104. IEEE (2019)
14.
go back to reference Belenko, V., Chernenko, V., Kalinin, M., Krundyshev, V.: Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems. In: 2018 International Russian Automation Conference (RusAutoCon), pp. 1–7. IEEE (2018) Belenko, V., Chernenko, V., Kalinin, M., Krundyshev, V.: Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems. In: 2018 International Russian Automation Conference (RusAutoCon), pp. 1–7. IEEE (2018)
16.
go back to reference Cho, K., Van Merriënboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078 (2014) Cho, K., Van Merriënboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078 (2014)
17.
go back to reference Chollet, F., et al.: Deep Learning with Python, vol. 361. Manning, New York (2018) Chollet, F., et al.: Deep Learning with Python, vol. 361. Manning, New York (2018)
18.
go back to reference Chowdhury, M.M.U., Hammond, F., Konowicz, G., Xin, C., Wu, H., Li, J.: A few-shot deep learning approach for improved intrusion detection. In: 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 456–462. IEEE (2017) Chowdhury, M.M.U., Hammond, F., Konowicz, G., Xin, C., Wu, H., Li, J.: A few-shot deep learning approach for improved intrusion detection. In: 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 456–462. IEEE (2017)
19.
go back to reference Darbandi, F., Jafari, A., Karimipour, H., Dehghantanha, A., Derakhshan, F., Choo, K.K.R.: Real-time stability assessment in smart cyber-physical grids: a deep learning approach. IET Smart Grid 3(4), 454–461 (2020)CrossRef Darbandi, F., Jafari, A., Karimipour, H., Dehghantanha, A., Derakhshan, F., Choo, K.K.R.: Real-time stability assessment in smart cyber-physical grids: a deep learning approach. IET Smart Grid 3(4), 454–461 (2020)CrossRef
20.
go back to reference Dawoud, A., Shahristani, S., Raun, C.: Deep learning and software-defined networks: towards secure IoT architecture. Internet of Things 3, 82–89 (2018)CrossRef Dawoud, A., Shahristani, S., Raun, C.: Deep learning and software-defined networks: towards secure IoT architecture. Internet of Things 3, 82–89 (2018)CrossRef
22.
go back to reference Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for Internet of Things. Fut. Gener. Comput. Syst. 82, 761–768 (2018)CrossRef Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for Internet of Things. Fut. Gener. Comput. Syst. 82, 761–768 (2018)CrossRef
23.
go back to reference Elsaeidy, A., Munasinghe, K.S., Sharma, D., Jamalipour, A.: Intrusion detection in smart cities using restricted Boltzmann machines. J. Netw. Comput. Appl. 135, 76–83 (2019)CrossRef Elsaeidy, A., Munasinghe, K.S., Sharma, D., Jamalipour, A.: Intrusion detection in smart cities using restricted Boltzmann machines. J. Netw. Comput. Appl. 135, 76–83 (2019)CrossRef
24.
go back to reference Eswari, T., Vanitha, V.: A novel rule based intrusion detection framework for Wireless Sensor Networks. In: 2013 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1019–1022. IEEE, Chennai (2013). 10.1109/ICICES.2013.6508172 Eswari, T., Vanitha, V.: A novel rule based intrusion detection framework for Wireless Sensor Networks. In: 2013 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1019–1022. IEEE, Chennai (2013). 10.1109/ICICES.2013.6508172
25.
go back to reference Ferdowsi, A., Saad, W.: Generative adversarial networks for distributed intrusion detection in the internet of things. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019) Ferdowsi, A., Saad, W.: Generative adversarial networks for distributed intrusion detection in the internet of things. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019)
26.
go back to reference Fernandes, E., Rahmati, A., Eykholt, K., Prakash, A.: Internet of things security research: a rehash of old ideas or new intellectual challenges? IEEE Secur. Priv. 15(4), 79–84 (2017)CrossRef Fernandes, E., Rahmati, A., Eykholt, K., Prakash, A.: Internet of things security research: a rehash of old ideas or new intellectual challenges? IEEE Secur. Priv. 15(4), 79–84 (2017)CrossRef
27.
go back to reference Ferrag, M.A., Maglaras, L., Ahmim, A., Derdour, M., Janicke, H.: RDTIDS: rules and decision tree-based intrusion detection system for internet-of-things networks. Fut. Internet 12(3), 44 (2020)CrossRef Ferrag, M.A., Maglaras, L., Ahmim, A., Derdour, M., Janicke, H.: RDTIDS: rules and decision tree-based intrusion detection system for internet-of-things networks. Fut. Internet 12(3), 44 (2020)CrossRef
28.
go back to reference Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020) Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020)
29.
go back to reference Fiore, U., Palmieri, F., Castiglione, A., De Santis, A.: Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122, 13–23 (2013)CrossRef Fiore, U., Palmieri, F., Castiglione, A., De Santis, A.: Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122, 13–23 (2013)CrossRef
30.
go back to reference Garcia-Morchon, O., Kumar, S., Keoh, S., Hummen, R., Struik, R.: Security considerations in the IP-based Internet of Things draft-garciacore-security-06. Internet Engineering Task Force (2013) Garcia-Morchon, O., Kumar, S., Keoh, S., Hummen, R., Struik, R.: Security considerations in the IP-based Internet of Things draft-garciacore-security-06. Internet Engineering Task Force (2013)
31.
go back to reference Gül, A., Adalı, E.: A feature selection algorithm for ids. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 816–820. IEEE (2017) Gül, A., Adalı, E.: A feature selection algorithm for ids. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 816–820. IEEE (2017)
36.
go back to reference Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.L., Iorkyase, E., Tachtatzis, C., Atkinson, R.: In: Threat analysis of IoT networks using artificial neural network intrusion detection system, pp. 1–6. IEEE (2016) Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.L., Iorkyase, E., Tachtatzis, C., Atkinson, R.: In: Threat analysis of IoT networks using artificial neural network intrusion detection system, pp. 1–6. IEEE (2016)
37.
go back to reference Hu, W., Liao, Y., Vemuri, V.R.: Robust support vector machines for anomaly detection in computer security. In: ICMLA, pp. 168–174 (2003) Hu, W., Liao, Y., Vemuri, V.R.: Robust support vector machines for anomaly detection in computer security. In: ICMLA, pp. 168–174 (2003)
38.
go back to reference Huda, S., Miah, S., Yearwood, J., Alyahya, S., Al-Dossari, H., Doss, R.: A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network. J. Parallel Distrib. Comput. 120, 23–31 (2018)CrossRef Huda, S., Miah, S., Yearwood, J., Alyahya, S., Al-Dossari, H., Doss, R.: A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network. J. Parallel Distrib. Comput. 120, 23–31 (2018)CrossRef
39.
go back to reference Huong, P.V., Thuan, L.D., Hong Van, L.T., Hung, D.V.: Intrusion detection in IoT systems based on deep learning using convolutional neural network. In: 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), pp. 448–453. IEEE, Hanoi, Vietnam (2019). https://doi.org/10.1109/NICS48868.2019.9023871. https://ieeexplore.ieee.org/document/9023871/ Huong, P.V., Thuan, L.D., Hong Van, L.T., Hung, D.V.: Intrusion detection in IoT systems based on deep learning using convolutional neural network. In: 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), pp. 448–453. IEEE, Hanoi, Vietnam (2019). https://​doi.​org/​10.​1109/​NICS48868.​2019.​9023871.​ https://​ieeexplore.​ieee.​org/​document/​9023871/​
41.
go back to reference Hwang, R.H., Peng, M.C., Huang, C.W.: Detecting IoT malicious traffic based on autoencoder and convolutional neural network. In: 2019 IEEE Globecom Workshops (GC Wkshps), pp. 1–6. IEEE (2019) Hwang, R.H., Peng, M.C., Huang, C.W.: Detecting IoT malicious traffic based on autoencoder and convolutional neural network. In: 2019 IEEE Globecom Workshops (GC Wkshps), pp. 1–6. IEEE (2019)
43.
go back to reference Ibitoye, O., Shafiq, O., Matrawy, A.: Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019) Ibitoye, O., Shafiq, O., Matrawy, A.: Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019)
44.
go back to reference Imamverdiyev, Y.N., Abdullayeva, F.J.: Deep learning in cybersecurity: challenges and approaches. IJCWT 10(2), 82–105 (2020) Imamverdiyev, Y.N., Abdullayeva, F.J.: Deep learning in cybersecurity: challenges and approaches. IJCWT 10(2), 82–105 (2020)
45.
go back to reference Jan, T.: Ada-boosted locally enhanced probabilistic neural network for IoT intrusion detection. In: Conference on Complex, Intelligent, and Software Intensive Systems, pp. 583–589. Springer (2018) Jan, T.: Ada-boosted locally enhanced probabilistic neural network for IoT intrusion detection. In: Conference on Complex, Intelligent, and Software Intensive Systems, pp. 583–589. Springer (2018)
46.
go back to reference Jun, C., Chi, C.: Design of complex event-processing IDS in internet of things. In: 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation, pp. 226–229. IEEE (2014) Jun, C., Chi, C.: Design of complex event-processing IDS in internet of things. In: 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation, pp. 226–229. IEEE (2014)
47.
go back to reference Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), e0155781 (2016)CrossRef Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), e0155781 (2016)CrossRef
48.
go back to reference Karimipour, H., Dehghantanha, A., Parizi, R.M., Choo, K.K.R., Leung, H.: A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 7, 80778–80788 (2019)CrossRef Karimipour, H., Dehghantanha, A., Parizi, R.M., Choo, K.K.R., Leung, H.: A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 7, 80778–80788 (2019)CrossRef
49.
go back to reference Khan, M.A., Karim, M., Kim, Y., et al.: A scalable and hybrid intrusion detection system based on the convolutional-LSTM network. Symmetry 11(4), 583 (2019)CrossRef Khan, M.A., Karim, M., Kim, Y., et al.: A scalable and hybrid intrusion detection system based on the convolutional-LSTM network. Symmetry 11(4), 583 (2019)CrossRef
50.
go back to reference Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1–22 (2019)CrossRef Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1–22 (2019)CrossRef
51.
go back to reference King, J., Awad, A.I.: A distributed security mechanism for resource-constrained IoT devices. Informatica 40(1), 133 (2016) King, J., Awad, A.I.: A distributed security mechanism for resource-constrained IoT devices. Informatica 40(1), 133 (2016)
52.
go back to reference Kingma, D.P., Mohamed, S., Jimenez Rezende, D., Welling, M.: Semi-supervised learning with deep generative models. Adv. Neural Inf. Process. Syst. 27, 3581–3589 (2014) Kingma, D.P., Mohamed, S., Jimenez Rezende, D., Welling, M.: Semi-supervised learning with deep generative models. Adv. Neural Inf. Process. Syst. 27, 3581–3589 (2014)
53.
go back to reference Klambauer, G., Unterthiner, T., Mayr, A., Hochreiter, S.: Self-normalizing neural networks. In: Advances in Neural Information Processing Systems, pp. 971–980 (2017) Klambauer, G., Unterthiner, T., Mayr, A., Hochreiter, S.: Self-normalizing neural networks. In: Advances in Neural Information Processing Systems, pp. 971–980 (2017)
54.
go back to reference Kobojek, P., Saeed, K.: Application of recurrent neural networks for user verification based on keystroke dynamics. J. Telecommun. Inf. Technol. 2016(3), 80–90 (2016) Kobojek, P., Saeed, K.: Application of recurrent neural networks for user verification based on keystroke dynamics. J. Telecommun. Inf. Technol. 2016(3), 80–90 (2016)
55.
go back to reference Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRef Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRef
56.
go back to reference Kulkarni, R.V., Venayagamoorthy, G.K.: Neural network based secure media access control protocol for wireless sensor networks. In: 2009 International Joint Conference on Neural Networks, pp. 1680–1687. IEEE (2009) Kulkarni, R.V., Venayagamoorthy, G.K.: Neural network based secure media access control protocol for wireless sensor networks. In: 2009 International Joint Conference on Neural Networks, pp. 1680–1687. IEEE (2009)
57.
go back to reference Lee, J., Park, K.: GAN-Based Imbalanced Data Intrusion Detection System. Personal and Ubiquitous Computing, pp. 1–8. Springer, Berlin (2019) Lee, J., Park, K.: GAN-Based Imbalanced Data Intrusion Detection System. Personal and Ubiquitous Computing, pp. 1–8. Springer, Berlin (2019)
58.
go back to reference Lee, S.J., Yoo, P.D., Asyhari, A.T., Jhi, Y., Chermak, L., Yeun, C.Y., Taha, K.: IMPACT: impersonation attack detection via edge computing using deep autoencoder and feature abstraction. IEEE Access 8, 65520–65529 (2020)CrossRef Lee, S.J., Yoo, P.D., Asyhari, A.T., Jhi, Y., Chermak, L., Yeun, C.Y., Taha, K.: IMPACT: impersonation attack detection via edge computing using deep autoencoder and feature abstraction. IEEE Access 8, 65520–65529 (2020)CrossRef
59.
go back to reference Li, D., Deng, L., Lee, M., Wang, H.: IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int. J. Inf. Manage 49, 533–545 (2019)CrossRef Li, D., Deng, L., Lee, M., Wang, H.: IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int. J. Inf. Manage 49, 533–545 (2019)CrossRef
60.
go back to reference Li, J., Zhao, Z., Li, R., Zhang, H.: Ai-based two-stage intrusion detection for software defined IoT networks. IEEE Internet of Things J. 6(2), 2093–2102 (2018)CrossRef Li, J., Zhao, Z., Li, R., Zhang, H.: Ai-based two-stage intrusion detection for software defined IoT networks. IEEE Internet of Things J. 6(2), 2093–2102 (2018)CrossRef
61.
go back to reference Li, W., Yi, P., Wu, Y., Pan, L., Li, J.: A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J. Electric. Comput. Eng. (2014) 10.1155/2014/240217 Li, W., Yi, P., Wu, Y., Pan, L., Li, J.: A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J. Electric. Comput. Eng. (2014) 10.1155/2014/240217
63.
go back to reference Liu, J., Yin, L., Hu, Y., Lv, S., Sun, L.: A novel intrusion detection algorithm for industrial control systems based on CNN and process state transition. In: 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC), pp. 1–8. IEEE (2018) Liu, J., Yin, L., Hu, Y., Lv, S., Sun, L.: A novel intrusion detection algorithm for industrial control systems based on CNN and process state transition. In: 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC), pp. 1–8. IEEE (2018)
64.
go back to reference Liu, Y., Pi, D.: A novel kernel SVM algorithm with game theory for network intrusion detection. KSII Trans. Internet Inf. Syst. 11(8), 20 (2017) Liu, Y., Pi, D.: A novel kernel SVM algorithm with game theory for network intrusion detection. KSII Trans. Internet Inf. Syst. 11(8), 20 (2017)
65.
go back to reference Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17(9), 1967 (2017)CrossRef Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17(9), 1967 (2017)CrossRef
66.
go back to reference Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6, 3491–3508 (2017)CrossRef Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6, 3491–3508 (2017)CrossRef
70.
71.
go back to reference McElwee, S., Heaton, J., Fraley, J., Cannady, J.: Deep learning for prioritizing and responding to intrusion detection alerts. In: MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), pp. 1–5. IEEE (2017) McElwee, S., Heaton, J., Fraley, J., Cannady, J.: Deep learning for prioritizing and responding to intrusion detection alerts. In: MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), pp. 1–5. IEEE (2017)
74.
go back to reference Mikolov, T., Yih, W.t., Zweig, G.: Linguistic regularities in continuous space word representations. In: Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 746–751 (2013) Mikolov, T., Yih, W.t., Zweig, G.: Linguistic regularities in continuous space word representations. In: Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 746–751 (2013)
75.
go back to reference Min, E., Long, J., Liu, Q., Cui, J., Chen, W.: TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest. Secur. Commun. Netw. (2018) Min, E., Long, J., Liu, Q., Cui, J., Chen, W.: TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest. Secur. Commun. Netw. (2018)
76.
go back to reference Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015) Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015)
77.
go back to reference Munir, M., Siddiqui, S.A., Chattha, M.A., Dengel, A., Ahmed, S.: FuseAD: unsupervised anomaly detection in streaming sensors data by fusing statistical and deep learning models. Sensors 19(11), 2451 (2019)CrossRef Munir, M., Siddiqui, S.A., Chattha, M.A., Dengel, A., Ahmed, S.: FuseAD: unsupervised anomaly detection in streaming sensors data by fusing statistical and deep learning models. Sensors 19(11), 2451 (2019)CrossRef
79.
go back to reference Münz, G., Li, S., Carle, G.: Traffic anomaly detection using k-means clustering. In: GI/ITG Workshop MMBnet, pp. 13–14 (2007) Münz, G., Li, S., Carle, G.: Traffic anomaly detection using k-means clustering. In: GI/ITG Workshop MMBnet, pp. 13–14 (2007)
80.
go back to reference Ngo, Q.D., Nguyen, H.T., Nguyen, L.C., Nguyen, D.H.: A survey of IoT malware and detection methods based on static features. ICT Express (2020) Ngo, Q.D., Nguyen, H.T., Nguyen, L.C., Nguyen, D.H.: A survey of IoT malware and detection methods based on static features. ICT Express (2020)
81.
go back to reference Nicolae, M.I., Sinn, M., Tran, M.N., Buesser, B., Rawat, A., Wistuba, M., Zantedeschi, V., Baracaldo, N., Chen, B., Ludwig, H., et al.: Adversarial Robustness Toolbox v1. 0.0. arXiv preprint arXiv:1807.01069 (2018) Nicolae, M.I., Sinn, M., Tran, M.N., Buesser, B., Rawat, A., Wistuba, M., Zantedeschi, V., Baracaldo, N., Chen, B., Ludwig, H., et al.: Adversarial Robustness Toolbox v1. 0.0. arXiv preprint arXiv:1807.01069 (2018)
82.
go back to reference Notra, S., Siddiqi, M., Gharakheili, H.H., Sivaraman, V., Boreli, R.: An experimental study of security and privacy risks with emerging household appliances. In: 2014 IEEE conference on communications and network security, pp. 79–84. IEEE (2014) Notra, S., Siddiqi, M., Gharakheili, H.H., Sivaraman, V., Boreli, R.: An experimental study of security and privacy risks with emerging household appliances. In: 2014 IEEE conference on communications and network security, pp. 79–84. IEEE (2014)
83.
go back to reference O’Shea, T.J., West, N., Vondal, M., Clancy, T.C.: Semi-supervised radio signal identification. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 33–38. IEEE, Pyeongchang, Kwangwoon Do, South Korea (2017). https://doi.org/10.23919/ICACT.2017.7890052. http://ieeexplore.ieee.org/document/7890052/ O’Shea, T.J., West, N., Vondal, M., Clancy, T.C.: Semi-supervised radio signal identification. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 33–38. IEEE, Pyeongchang, Kwangwoon Do, South Korea (2017). https://​doi.​org/​10.​23919/​ICACT.​2017.​7890052.​ http://​ieeexplore.​ieee.​org/​document/​7890052/​
84.
go back to reference Otoum, S., Kantarci, B., Mouftah, H.T.: On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw. Lett. 1(2), 68–71 (2019)CrossRef Otoum, S., Kantarci, B., Mouftah, H.T.: On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw. Lett. 1(2), 68–71 (2019)CrossRef
85.
go back to reference Pamukov, M.E., Poulkov, V.K., Shterev, V.A.: Negative selection and neural network based algorithm for intrusion detection in IoT. In: 2018 41st International Conference on Telecommunications and Signal Processing (TSP), pp. 1–5. IEEE (2018) Pamukov, M.E., Poulkov, V.K., Shterev, V.A.: Negative selection and neural network based algorithm for intrusion detection in IoT. In: 2018 41st International Conference on Telecommunications and Signal Processing (TSP), pp. 1–5. IEEE (2018)
86.
go back to reference Pan, J., Yang, Z.: Cybersecurity Challenges and Opportunities in the New” Edge Computing+ IoT” World. In: Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, pp. 29–32 (2018) Pan, J., Yang, Z.: Cybersecurity Challenges and Opportunities in the New” Edge Computing+ IoT” World. In: Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, pp. 29–32 (2018)
87.
go back to reference Patel, K.K., Patel, S.M., et al.: Internet of things-iot: definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5), (2016) Patel, K.K., Patel, S.M., et al.: Internet of things-iot: definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5), (2016)
88.
go back to reference Potluri, S., Ahmed, S., Diedrich, C.: Convolutional neural networks for multi-class intrusion detection system. In: International Conference on Mining Intelligence and Knowledge Exploration, pp. 225–238. Springer (2018) Potluri, S., Ahmed, S., Diedrich, C.: Convolutional neural networks for multi-class intrusion detection system. In: International Conference on Mining Intelligence and Knowledge Exploration, pp. 225–238. Springer (2018)
89.
go back to reference Prabavathy, S., Sundarakantham, K., Shalinie, S.M.: Design of cognitive fog computing for intrusion detection in Internet of Things. J. Commun. Netw. 20(3), 291–298 (2018)CrossRef Prabavathy, S., Sundarakantham, K., Shalinie, S.M.: Design of cognitive fog computing for intrusion detection in Internet of Things. J. Commun. Netw. 20(3), 291–298 (2018)CrossRef
90.
go back to reference Prokofiev, A.O., Smirnova, Y.S., Surov, V.A.: A method to detect Internet of Things botnets. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 105–108. IEEE (2018) Prokofiev, A.O., Smirnova, Y.S., Surov, V.A.: A method to detect Internet of Things botnets. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 105–108. IEEE (2018)
91.
go back to reference Qureshi, A.u.H., Larijani, H., Ahmad, J., Mtetwa, N.: A Heuristic intrusion detection system for Internet-of-Things (IoT). In: K. Arai, R. Bhatia, S. Kapoor (eds.) Intelligent Computing, vol. 997, pp. 86–98. Springer International Publishing, Cham (2019). https://doi.org/10.1007/978-3-030-22871-2_7. http://link.springer.com/10.1007/978-3-030-22871-2_7. Series Title: Advances in Intelligent Systems and Computing Qureshi, A.u.H., Larijani, H., Ahmad, J., Mtetwa, N.: A Heuristic intrusion detection system for Internet-of-Things (IoT). In: K. Arai, R. Bhatia, S. Kapoor (eds.) Intelligent Computing, vol. 997, pp. 86–98. Springer International Publishing, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-22871-2_​7.​ http://​link.​springer.​com/​10.​1007/​978-3-030-22871-2_​7. Series Title: Advances in Intelligent Systems and Computing
92.
go back to reference Radford, B.J., Apolonio, L.M., Trias, A.J., Simpson, J.A.: Network traffic anomaly detection using recurrent neural networks. arXiv preprint arXiv:1803.10769 (2018) Radford, B.J., Apolonio, L.M., Trias, A.J., Simpson, J.A.: Network traffic anomaly detection using recurrent neural networks. arXiv preprint arXiv:1803.10769 (2018)
93.
go back to reference Rigaki, M., Garcia, S.: Bringing a gan to a knife-fight: adapting malware communication to avoid detection. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 70–75. IEEE (2018) Rigaki, M., Garcia, S.: Bringing a gan to a knife-fight: adapting malware communication to avoid detection. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 70–75. IEEE (2018)
94.
go back to reference Ring, M., Wunderlich, S., Gruedl, D., Landes, D., Hotho, A.: Technical report cidds-001 data set. Tech. rep., Tech. rep. 2017 (cit. on p. 19) (2018) Ring, M., Wunderlich, S., Gruedl, D., Landes, D., Hotho, A.: Technical report cidds-001 data set. Tech. rep., Tech. rep. 2017 (cit. on p. 19) (2018)
95.
go back to reference Roux, J., Alata, E., Auriol, G., Nicomette, V., Kaâniche, M.: Toward an intrusion detection approach for IoT based on radio communications profiling. In: 2017 13th European Dependable Computing Conference (EDCC), pp. 147–150. IEEE (2017) Roux, J., Alata, E., Auriol, G., Nicomette, V., Kaâniche, M.: Toward an intrusion detection approach for IoT based on radio communications profiling. In: 2017 13th European Dependable Computing Conference (EDCC), pp. 147–150. IEEE (2017)
96.
go back to reference Saeed, A., Ahmadinia, A., Javed, A., Larijani, H.: Random neural network based intelligent intrusion detection for wireless sensor networks. Proc. Comput. Sci. 80, 2372–2376 (2016)CrossRef Saeed, A., Ahmadinia, A., Javed, A., Larijani, H.: Random neural network based intelligent intrusion detection for wireless sensor networks. Proc. Comput. Sci. 80, 2372–2376 (2016)CrossRef
97.
go back to reference Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans. Signal Process. 45(11), 2673–2681 (1997)CrossRef Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans. Signal Process. 45(11), 2673–2681 (1997)CrossRef
98.
go back to reference Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. (2017) Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. (2017)
99.
go back to reference Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. Digital Commun. Netw. 4(2), 118–137 (2018)CrossRef Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. Digital Commun. Netw. 4(2), 118–137 (2018)CrossRef
100.
go back to reference Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSp, pp. 108–116 (2018) Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSp, pp. 108–116 (2018)
101.
go back to reference Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)CrossRef Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)CrossRef
102.
go back to reference Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRef Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRef
103.
go back to reference Sohn, K., Lee, H., Yan, X.: Learning structured output representation using deep conditional generative models. In: Advances in Neural Information Processing Systems, pp. 3483–3491 (2015) Sohn, K., Lee, H., Yan, X.: Learning structured output representation using deep conditional generative models. In: Advances in Neural Information Processing Systems, pp. 3483–3491 (2015)
104.
go back to reference Susilo, B., Sari, R.F.: Intrusion detection in IoT networks using deep learning algorithm. Information 11(5), 279 (2020)CrossRef Susilo, B., Sari, R.F.: Intrusion detection in IoT networks using deep learning algorithm. Information 11(5), 279 (2020)CrossRef
105.
go back to reference Syarif, I., Prugel-Bennett, A., Wills, G.: Unsupervised clustering approach for network anomaly detection. In: International Conference on Networked Digital Technologies, pp. 135–145. Springer (2012) Syarif, I., Prugel-Bennett, A., Wills, G.: Unsupervised clustering approach for network anomaly detection. In: International Conference on Networked Digital Technologies, pp. 135–145. Springer (2012)
106.
go back to reference Tajbakhsh, A., Rahmati, M., Mirzaei, A.: Intrusion detection using fuzzy association rules. Appl. Soft Comput. 9(2), 462–469 (2009)CrossRef Tajbakhsh, A., Rahmati, M., Mirzaei, A.: Intrusion detection using fuzzy association rules. Appl. Soft Comput. 9(2), 462–469 (2009)CrossRef
107.
go back to reference Tama, B.A., Rhee, K.H.: Attack classification analysis of IoT network via deep learning approach. ReBICTE 3, 1–9 (2017) Tama, B.A., Rhee, K.H.: Attack classification analysis of IoT network via deep learning approach. ReBICTE 3, 1–9 (2017)
108.
go back to reference Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6. IEEE (2009) Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6. IEEE (2009)
109.
go back to reference Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130–139. IEEE (2016) Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130–139. IEEE (2016)
110.
go back to reference Teyou, D., Kamdem, G., Ziazet, J.: Convolutional neural network for intrusion detection system. In: Cyber Physical Systems. arXiv preprint arXiv:1905.03168 (2019) Teyou, D., Kamdem, G., Ziazet, J.: Convolutional neural network for intrusion detection system. In: Cyber Physical Systems. arXiv preprint arXiv:1905.03168 (2019)
111.
go back to reference Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9), 1977 (2019)CrossRef Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9), 1977 (2019)CrossRef
112.
go back to reference Tian, Z., Luo, C., Qiu, J., Du, X., Guizani, M.: A distributed deep learning system for web attack detection on edge devices. IEEE Trans. Ind. Inform. 16(3), 1963–1971 (2019)CrossRef Tian, Z., Luo, C., Qiu, J., Du, X., Guizani, M.: A distributed deep learning system for web attack detection on edge devices. IEEE Trans. Ind. Inform. 16(3), 1963–1971 (2019)CrossRef
113.
go back to reference Tran, N.N., Sarker, R., Hu, J.: An approach for host-based intrusion detection system design using convolutional neural network. In: International Conference on Mobile Networks and Management, pp. 116–126. Springer (2017) Tran, N.N., Sarker, R., Hu, J.: An approach for host-based intrusion detection system design using convolutional neural network. In: International Conference on Mobile Networks and Management, pp. 116–126. Springer (2017)
114.
go back to reference Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., Robinson, S.: Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811 (2017) Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., Robinson, S.: Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811 (2017)
115.
go back to reference Vlajic, N., Zhou, D.: IoT as a land of opportunity for DDoS hackers. Computer 51(7), 26–34 (2018)CrossRef Vlajic, N., Zhou, D.: IoT as a land of opportunity for DDoS hackers. Computer 51(7), 26–34 (2018)CrossRef
116.
go back to reference Wang, Z.: Deep learning-based intrusion detection with adversaries. IEEE Access 6, 38367–38384 (2018)CrossRef Wang, Z.: Deep learning-based intrusion detection with adversaries. IEEE Access 6, 38367–38384 (2018)CrossRef
117.
go back to reference Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., Zhu, M.: HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2017)CrossRef Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., Zhu, M.: HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2017)CrossRef
118.
go back to reference Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), pp. 712–717. IEEE (2017) Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), pp. 712–717. IEEE (2017)
119.
go back to reference Warzyński, A., Kołaczek, G.: Intrusion detection systems vulnerability on adversarial examplhwanges. In: 2018 Innovations in Intelligent Systems and Applications (INISTA), pp. 1–4. IEEE (2018) Warzyński, A., Kołaczek, G.: Intrusion detection systems vulnerability on adversarial examplhwanges. In: 2018 Innovations in Intelligent Systems and Applications (INISTA), pp. 1–4. IEEE (2018)
122.
go back to reference Yu, Y., Long, J., Cai, Z.: Network intrusion detection through stacking dilated convolutional autoencoders. Secur. Commun. Netw. (2017) Yu, Y., Long, J., Cai, Z.: Network intrusion detection through stacking dilated convolutional autoencoders. Secur. Commun. Netw. (2017)
123.
go back to reference Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–8. IEEE (2017) Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–8. IEEE (2017)
124.
go back to reference Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25–37 (2017)CrossRef Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25–37 (2017)CrossRef
125.
go back to reference Zeng, Y., Gu, H., Wei, W., Guo, Y.: \$ Deep-Full-Range \$: a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access 7, 45182–45190 (2019)CrossRef Zeng, Y., Gu, H., Wei, W., Guo, Y.: \$ Deep-Full-Range \$: a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access 7, 45182–45190 (2019)CrossRef
126.
go back to reference Zhang, A.Y., Lam, S.S.W., Ong, M.E.H., Tang, P.H., Chan, L.L.: Explainable AI: classification of MRI brain scans orders for quality improvement. In: Proceedings of the 6th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, pp. 95–102 (2019) Zhang, A.Y., Lam, S.S.W., Ong, M.E.H., Tang, P.H., Chan, L.L.: Explainable AI: classification of MRI brain scans orders for quality improvement. In: Proceedings of the 6th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, pp. 95–102 (2019)
127.
go back to reference Zhang, B., Yu, Y., Li, J.: Network intrusion detection based on stacked sparse autoencoder and binary tree ensemble method. In: 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1–6. IEEE (2018) Zhang, B., Yu, Y., Li, J.: Network intrusion detection based on stacked sparse autoencoder and binary tree ensemble method. In: 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1–6. IEEE (2018)
128.
go back to reference Zhang, C., Shang, B., Wei, P., Li, L., Liu, Y., Zheng, N.: Building explainable AI evaluation for autonomous perception. In: CVPR Workshops, pp. 20–23 (2019) Zhang, C., Shang, B., Wei, P., Li, L., Liu, Y., Zheng, N.: Building explainable AI evaluation for autonomous perception. In: CVPR Workshops, pp. 20–23 (2019)
129.
go back to reference Zhang, H., Yu, X., Ren, P., Luo, C., Min, G.: Deep adversarial learning in intrusion detection: A data augmentation enhanced framework. arXiv preprint arXiv:1901.07949 (2019) Zhang, H., Yu, X., Ren, P., Luo, C., Min, G.: Deep adversarial learning in intrusion detection: A data augmentation enhanced framework. arXiv preprint arXiv:1901.07949 (2019)
130.
go back to reference Zhang, Y., Li, P., Wang, X.: Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711–31722 (2019)CrossRef Zhang, Y., Li, P., Wang, X.: Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711–31722 (2019)CrossRef
131.
go back to reference Zhao, L., Su, C., Huang, H., Han, Z., Ding, S., Li, X.: Intrusion detection based on device-free localization in the era of IoT. Symmetry 11(5), 630 (2019)CrossRef Zhao, L., Su, C., Huang, H., Han, Z., Ding, S., Li, X.: Intrusion detection based on device-free localization in the era of IoT. Symmetry 11(5), 630 (2019)CrossRef
Metadata
Title
Deep Learning in IoT Intrusion Detection
Authors
Stefanos Tsimenidis
Thomas Lagkas
Konstantinos Rantos
Publication date
01-01-2022
Publisher
Springer US
Published in
Journal of Network and Systems Management / Issue 1/2022
Print ISSN: 1064-7570
Electronic ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-021-09621-9

Other articles of this Issue 1/2022

Journal of Network and Systems Management 1/2022 Go to the issue

Premium Partner