Skip to main content
Log in

A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges

  • Original Paper
  • Published:
Archives of Computational Methods in Engineering Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical environment with the cyber world and create one big intelligent network. This technology has been applied to various application domains such as developing smart home, smart cities, healthcare applications, wireless sensor networks, cloud environment, enterprise network, web applications, and smart grid technologies. These wide emerging applications in variety of domains raise many security issues such as protecting devices and network, attacks in IoT networks, and managing resource-constrained IoT networks. To address the scalability and resource-constrained security issues, many security solutions have been proposed for IoT such as web application firewalls and intrusion detection systems. In this paper, a comprehensive survey on Intrusion Detection System (IDS) for IoT is presented for years 2015–2019. We have discussed various IDS placement strategies and IDS analysis strategies in IoT architecture. The paper discusses various intrusions in IoT, along with Machine Learning (ML) and Deep Learning (DL) techniques for detecting attacks in IoT networks. The paper also discusses security issues and challenges in IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497

    Google Scholar 

  2. Intel (2019) A guide to Internet of Things infographics. https://www.intel.in/content/www/in/en/internet-of-things/infographics/guide-to-iot.html (Accessed 23 July 2019)

  3. Borgia E (2014) The Internet of Things vision: key features, applications and open issues. Comput Commun 54:1

    Google Scholar 

  4. Notra S, Siddiqi M, Gharakheili HH, Sivaraman V, Boreli R (2014) An experimental study of security and privacy risks with emerging household appliances. In: 2014 IEEE conference on communications and network security, IEEE, 2014, pp 79–84

  5. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of Things: the road ahead. Comput Netw 76:146

    Google Scholar 

  6. Thakkar A, Lohiya R (2019) Role of swarm and evolutionary algorithms for intrusion detection system: a survey. In: Swarm and evolutionary computation, p 100631

  7. Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of Things: security vulnerabilities and challenges. In: 2015 IEEE symposium on computers and communication (ISCC), IEEE, pp 180–187

  8. Ożadowicz A, Grela J (2017) Energy saving in the street lighting control system-a new approach based on the EN-15232 standard. Energ Effi 10(3):563

    Google Scholar 

  9. Elejoste P, Angulo I, Perallos A, Chertudi A, Zuazola I, Moreno A, Azpilicueta L, Astrain J, Falcone F, Villadangos J (2013) An easy to deploy street light control system based on wireless communication and LED technology. Sensors 13(5):6492

    Google Scholar 

  10. Wang W, Liu AX, Shahzad M (2016) Gait recognition using wifi signals. In: Proceedings of the 2016 ACM international joint conference on pervasive and ubiquitous computing, ACM, pp 363–373

  11. Al-Fuqaha A, Khreishah A, Guizani M, Rayes A, Mohammadi M (2015) Toward better horizontal integration among IoT services. IEEE Commun Mag 53(9):72

    Google Scholar 

  12. Hussein NH, Khalid A (2016) A survey of cloud computing security challenges and solutions. Int J Comput Sci Inf Secur 14(1):52

    Google Scholar 

  13. Kazim M, Zhu SY (2015) A survey on top security threats in cloud computing

  14. Chiba Z, Abghour N, Moussaid K, El Omri A, Rida M (2016) A survey of intrusion detection systems for cloud computing environment. In: 2016 international conference on engineering and MIS (ICEMIS), IEEE, pp 1–13

  15. Mittal NK (2016) A survey on wireless sensor network for community intrusion detection systems. In: 2016 3rd international conference on recent advances in information technology (RAIT), IEEE, pp 107–111

  16. Chhaya L, Sharma P, Bhagwatikar G, Kumar A (2017) Wireless sensor network based smart grid communications: cyber attacks, intrusion detection system and topology control. Electronics 6(1):5

    Google Scholar 

  17. Can O, Sahingoz OK (2015) A survey of intrusion detection systems in wireless sensor networks. In: 2015 6th international conference on modeling, simulation, and applied optimization (ICMSAO), IEEE, pp 1–6

  18. Emmanuel M, Rayudu R (2016) Communication technologies for smart grid applications: a survey. J Netw Comput Appl 74:133

    Google Scholar 

  19. Colak I, Sagiroglu S, Fulli G, Yesilbudak M, Covrig CF (2016) A survey on the critical issues in smart grid technologies. Renew Sustain Energy Rev 54:396

    Google Scholar 

  20. Cintuglu MH, Mohammed OA, Akkaya K, Uluagac AS (2016) A survey on smart grid cyber-physical system testbeds. IEEE Commun Surv Tutor 19(1):446

    Google Scholar 

  21. Lee S, Bae M, Kim H (2017) Future of IoT networks: a survey. Appl Sci 7(10):1072

    Google Scholar 

  22. Ahamed J, Rajan AV (2016) Internet of Things (IoT): application systems and security vulnerabilities. In: 2016 5th international conference on electronic devices, systems and applications (ICEDSA), IEEE, pp 1–5

  23. Meddeb A (2016) Internet of things standards: who stands out from the crowd? IEEE Commun Mag 54(7):40

    Google Scholar 

  24. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347

    Google Scholar 

  25. Shelby Z, Hartke K, Bormann C (2014) The constrained application protocol (CoAP)

  26. Alliance L (2015) White Paper, A technical overview of LoRa and LoRaWAN, November

  27. Gómez J, Huete JF, Hoyos O, Perez L, Grigori D (2013) Interaction system based on Internet of Things as support for education. Procedia Comput Sci 21:132

    Google Scholar 

  28. Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wireless Pers Commun 58(1):49

    Google Scholar 

  29. Aazam M, Khan I, Alsaffar AA, Huh EN (2014) Cloud of things: integrating Internet of Things and cloud computing and the issues involved. In: Proceedings of 2014 11th international bhurban conference on applied sciences and technology (IBCAST) Islamabad, Pakistan, 14th–18th, IEEE, pp 414–419

  30. Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw 11(8):2661

    Google Scholar 

  31. Oh D, Kim D, Ro W (2014) A malicious pattern detection engine for embedded security systems in the Internet of Things. Sensors 14(12):24188

    Google Scholar 

  32. Zhang W (2016) An improved Wu-Manber multiple patterns matching algorithm. In: 2016 IEEE international conference on electronic information and communication technology (ICEICT), IEEE, pp 286–289

  33. Lee TH, Wen CH, Chang LH, Chiang HS, Hsieh MC (2014) A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN. In: Advanced technologies, embedded and multimedia for human-centric computing, Springer, pp 1205–1213

  34. Cervantes C, Poplade D, Nogueira M, Santos A (2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE international symposium on integrated network management (IM), IEEE, pp 606–611

  35. Cho EJ, Kim JH, Hong CS (2009) Attack model and detection scheme for botnet on 6LoWPAN. In: Asia-Pacific network operations and management symposium, Springer, pp 515–518

  36. Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-Service detection in 6LoWPAN based Internet of Things. In: 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob), IEEE, pp 600–607

  37. Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) An IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security, ACM, pp 1337–1340

  38. Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based internet of things. Int J Distrib Sens Netw 9(8):794326

    Google Scholar 

  39. Amaral JP, Oliveira LM, Rodrigues JJ, Han G, Shu L (2014) Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In: 2014 IEEE international conference on communications (ICC), IEEE, pp 1796–1801

  40. Le A, Loo J, Luo Y, Lasebae A (2011) Specification-based IDS for securing RPL from topology attacks. In: 2011 IFIP wireless days (WD), IEEE, pp 1–3

  41. Le A, Loo J, Chai K, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):25

    Google Scholar 

  42. Pongle P, Chavan G (2015) Real time intrusion and wormhole attack detection in IOT. Int J Comput Appl 121(9):6989

    Google Scholar 

  43. Thanigaivelan NK, Nigussie E, Kanth RK, Virtanen S, Isoaho J (2016) Distributed internal anomaly detection system for Internet-of-Things. In: 2016 13th IEEE annual consumer communications and networking conference (CCNC)

  44. Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI global

  45. Vacca JR (2012) Computer and information security handbook. Newnes

  46. Liu C, Yang J, Chen R, Zhang Y, Zeng J (2011) Research on immunity-based intrusion detection technology for the internet of things. In: 2011 seventh international conference on natural computation, IEEE, vol 1, pp 212–216

  47. Vajda V, Furdík K, Glova J, Sabol T (2011) The EBBITS Project: an interoperability platform for a real-world populated Internet of Things domain. In: Proceedings of the international conference Znalosti (Knowledge), Technical University of Ostrava, Czech Republic, pp 317–320

  48. Miretskiy Y, Das A, Wright CP, Zadok E (2004) Avfs: an on-access anti-virus file system. In: USENIX security symposium, pp 73–88

  49. Mitchell R, Chen IR (2014) A survey of intrusion detection techniques for cyber-physical systems. ACM Comput Surv 46(4):55

    Google Scholar 

  50. Gupta A, Pandey OJ, Shukla M, Dadhich A, Mathur S, Ingle A (2013) Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks. In: 2013 IEEE international conference on computational intelligence and computing research, IEEE, pp 1–7

  51. Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for Internet of Things devices. In: 2015 IEEE 34th international performance computing and communications conference (IPCCC), IEEE, pp 1–8

  52. Misra S, Krishna PV, Agarwal H, Saxena A, Obaidat MS (2011) A learning automata based solution for preventing distributed denial of service in internet of things. In: 2011 international conference on Internet of Things and 4th international conference on cyber, physical and social computing, IEEE, pp 114–122

  53. Krimmling J, Peter S (2014) Integration and evaluation of intrusion detection for CoAP in smart city applications. In: 2014 IEEE conference on communications and network security, IEEE, pp 73–78

  54. Uke S, Mahajan A, Thool R (2013) UML modeling of physical and data link layer security attacks in WSN. Int J Comput Appl 70(11):1099

    Google Scholar 

  55. Li H, Chen Y, He Z (2012) The survey of RFID attacks and defenses. In: 2012 8th international conference on wireless communications, networking and mobile computing, IEEE, pp 1–4

  56. Kandah F, Singh Y, Zhang W, Wang C (2013) Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks. Secur Commun Netw 6(4):539

    Google Scholar 

  57. Muhammad MF, Anjum W, Mazhar KS (2015) A critical analysis on the security concerns of Internet of Things (IoT). Int J Comput Appl 111(7):198

    Google Scholar 

  58. Shafiei H, Khonsari A, Derakhshi H, Mousavi P (2014) Detection and mitigation of sinkhole attacks in wireless sensor networks. J Comput Syst Sci 80(3):644

    MATH  Google Scholar 

  59. Leloglu E (2016) A review of security concerns in Internet of Things. J Comput Commun 5(01):121

    Google Scholar 

  60. Jain P, Sardana A (2012) Defending against internet worms using honeyfarm. In: Proceedings of the CUBE international information technology conference, ACM, pp 795–800

  61. Genkin D, Pachmanov L, Pipman I, Shamir A, Tromer E (2016) Physical key extraction attacks on PCs. Commun ACM 59(6):70

    MATH  Google Scholar 

  62. Jordan MI, Mitchell TM (2015) Machine learning: trends, perspectives, and prospects. Science 349(6245):255

    MathSciNet  MATH  Google Scholar 

  63. Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT press, New York

    MATH  Google Scholar 

  64. Hothorn T (2019) CRAN task view: machine learning and statistical learning

  65. Schmidhuber J (2015) Deep learning in neural networks: an overview. Neural Netw 61:85

    Google Scholar 

  66. Gunning D (2017) Explainable artificial intelligence (xai). In: Defense Advanced Research Projects Agency (DARPA), nd Web, vol 2

  67. Sutskever I, Jozefowicz R, Gregor K, Rezende D, Lillicrap T, Vinyals O (2015) Towards principled unsupervised learning, arXiv preprint arXiv:1511.06440

  68. Sutton RS, Barto AG (2018) Reinforcement learning: an introduction. MIT press, New York

    MATH  Google Scholar 

  69. Breiman L (2017) Classification and regression trees. Routledge, New York

    Google Scholar 

  70. Gupta B, Rawat A, Jain A, Arora A, Dhami N (2017) Analysis of various decision tree algorithms for classification in data mining. Int J Comput Appl 163(8):15

    Google Scholar 

  71. Song YY, Ying L (2015) Decision tree methods: applications for classification and prediction. Shanghai Archiv Psychiatry 27(2):130

    Google Scholar 

  72. Goeschel K (2016) Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis. In: SoutheastCon 2016, IEEE, pp 1–6

  73. Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690

    MathSciNet  Google Scholar 

  74. Alharbi S, Rodriguez P, Maharaja R, Iyer P, Subaschandrabose N, Ye Z (2017) Secure the internet of things with challenge response authentication in fog computing. In: 2017 IEEE 36th international performance computing and communications conference (IPCCC), IEEE, pp 1–2

  75. Bezawada B, Bachani M, Peterson J, Shirazi H, Ray I, Ray I (2018) Iotsense: Behavioral fingerprinting of iot devices, arXiv preprint arXiv:1804.03852

  76. Alghuried A (2017) A model for anomalies detection in internet of things (IoT) using inverse weight clustering and decision tree

  77. Suthaharan S (2016) Support vector machine. In: Machine learning models and algorithms for big data classification, Springer, pp 207–235

  78. Xiao H, Biggio B, Nelson B, Xiao H, Eckert C, Roli F (2015) Support vector machines under adversarial label contamination. Neurocomputing 160:53

    Google Scholar 

  79. Ratner B (2017) Statistical and machine-learning data mining: techniques for better predictive modeling and analysis of big data. Chapman and Hall/CRC, Oxford

    MATH  Google Scholar 

  80. Liu Y, Pi D (2017) KSII Trans Internet Inf Syst 11:8

    Google Scholar 

  81. Shams EA, Rizaner A (2018) A novel support vector machine based intrusion detection system for mobile ad hoc networks. Wireless Netw 24(5):1821

    Google Scholar 

  82. Thaseen IS, Kumar CA (2017) Intrusion detection model using fusion of chi-square feature selection and multi class SVM. J King Saud Univ Comput Inf Sci 29(4):462

    Google Scholar 

  83. Ham HS, Kim HH, Kim MS, Choi MJ (2014) Linear SVM-based android malware detection for reliable IoT services. J Appl Math 56:9999

    Google Scholar 

  84. Liu X, Du X, Zhang X, Zhu Q, Wang H, Guizani M (2019) Adversarial samples on android malware detection systems for IoT systems. Sensors 19(4):974

    Google Scholar 

  85. Ozay M, Esnaola I, Vural FTY, Kulkarni SR, Poor HV (2015) Machine learning methods for attack detection in the smart grid. IEEE Trans Neural Netw Learn Syst 27(8):1773

    MathSciNet  Google Scholar 

  86. Lerman L, Bontempi G, Markowitch O (2015) A machine learning approach against a masked AES. J Cryptogr Eng 5(2):123

    Google Scholar 

  87. Lerman L, Poussier R, Bontempi G, Markowitch O, Standaert FX (2015) Template attacks versus machine learning revisited (and the curse of dimensionality in side-channel analysis). In: International workshop on constructive side-channel analysis and secure design, Springer, pp 20–33

  88. Jadhav SD, Channe H (2016) Comparative study of K-NN, naive Bayes and decision tree classification techniques. Int J Sci Res 5(1):1842

    Google Scholar 

  89. Aziz ASA, Sanaa E, Hassanien AE (2017) Comparison of classification techniques applied for network intrusion detection and classification. J Appl Logic 24:109

    MathSciNet  Google Scholar 

  90. Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152

    Google Scholar 

  91. Ashraf N, Ahmad W, Ashraf R (2018) A comparative study of data mining algorithms for high detection rate in intrusion detection system. Ann Emerg Technol Comput 2(1):512

    Google Scholar 

  92. Mehmood A, Mukherjee M, Ahmed SH, Song H, Malik KM (2018) NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. J Supercomput 74(10):5156

    Google Scholar 

  93. Pajouh HH, Javidan R, Khayami R, Ali D, Choo KKR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. In: IEEE transactions on emerging topics in computing

  94. Khakurel N, Bhagat N (2019) Natural language processing technique for image spam detection. In: Advanced engineering and ICT–convergence 2019 (ICAEIC-2019), p 22

  95. Li L, Zhang H, Peng H, Yang Y (2018) Nearest neighbors based density peaks approach to intrusion detection. Chaos Solitons Fractals 110:33

    MathSciNet  Google Scholar 

  96. Serpen G, Aghaei E (2018) Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms. Intell Data Anal 22(5):1101

    Google Scholar 

  97. Saleh AI, Talaat FM, Labib LM (2019) A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers. Artif Intell Rev 51(3):403

    Google Scholar 

  98. Syarif AR, Gata W (2017) Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. In: 2017 11th international conference on information and communication technology and system (ICTS), IEEE, pp 181–186

  99. Kumar GR, Mangathayaru N, Narsimha G (2017) A feature clustering based dimensionality reduction for intrusion detection. IADIS Int J Comput Sci Inf Syst 12(1):65

    Google Scholar 

  100. Gunupudi RK, Nimmala M, Gugulothu N, Gali SR (2017) CLAPP: a self constructing feature clustering approach for anomaly detection. Future Gener Comput Syst 74:417

    Google Scholar 

  101. Shi Y, Li F, Song W, Li XY, Ye J (2019) Energy audition based cyber-physical attack detection system in IoT

  102. Selvi E, Shashidara M (2016) Enhanced packet dropping algorithm and neighbour node cluster strategy for intrusion detection in MANET. Int J Comput 5(3):150

    Google Scholar 

  103. Resende PAA, Drummond AC (2018) A survey of random forest based methods for intrusion detection systems. ACM Comput Surv 51(3):48

    Google Scholar 

  104. Biau G, Scornet E (2016) A random forest guided tour. Test 25(2):197

    MathSciNet  MATH  Google Scholar 

  105. Buczak AL, Guven E (2015) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153

    Google Scholar 

  106. Hasan MAM, Nasser M, Ahmad S, Molla KI (2016) Feature selection for intrusion detection using random forest. J Inf Secur 7(03):129

    Google Scholar 

  107. Farnaaz N, Jabbar M (2016) Random forest modeling for network intrusion detection system. Procedia Comput Sci 89:213

    Google Scholar 

  108. Ahmad I, Basheri M, Iqbal MJ, Rahim A (2018) Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6:33789

    Google Scholar 

  109. Doshi R, Apthorpe N, Feamster N (2018) Machine learning ddos detection for consumer internet of things devices. In: 2018 IEEE security and privacy workshops (SPW), IEEE, pp 29–35

  110. Meidan Y, Bohadana M, Shabtai A, Ochoa M, Tippenhauer NO, Guarnizo JD, Elovici Y (2017) Detection of unauthorized iot devices using machine learning techniques, arXiv preprint arXiv:1709.04647

  111. Chang Y, Li W, Yang Z (2017) Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), IEEE, vol 1, pp 635–638

  112. Feng F, Cho J, Pedrycz W, Fujita H, Herawan T (2016) Soft set based association rule mining. Knowl-Based Syst 111:268

    Google Scholar 

  113. Hussain J, Kalita P (2015) Understanding network intrusion detection system using OLAP on NSL-KDD dataset. IUP J Comput Sci 9(3):105

    Google Scholar 

  114. Elhag S, Fernández A, Bawakid A, Alshomrani S, Herrera F (2015) On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst Appl 42(1):193

    Google Scholar 

  115. Tajbakhsh A, Rahmati M, Mirzaei A (2009) Intrusion detection using fuzzy association rules. Appl Soft Comput 9(2):462

    Google Scholar 

  116. Fürnkranz J, Kliegr T (2015) A brief overview of rule learning. In: International symposium on rules and rule markup languages for the semantic web, Springer, pp 54–69

  117. Zhou ZH (2015) Ensemble learning. In: Encyclopedia of biometrics, pp 411–416

  118. Gomes HM, Barddal JP, Enembreck F, Bifet A (2017) A survey on ensemble learning for data stream classification. ACM Comput Surv 50(2):23

    Google Scholar 

  119. Ren Y, Zhang L, Suganthan PN (2016) Ensemble classification and regression-recent developments, applications and future directions. IEEE Comput Intell Mag 11(1):41

    Google Scholar 

  120. Witten IH, Frank E, Hall MA, Pal CJ (2016) Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann

  121. Gaikwad D, Thool RC (2015) Intrusion detection system using bagging ensemble method of machine learning. In: 2015 international conference on computing communication control and automation, IEEE, pp 291–295

  122. Aburomman AA, Reaz MBI (2016) A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl Soft Comput 38:360

    Google Scholar 

  123. Reddy RR, Ramadevi Y, Sunitha K (2017) Enhanced anomaly detection using ensemble support vector machine. In: 2017 international conference on big data analytics and computational intelligence (ICBDAC), IEEE, pp 107–111

  124. Yerima SY, Sezer S, Muttik I (2015) High accuracy android malware detection using ensemble learning. IET Inf Secur 9(6):313

    Google Scholar 

  125. Bosman HH, Iacca G, Tejada A, Wörtche HJ, Liotta A (2015) Ensembles of incremental learners to detect anomalies in ad hoc sensor networks. Ad Hoc Netw 35:14

    Google Scholar 

  126. Awasthi P, Charikar M, Krishnaswamy R, Sinop AK (2015) The hardness of approximation of euclidean k-means, arXiv preprint arXiv:1502.03316

  127. Arora P, Varshney S et al (2016) Analysis of k-means and k-medoids algorithm for big data. Procedia Comput Sci 78:507

    Google Scholar 

  128. Muniyandi AP, Rajeswari R, Rajaram R (2012) Network anomaly detection by cascading k-Means clustering and C4.5 decision tree algorithm. Procedia Eng. 30:174

    Google Scholar 

  129. Li Q, Zhang K, Cheffena M, Shen X (2017) Channel-based sybil detection in industrial wireless sensor networks: a multi-kernel approach. In: GLOBECOM 2017-2017 IEEE global communications conference, IEEE, pp 1–6

  130. Wang HB, Yuan Z, Wang CD (2009) Intrusion detection for wireless sensor networks based on multi-agent and refined clustering. In: 2009 WRI international conference on communications and mobile computing, IEEE, vol 3, pp 450–454

  131. Xie M, Huang M, Bai Y, Hu Z (2017) The anonymization protection algorithm based on fuzzy clustering for the ego of data in the internet of things. J Electr Comput Eng 10:83

    MathSciNet  Google Scholar 

  132. Li H, Ota K, Dong M (2018) Learning IoT in edge: Deep learning for the Internet of Things with edge computing. IEEE Netw 32(1):96

    Google Scholar 

  133. Fadlullah ZM, Tang F, Mao B, Kato N, Akashi O, Inoue T, Mizutani K (2017) State-of-the-art deep learning: evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Commun Surv Tutor 19(4):2432

    Google Scholar 

  134. Sze V, Chen YH, Yang TJ, Emer JS (2017) Efficient processing of deep neural networks: a tutorial and survey. Proc IEEE 105(12):2295

    Google Scholar 

  135. Scherer D, Müller A, Behnke S (2010) Evaluation of pooling operations in convolutional architectures for object recognition. In: International conference on artificial neural networks, Springer, pp 92–101

  136. Ramachandran P, Zoph B, Le QV (2017) Searching for activation functions, arXiv preprint arXiv:1710.05941

  137. De Coninck E, Verbelen T, Vankeirsbilck B, Bohez S, Simoens P, Demeester P, Dhoedt B (2015) Distributed neural networks for Internet of Things: the Big-Little approach. In: International Internet of Things Summit, Springer, pp 484–492

  138. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097–1105

  139. Deng J, Dong W, Socher R, Li LJ, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, IEEE, pp 248–255

  140. Zhang L, Zhang L, Du B (2016) Deep learning for remote sensing data: a technical tutorial on the state of the art. IEEE Geosci Remote Sens Mag 4(2):22

    Google Scholar 

  141. McLaughlin N, Martinez del Rincon J, Kang B, Yerima S, Miller P, Sezer S, Safaei Y, Trickel E, Zhao Z, Doupé A, et al. (2017) Deep android malware detection. In: Proceedings of the seventh ACM on conference on data and application security and privacy, ACM, pp 301–308

  142. Maghrebi H, Portigliatti T, Prouff E (2016) Breaking cryptographic implementations using deep learning techniques. In: International conference on security, privacy, and applied cryptography engineering, Springer, pp 3–26

  143. Zhang Y, Yi C (2011) Zhang neural networks and neural-dynamic method. Nova Science Publishers, Inc.,

  144. Voigtlaender P, Doetsch P, Ney H (2016) Handwriting recognition with large multidimensional long short-term memory recurrent neural networks. In: 2016 15th international conference on frontiers in handwriting recognition (ICFHR), IEEE, pp 228–233

  145. Tolosana R, Vera-Rodriguez R, Fierrez J, Ortega-Garcia J (2018) Exploring recurrent neural networks for on-line handwritten signature biometrics. IEEE Access 6:5128

    Google Scholar 

  146. Lai S, Xu L, Liu K, Zhao J (2015) Recurrent convolutional neural networks for text classification. In: Twenty-ninth AAAI conference on artificial intelligence

  147. Liu P, Qiu X, Huang X (2016) Recurrent neural network for text classification with multi-task learning, arXiv preprint arXiv:1605.05101

  148. O’Shea TJ, Clancy TC, McGwier RW (2016) Recurrent neural radio anomaly detection, arXiv preprint arXiv:1611.00301

  149. Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2017) Network traffic classifier with convolutional and recurrent neural networks for Internet of Things. IEEE Access 5:18042

    Google Scholar 

  150. Al-Jumeily D, Hussain A, Fergus P (2015) Using adaptive neural networks to provide self-healing autonomic software. Int J Space-Based Situated Comput 5(3):129

    Google Scholar 

  151. Nweke HF, Teh YW, Al-Garadi MA, Alo UR (2018) Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: state of the art and research challenges. Expert Syst Appl 105:233

    Google Scholar 

  152. Pascanu R, Mikolov T, Bengio Y (2013) On the difficulty of training recurrent neural networks. In: International conference on machine learning, pp 1310–1318

  153. HaddadPajouh H, Dehghantanha A, Khayami R, Choo KKR (2018) A deep recurrent neural network based approach for Internet of Things malware threat hunting. Fut Gener Comput Syst 85:88

    Google Scholar 

  154. Brun O, Yin Y, Gelenbe E (2018) Deep learning with dense random neural network for detecting attacks against iot-connected home environments. Procedia Comput Sci 134:458

    Google Scholar 

  155. Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Fut Gener Comput Syst 82:761

    Google Scholar 

  156. Torres P, Catania C, Garcia S, Garino CG (2016) An analysis of recurrent neural networks for botnet detection behavior. In: 2016 IEEE biennial congress of Argentina (ARGENCON), IEEE, pp 1–6

  157. Atiga J, Mbarki NE, Ejbali R, Zaied M (2018) Faulty node detection in wireless sensor networks using a recurrent neural network. In: Tenth international conference on machine vision (ICMV 2017), vol 10696, p 106962

  158. Chen J, Xie B, Zhang H, Zhai J (2019) Deep autoencoders in pattern recognition: a survey. In: Bio-inspired computing models and algorithms, p 229

  159. Mohammadi M, Al-Fuqaha A, Sorour S, Guizani M (2018) Deep learning for IoT big data and streaming analytics: a survey. IEEE Commun Surv Tutor 20(4):2923

    Google Scholar 

  160. Du B, Xiong W, Wu J, Zhang L, Zhang L, Tao D (2016) Stacked convolutional denoising auto-encoders for feature representation. IEEE Trans Cybern 47(4):1017

    Google Scholar 

  161. Alhajri R, Zagrouba R, Al-Haidari F (2019) Survey for anomaly detection of IoT botnets using machine learning auto-encoders. Int J Appl Eng Res 14(10):2417

    Google Scholar 

  162. Yousefi-Azar M, Varadharajan V, Hamey L, Tupakula U (2017) Autoencoder-based feature learning for cyber security applications, In: 2017 International joint conference on neural networks (IJCNN), IEEE, pp 3854–3861

  163. Li Y, Ma R, Jiao R (2015) A hybrid malicious code detection method based on deep learning. Int J Secur Appl 9(5):205

    Google Scholar 

  164. Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-BaIoT-Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12

    Google Scholar 

  165. Rezvy S, Luo Y, Petridis M, Lasebae A, Zebin T (2019) An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. In: 2019 53rd annual conference on information sciences and systems (CISS), IEEE, pp 1–6

  166. Hinton GE (2012) A practical guide to training restricted Boltzmann machines. In: Neural networks: Tricks of the trade, Springer, pp 599–619

  167. Fiore U, Palmieri F, Castiglione A, De Santis A (2013) Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122:13

    Google Scholar 

  168. Hinton GE (2009) Deep belief networks. Scholarpedia 4(5):5947

    Google Scholar 

  169. Zhang Q, Yang LT, Chen Z, Li P (2018) A survey on deep learning for big data. Inf Fusion 42:146

    Google Scholar 

  170. Chen Y, Zhang Y, Maharjan S (2017) Deep learning for secure mobile edge computing, arXiv preprint arXiv:1709.08025

  171. Zhang Y, Li P, Wang X (2019) Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7:31711

    Google Scholar 

  172. Huda S, Yearwood J, Hassan MM, Almogren A (2018) Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks. Appl Soft Comput 71:66

    Google Scholar 

  173. Tama BA, Rhee KH (2017) Attack classification analysis of IoT network via deep learning approach. In: Research briefs on information and communication technology evolution (ReBICTE), vol 3, p 1

  174. Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in IoT networks. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC), IEEE, pp 0452–0457

  175. Jahanian A, Chai L, Isola P (2019) On the”steerability” of generative adversarial networks, arXiv preprint arXiv:1907.07171

  176. Hiromoto RE, Haney M, Vakanski A (2017) A secure architecture for IoT with supply chain risk management. In: 2017 9th IEEE international conference on intelligent data acquisition and advanced computing systems: technology and applications (IDAACS), IEEE, vol 1, pp 431–435

  177. Ferdowsi A, Saad W (2019) Generative adversarial networks for distributed intrusion detection in the Internet of Things, arXiv preprint arXiv:1906.00567

  178. Cui Q, Zhou Z, Fu Z, Meng R, Sun X, Wu QJ (2019) Image steganography based on foreground object generation by generative adversarial networks in mobile edge computing with Internet of Things. IEEE Access

  179. Liran M, Yan H, Chunqiang H, Wei L (2019) Security and privacy for smart cyber-physical systems

  180. Salimans T, Goodfellow I, Zaremba W, Cheung V, Radford A, Chen X (2016) Improved techniques for training gans. In: Advances in neural information processing systems, pp 2234–2242

  181. Lakshminarayanan B, Pritzel A, Blundell C (2017) Simple and scalable predictive uncertainty estimation using deep ensembles. In: Advances in neural information processing systems, pp 6402–6413

  182. Lee I, Kim D, Kang S, Lee S (2017) Ensemble deep learning for skeleton-based action recognition using temporal sliding lstm networks. In: Proceedings of the IEEE international conference on computer vision, pp 1012–1020

  183. Codella NC, Nguyen QB, Pankanti S, Gutman D, Helba B, Halpern A, Smith JR (2017) Deep learning ensembles for melanoma recognition in dermoscopy images. IBM J Res Dev 61(4/5):5

    Google Scholar 

  184. Shakeel PM, Baskar S, Dhulipala VS, Mishra S, Jaber MM (2018) Maintaining security and privacy in health care system using learning based deep-Q-networks. J Med Syst 42(10):186

    Google Scholar 

  185. Thakkar A, Lohiya R (2020) A review of the advancement in intrusion detection datasets. Proced Computer Sci 167:636–645

    Google Scholar 

  186. Taivalsaari A, Mikkonen T (2017) A roadmap to the programmable world: software challenges in the IoT era. IEEE Softw 34(1):72

    Google Scholar 

  187. Brugger ST, Chow J (2007) An assessment of the DARPA IDS Evaluation Dataset using Snort, UCDAVIS Department of Computer Science, 1, 22

  188. McHugh J (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans Inf Syst Secur 3(4):262

    Google Scholar 

  189. Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp 108–116

  190. Ashraf QM, Habaebi MH (2015) Autonomic schemes for threat mitigation in Internet of Things. J Netw Comput Appl 49:112

    Google Scholar 

  191. Sanchez L, Galache JA, Gutierrez V, Hernandez JM, Bernat J, Gluhak A, Garcia T (2011) Smartsantander: the meeting point between future internet research and experimentation and the smart cities. In: 2011 future network and mobile summit, IEEE, pp 1–8

  192. Sanchez L, Muñoz L, Galache JA, Sotres P, Santana JR, Gutierrez V, Ramdhany R, Gluhak A, Krco S, Theodoridis E et al (2014) SmartSantander: IoT experimentation over a smart city testbed. Comput Netw 61:217

    Google Scholar 

  193. Lavrova D, Pechenkin A (2015) Applying correlation and regression analysis to detect security incidents in the internet of things. Int J Commun Netw Inf Secur 7(3):131

    Google Scholar 

  194. Arshad J, Abdellatif MM, Khan MM, Azad MA (2018) A novel framework for collaborative intrusion detection for M2M networks. In: 2018 9th international conference on information and communication systems (ICICS), IEEE, pp 12–17

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ritika Lohiya.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thakkar, A., Lohiya, R. A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges. Arch Computat Methods Eng 28, 3211–3243 (2021). https://doi.org/10.1007/s11831-020-09496-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11831-020-09496-0

Navigation