Skip to main content

2023 | OriginalPaper | Buchkapitel

Machine Learning-Based Intrusion Detection Approaches for Secured Internet of Things

verfasst von : Taher M. Ghazal, Mohammad Kamrul Hasan, Siti Norul Huda Sheikh Abdullah, Khairul Azmi Abu Bakar, Nidal A. Al-Dmour, Raed A. Said, Tamer Mohamed Abdellatif, Abdallah Moubayed, Haitham M. Alzoubi, Muhammad Alshurideh, Waleed Alomoush

Erschienen in: The Effect of Information Technology on Business and Marketing Intelligence Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, protecting communication and information for Internet of Things (IOT) has emerged as a critical challenge. Existing systems use firewalls to ensure that they are safe from any unexpected occurrences that may disrupt the desired systems and applications. Intrusion detection systems (IDSs) are an acceptable second line of defence for IOT applications. IDS play a crucial role ensuring that it enhances the IOT security level maintaining sophisticated framework. Attackers have continuously been attempting to determine novel ways to circumnavigate security frameworks that prevent the structures. This paper reviews the security advances, threats and countermeasures for the IOT applications. A state of art review has accomplished using the references from 2009 to 2020 to encompass the real demography of the IOT security research data. This work also highlights the deep learning-based intrusion detection approaches for Internet of Things (IOT) security. With the systematic literature review approach, the review suggests that implementing existing security measures, such as encryption, authentication, access control, network and application security for IoT systems and their intrinsic amenability is ineffective for the IOT systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Afifi, M. A. M., Kalra, D., Ghazal, T. M., & Mago, B. (2020). Information technology ethics and professional responsibilities. International Journal of Advanced Science and Technology, 29(4), 11336–11343. Afifi, M. A. M., Kalra, D., Ghazal, T. M., & Mago, B. (2020). Information technology ethics and professional responsibilities. International Journal of Advanced Science and Technology, 29(4), 11336–11343.
Zurück zum Zitat Ahmad, A., Alshurideh, M. T., Al Kurdi, B. H., & Alzoubi, H. M. (2021). Digital strategies: A systematic literature review. The International Conference on Artificial Intelligence and Computer Vision, 807–822. Ahmad, A., Alshurideh, M. T., Al Kurdi, B. H., & Alzoubi, H. M. (2021). Digital strategies: A systematic literature review. The International Conference on Artificial Intelligence and Computer Vision, 807–822.
Zurück zum Zitat Akhtar, A., Akhtar, S., Bakhtawar, B., Kashif, A. A., Aziz, N., & Javeid, M. S. (2021). COVID-19 detection from CBC using machine learning techniques. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 65–78. https://doi.org/10.54489/ijtim.v1i2.22 Akhtar, A., Akhtar, S., Bakhtawar, B., Kashif, A. A., Aziz, N., & Javeid, M. S. (2021). COVID-19 detection from CBC using machine learning techniques. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 65–78. https://​doi.​org/​10.​54489/​ijtim.​v1i2.​22
Zurück zum Zitat Akour, I., Alshurideh, M., Al Kurdi, B., Al Ali, A., & Salloum, S. (2021). Using machine learning algorithms to predict people’s intention to use mobile learning platforms during the COVID-19 pandemic: Machine learning approach. JMIR Medical Education, 7(1), 1–17. https://doi.org/10.2196/24032CrossRef Akour, I., Alshurideh, M., Al Kurdi, B., Al Ali, A., & Salloum, S. (2021). Using machine learning algorithms to predict people’s intention to use mobile learning platforms during the COVID-19 pandemic: Machine learning approach. JMIR Medical Education, 7(1), 1–17. https://​doi.​org/​10.​2196/​24032CrossRef
Zurück zum Zitat Al Batayneh, R. M., Taleb, N., Said, R. A., Alshurideh, M. T., Ghazal, T. M., & Alzoubi, H. M. (2021). IT governance framework and smart services integration for future development of Dubai infrastructure utilizing AI and big data, its reflection on the citizens standard of living. The International Conference on Artificial Intelligence and Computer Vision, 235–247. Al Batayneh, R. M., Taleb, N., Said, R. A., Alshurideh, M. T., Ghazal, T. M., & Alzoubi, H. M. (2021). IT governance framework and smart services integration for future development of Dubai infrastructure utilizing AI and big data, its reflection on the citizens standard of living. The International Conference on Artificial Intelligence and Computer Vision, 235–247.
Zurück zum Zitat Al Kurdi, B., Alshurideh, M., Nuseir, M., Aburayya, A., & Salloum, S. A. (2021). The effects of subjective norm on the intention to use social media networks: An exploratory study using PLS-SEM and machine learning approach. Advanced Machine Learning Technologies and Applications: Proceedings of AMLTA, 2021, 581–592.CrossRef Al Kurdi, B., Alshurideh, M., Nuseir, M., Aburayya, A., & Salloum, S. A. (2021). The effects of subjective norm on the intention to use social media networks: An exploratory study using PLS-SEM and machine learning approach. Advanced Machine Learning Technologies and Applications: Proceedings of AMLTA, 2021, 581–592.CrossRef
Zurück zum Zitat AlHamad, A., Alshurideh, M., Alomari, K., Kurdi, B., Alzoubi, H., Hamouche, S., & Al-Hawary, S. (2022). The effect of electronic human resources management on organizational health of telecommunications companies in Jordan. International Journal of Data and Network Science, 6(2), 429–438.CrossRef AlHamad, A., Alshurideh, M., Alomari, K., Kurdi, B., Alzoubi, H., Hamouche, S., & Al-Hawary, S. (2022). The effect of electronic human resources management on organizational health of telecommunications companies in Jordan. International Journal of Data and Network Science, 6(2), 429–438.CrossRef
Zurück zum Zitat Alhamad, A. Q. M., Akour, I., Alshurideh, M., Al-Hamad, A. Q., Kurdi, B. A., & Alzoubi, H. (2021). Predicting the intention to use google glass: A comparative approach using machine learning models and PLS-SEM. International Journal of Data and Network Science, 5(3). https://doi.org/10.5267/j.ijdns.2021.6.002 Alhamad, A. Q. M., Akour, I., Alshurideh, M., Al-Hamad, A. Q., Kurdi, B. A., & Alzoubi, H. (2021). Predicting the intention to use google glass: A comparative approach using machine learning models and PLS-SEM. International Journal of Data and Network Science, 5(3). https://​doi.​org/​10.​5267/​j.​ijdns.​2021.​6.​002
Zurück zum Zitat Ali, N., Ahmed, A., Anum, L., Ghazal, T. M., Abbas, S., Khan, M. A., Alzoubi, H. M., & Ahmad, M. (2021). Modelling supply chain information collaboration empowered with machine learning technique. Intelligent Automation and Soft Computing, 30(1), 243–257. https://doi.org/10.32604/iasc.2021.018983 Ali, N., Ahmed, A., Anum, L., Ghazal, T. M., Abbas, S., Khan, M. A., Alzoubi, H. M., & Ahmad, M. (2021). Modelling supply chain information collaboration empowered with machine learning technique. Intelligent Automation and Soft Computing, 30(1), 243–257. https://​doi.​org/​10.​32604/​iasc.​2021.​018983
Zurück zum Zitat Ali, N., Ghazal, M. T., Ahmed, A., Abbas, S., A. Khan, M., Alzoubi, H., Farooq, U., Ahmad, M., & Adnan Khan, M. (2022). Fusion-based supply chain collaboration using machine learning techniques. Intelligent Automation & Soft Computing, 31(3), 1671–1687. https://doi.org/10.32604/iasc.2022.019892 Ali, N., Ghazal, M. T., Ahmed, A., Abbas, S., A. Khan, M., Alzoubi, H., Farooq, U., Ahmad, M., & Adnan Khan, M. (2022). Fusion-based supply chain collaboration using machine learning techniques. Intelligent Automation & Soft Computing, 31(3), 1671–1687. https://​doi.​org/​10.​32604/​iasc.​2022.​019892
Zurück zum Zitat Alsharari, N. (2021). Integrating blockchain technology with internet of things to efficiency. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 1–13. Alsharari, N. (2021). Integrating blockchain technology with internet of things to efficiency. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 1–13.
Zurück zum Zitat Alshurideh, M. (2022). Does electronic customer relationship management (E-CRM) affect service quality at private hospitals in Jordan? Uncertain Supply Chain Management, 10(2), 1–8.CrossRef Alshurideh, M. (2022). Does electronic customer relationship management (E-CRM) affect service quality at private hospitals in Jordan? Uncertain Supply Chain Management, 10(2), 1–8.CrossRef
Zurück zum Zitat Alshurideh, M., Al Kurdi, B., Alzoubi, H., Ghazal, T., Said, R., AlHamad, A., Hamadneh, S., Sahawneh, N., & Al-kassem, A. (2022b). Fuzzy assisted human resource management for supply chain management issues. Annals of Operations Research, 1–19. Alshurideh, M., Al Kurdi, B., Alzoubi, H., Ghazal, T., Said, R., AlHamad, A., Hamadneh, S., Sahawneh, N., & Al-kassem, A. (2022b). Fuzzy assisted human resource management for supply chain management issues. Annals of Operations Research, 1–19.
Zurück zum Zitat Alshurideh, M., Al Kurdi, B., Salloum, S. A., Arpaci, I., & Al-Emran, M. (2020b). Predicting the actual use of m-learning systems: A comparative approach using PLS-SEM and machine learning algorithms. Interactive Learning Environments, 1–15. Alshurideh, M., Al Kurdi, B., Salloum, S. A., Arpaci, I., & Al-Emran, M. (2020b). Predicting the actual use of m-learning systems: A comparative approach using PLS-SEM and machine learning algorithms. Interactive Learning Environments, 1–15.
Zurück zum Zitat Alshurideh, M., Salloum, S. A., Al Kurdi, B., & Al-Emran, M. (2019). Factors affecting the social networks acceptance: An empirical study using PLS-SEM approach. In PervasiveHealth: Pervasive Computing Technologies for Healthcare, Part F1479. https://doi.org/10.1145/3316615.3316720 Alshurideh, M., Salloum, S. A., Al Kurdi, B., & Al-Emran, M. (2019). Factors affecting the social networks acceptance: An empirical study using PLS-SEM approach. In PervasiveHealth: Pervasive Computing Technologies for Healthcare, Part F1479. https://​doi.​org/​10.​1145/​3316615.​3316720
Zurück zum Zitat Alshurideh, M. T., Al Kurdi, B., Alzoubi, H. M., Ghazal, T. M., Said, R. A., AlHamad, A. Q., Hamadneh, S., Sahawneh, N., & Al-kassem, A. H. (2022a). Fuzzy assisted human resource management for supply chain management issues. Annals of Operations Research, 1–19. Alshurideh, M. T., Al Kurdi, B., Alzoubi, H. M., Ghazal, T. M., Said, R. A., AlHamad, A. Q., Hamadneh, S., Sahawneh, N., & Al-kassem, A. H. (2022a). Fuzzy assisted human resource management for supply chain management issues. Annals of Operations Research, 1–19.
Zurück zum Zitat Alshurideh, M. T., Hassanien, A. E., & Masa’deh, R. (2021). The effect of coronavirus disease (COVID-19) on business intelligence. Springer. Alshurideh, M. T., Hassanien, A. E., & Masa’deh, R. (2021). The effect of coronavirus disease (COVID-19) on business intelligence. Springer.
Zurück zum Zitat Alzoubi, H. M., Alshurideh, M., & Ghazal, T. M. (2021a). Integrating BLE beacon technology with intelligent information systems IIS for operations’ performance: A managerial perspective. The International Conference on Artificial Intelligence and Computer Vision, 527–538. Alzoubi, H. M., Alshurideh, M., & Ghazal, T. M. (2021a). Integrating BLE beacon technology with intelligent information systems IIS for operations’ performance: A managerial perspective. The International Conference on Artificial Intelligence and Computer Vision, 527–538.
Zurück zum Zitat Alzoubi, H., Ahmed, G., Al-Gasaymeh, A., & Kurdi, B. (2020a). Empirical study on sustainable supply chain strategies and its impact on competitive priorities: The mediating role of supply chain collaboration. Management Science Letters, 10(3), 703–708.CrossRef Alzoubi, H., Ahmed, G., Al-Gasaymeh, A., & Kurdi, B. (2020a). Empirical study on sustainable supply chain strategies and its impact on competitive priorities: The mediating role of supply chain collaboration. Management Science Letters, 10(3), 703–708.CrossRef
Zurück zum Zitat Alzoubi, H., Alshurideh, M., Kurdi, B., Akour, I., & Aziz, R. (2022). Does BLE technology contribute towards improving marketing strategies, customers’ satisfaction and loyalty? The role of open innovation. International Journal of Data and Network Science, 6(2), 449–460.CrossRef Alzoubi, H., Alshurideh, M., Kurdi, B., Akour, I., & Aziz, R. (2022). Does BLE technology contribute towards improving marketing strategies, customers’ satisfaction and loyalty? The role of open innovation. International Journal of Data and Network Science, 6(2), 449–460.CrossRef
Zurück zum Zitat Alzoubi, H., Alshurideh, M., Kurdi, B. A., & Inairat, M. (2020b). Do perceived service value, quality, price fairness and service recovery shape customer satisfaction and delight? A practical study in the service telecommunication context. Uncertain Supply Chain Management, 8(3), 579–588. https://doi.org/10.5267/j.uscm.2020.2.005CrossRef Alzoubi, H., Alshurideh, M., Kurdi, B. A., & Inairat, M. (2020b). Do perceived service value, quality, price fairness and service recovery shape customer satisfaction and delight? A practical study in the service telecommunication context. Uncertain Supply Chain Management, 8(3), 579–588. https://​doi.​org/​10.​5267/​j.​uscm.​2020.​2.​005CrossRef
Zurück zum Zitat Aminanto, M. E. et al. (2018). Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Transactions on Information Forensics and Security, 13(3), 621–636. Aminanto, M. E. et al. (2018). Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Transactions on Information Forensics and Security, 13(3), 621–636.
Zurück zum Zitat Aziz, N., & Aftab, S. (2021). Data mining framework for nutrition ranking: Methodology: SPSS modeller. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 85–95. Aziz, N., & Aftab, S. (2021). Data mining framework for nutrition ranking: Methodology: SPSS modeller. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 85–95.
Zurück zum Zitat Cruz, A. (2021). Convergence between blockchain and the internet of things. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 35–56. Cruz, A. (2021). Convergence between blockchain and the internet of things. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 35–56.
Zurück zum Zitat Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82:761–768. Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82:761–768.
Zurück zum Zitat Eli, T. (2021). Students perspectives on the use of innovative and interactive teaching methods at the University of Nouakchott Al Aasriya, Mauritania: English Department as a case study. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 90–104. Eli, T. (2021). Students perspectives on the use of innovative and interactive teaching methods at the University of Nouakchott Al Aasriya, Mauritania: English Department as a case study. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 90–104.
Zurück zum Zitat Fiore, U. et al. (2019). Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Information Sciences, 479, 448–455. Fiore, U. et al. (2019). Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Information Sciences, 479, 448–455.
Zurück zum Zitat Ghazal, T., Alshurideh, M., & Alzoubi, H. (2021a). Blockchain-enabled internet of things (IoT) platforms for pharmaceutical and biomedical research. The International Conference on Artificial Intelligence and Computer Vision, 589–600. Ghazal, T., Alshurideh, M., & Alzoubi, H. (2021a). Blockchain-enabled internet of things (IoT) platforms for pharmaceutical and biomedical research. The International Conference on Artificial Intelligence and Computer Vision, 589–600.
Zurück zum Zitat Ghazal, T., Soomro, T. R., & Shaalan, K. (2013). Integration of project management maturity (PMM) based on capability maturity model integration (CMMI). European Journal of Scientific Research, 99(3), 418–428. Ghazal, T., Soomro, T. R., & Shaalan, K. (2013). Integration of project management maturity (PMM) based on capability maturity model integration (CMMI). European Journal of Scientific Research, 99(3), 418–428.
Zurück zum Zitat Ghazal, T. M. (2021). Positioning of UAV base stations using 5G and beyond networks for IoMT applications. Arabian Journal for Science and Engineering, 1–12. Ghazal, T. M. (2021). Positioning of UAV base stations using 5G and beyond networks for IoMT applications. Arabian Journal for Science and Engineering, 1–12.
Zurück zum Zitat Ghazal, T. M., Anam, M., Hasan, M. K., Hussain, M., Farooq, M. S., Ali, H. M., Ahmad, M., & Soomro, T. R. (2021b). Hep-Pred: Hepatitis C staging prediction using fine Gaussian SVM. Comput Mater Continua, 69, 191–203.CrossRef Ghazal, T. M., Anam, M., Hasan, M. K., Hussain, M., Farooq, M. S., Ali, H. M., Ahmad, M., & Soomro, T. R. (2021b). Hep-Pred: Hepatitis C staging prediction using fine Gaussian SVM. Comput Mater Continua, 69, 191–203.CrossRef
Zurück zum Zitat Ghazal, T. M., Hasan, M. K., Alshurideh, M. T., Alzoubi, H. M., Ahmad, M., Akbar, S. S., Al Kurdi, B., & Akour, I. A. (2021c). IoT for smart cities: Machine learning approaches in smart healthcare—A review. Future Internet, 13(8), 218. https://doi.org/10.3390/fi13080218CrossRef Ghazal, T. M., Hasan, M. K., Alshurideh, M. T., Alzoubi, H. M., Ahmad, M., Akbar, S. S., Al Kurdi, B., & Akour, I. A. (2021c). IoT for smart cities: Machine learning approaches in smart healthcare—A review. Future Internet, 13(8), 218. https://​doi.​org/​10.​3390/​fi13080218CrossRef
Zurück zum Zitat Ghazal, T. M., Hussain, M. Z., Said, R. A., Nadeem, A., Hasan, M. K., Ahmad, M., Khan, M. A., & Naseem, M. T. (2021d). Performances of K-means clustering algorithm with different distance metrics. Ghazal, T. M., Hussain, M. Z., Said, R. A., Nadeem, A., Hasan, M. K., Ahmad, M., Khan, M. A., & Naseem, M. T. (2021d). Performances of K-means clustering algorithm with different distance metrics.
Zurück zum Zitat Ghazal, T. M., Said, R. A., & Taleb, N. (2021e). Internet of vehicles and autonomous systems with AI for medical things. Soft Computing, 1–13. Ghazal, T. M., Said, R. A., & Taleb, N. (2021e). Internet of vehicles and autonomous systems with AI for medical things. Soft Computing, 1–13.
Zurück zum Zitat Hamadneh, S., Pedersen, O., & Al Kurdi, B. (2021). An investigation of the role of supply chain visibility into the Scottish bood supply chain. Journal of Legal, Ethical and Regulatory Issues, 24(Special Issue 1), 1–12. Hamadneh, S., Pedersen, O., & Al Kurdi, B. (2021). An investigation of the role of supply chain visibility into the Scottish bood supply chain. Journal of Legal, Ethical and Regulatory Issues, 24(Special Issue 1), 1–12.
Zurück zum Zitat Hanaysha, J. R., Al Shaikh, M. E., & Alzoubi, H. M. (2021b). Importance of marketing mix elements in determining consumer purchase decision in the retail market. International Journal of Service Science, Management, Engineering, and Technology (IJSSMET), 12(6), 56–72. Hanaysha, J. R., Al Shaikh, M. E., & Alzoubi, H. M. (2021b). Importance of marketing mix elements in determining consumer purchase decision in the retail market. International Journal of Service Science, Management, Engineering, and Technology (IJSSMET), 12(6), 56–72.
Zurück zum Zitat Hasan, O., McColl, J., Pfefferkorn, T., Hamadneh, S., Alshurideh, M., & Kurdi, B. (2022). Consumer attitudes towards the use of autonomous vehicles: Evidence from United Kingdom taxi services. International Journal of Data and Network Science, 6(2), 537–550.CrossRef Hasan, O., McColl, J., Pfefferkorn, T., Hamadneh, S., Alshurideh, M., & Kurdi, B. (2022). Consumer attitudes towards the use of autonomous vehicles: Evidence from United Kingdom taxi services. International Journal of Data and Network Science, 6(2), 537–550.CrossRef
Zurück zum Zitat Hou, S. et al. (2016). Deep4maldroid: a deep learning framework for android malware detection based on Linux kernel system call graphs. In 2016 IEEE/WIC/ACM international conference on web intelligence workshops (WIW). IEEE. Hou, S. et al. (2016). Deep4maldroid: a deep learning framework for android malware detection based on Linux kernel system call graphs. In 2016 IEEE/WIC/ACM international conference on web intelligence workshops (WIW). IEEE.
Zurück zum Zitat Ishitaki, T. et al. (2017). Application of deep recurrent neural networks for prediction of user behavior in tor networks. In 2017 31st international conference on advanced information networking and applications workshops (WAINA). IEEE. Ishitaki, T. et al. (2017). Application of deep recurrent neural networks for prediction of user behavior in tor networks. In 2017 31st international conference on advanced information networking and applications workshops (WAINA). IEEE.
Zurück zum Zitat Javaid, A., et al. (2016). A deep learning approach for network intrusion detection system. In Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. Javaid, A., et al. (2016). A deep learning approach for network intrusion detection system. In Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
Zurück zum Zitat Joghee, S., Alzoubi, H. M., & Dubey, A. R. (2020). Decisions effectiveness of FDI investment biases at real estate industry: Empirical evidence from Dubai smart city projects. International Journal of Scientific and Technology Research, 9(3), 3499–3503. Joghee, S., Alzoubi, H. M., & Dubey, A. R. (2020). Decisions effectiveness of FDI investment biases at real estate industry: Empirical evidence from Dubai smart city projects. International Journal of Scientific and Technology Research, 9(3), 3499–3503.
Zurück zum Zitat Kalra, D., Ghazal, T. M., & Afifi, M. A. M. (2020). Integration of collaboration systems in hospitality management as a comprehensive solution. International Journal of Advanced Science and Technology, 29(8s), 3155–3173. Kalra, D., Ghazal, T. M., & Afifi, M. A. M. (2020). Integration of collaboration systems in hospitality management as a comprehensive solution. International Journal of Advanced Science and Technology, 29(8s), 3155–3173.
Zurück zum Zitat Kashif, A. A., Bakhtawar, B., Akhtar, A., Akhtar, S., Aziz, N., & Javeid, M. S. (2021). Treatment response prediction in hepatitis C patients using machine learning techniques. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 79–89. https://doi.org/10.54489/ijtim.v1i2.24 Kashif, A. A., Bakhtawar, B., Akhtar, A., Akhtar, S., Aziz, N., & Javeid, M. S. (2021). Treatment response prediction in hepatitis C patients using machine learning techniques. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 79–89. https://​doi.​org/​10.​54489/​ijtim.​v1i2.​24
Zurück zum Zitat Khan, M. F., Ghazal, T. M., Said, R. A., Fatima, A., Abbas, S., Khan, M. A., Issa, G. F., Ahmad, M., & Khan, M. A. (2021a). An IoMT-enabled smart healthcare model to monitor elderly people using machine learning technique. Computational Intelligence and Neuroscience, 2021a. Khan, M. F., Ghazal, T. M., Said, R. A., Fatima, A., Abbas, S., Khan, M. A., Issa, G. F., Ahmad, M., & Khan, M. A. (2021a). An IoMT-enabled smart healthcare model to monitor elderly people using machine learning technique. Computational Intelligence and Neuroscience, 2021a.
Zurück zum Zitat Khan, Q.-T.-A., Ghazal, T., Abbas, S., Khan, W., Khan, A., Muhammad, A., Said, Raed, A., Ahmad, M., & Asif, M. (2021b). Modeling habit patterns using conditional reflexes in agency. Intelligent Automation and Soft Computing, 30(2), 539–552. Khan, Q.-T.-A., Ghazal, T., Abbas, S., Khan, W., Khan, A., Muhammad, A., Said, Raed, A., Ahmad, M., & Asif, M. (2021b). Modeling habit patterns using conditional reflexes in agency. Intelligent Automation and Soft Computing, 30(2), 539–552.
Zurück zum Zitat Lee, K., Azmi, N., Hanaysha, J., Alzoubi, H., & Alshurideh, M. (2022a). The effect of digital supply chain on organizational performance: An empirical study in Malaysia manufacturing industry. Uncertain Supply Chain Management, 10(2), 495–510.CrossRef Lee, K., Azmi, N., Hanaysha, J., Alzoubi, H., & Alshurideh, M. (2022a). The effect of digital supply chain on organizational performance: An empirical study in Malaysia manufacturing industry. Uncertain Supply Chain Management, 10(2), 495–510.CrossRef
Zurück zum Zitat Lee, K. L., Romzi, P. N., Hanaysha, J. R., Alzoubi, H. M., & Alshurideh, M. (2022b). Investigating the impact of benefits and challenges of IOT adoption on supply chain performance and organizational performance: An empirical study in Malaysia. Uncertain Supply Chain Management, 10(2), 537–550. https://doi.org/10.5267/j.uscm.2021.11.009CrossRef Lee, K. L., Romzi, P. N., Hanaysha, J. R., Alzoubi, H. M., & Alshurideh, M. (2022b). Investigating the impact of benefits and challenges of IOT adoption on supply chain performance and organizational performance: An empirical study in Malaysia. Uncertain Supply Chain Management, 10(2), 537–550. https://​doi.​org/​10.​5267/​j.​uscm.​2021.​11.​009CrossRef
Zurück zum Zitat Lee, S.-W., Hussain, S., Issa, G. F., Abbas, S., Ghazal, T. M., Sohail, T., Ahmad, M., & Khan, M. A. (2021). Multi-dimensional trust quantification by artificial agents through evidential fuzzy multi-criteria decision making. IEEE Access, 9, 159399–159412.CrossRef Lee, S.-W., Hussain, S., Issa, G. F., Abbas, S., Ghazal, T. M., Sohail, T., Ahmad, M., & Khan, M. A. (2021). Multi-dimensional trust quantification by artificial agents through evidential fuzzy multi-criteria decision making. IEEE Access, 9, 159399–159412.CrossRef
Zurück zum Zitat Li, Z. et al. (2017). Intrusion detection using convolutional neural networks for representation learning. In International conference on neural information processing. Li, Z. et al. (2017). Intrusion detection using convolutional neural networks for representation learning. In International conference on neural information processing.
Zurück zum Zitat Liu, Y. et al. (2017). Fault injection attack on deep neural network. In Proceedings of the 36th international conference on computeraided design. IEEE Press. Liu, Y. et al. (2017). Fault injection attack on deep neural network. In Proceedings of the 36th international conference on computeraided design. IEEE Press.
Zurück zum Zitat Matloob, F., Ghazal, T. M., Taleb, N., Aftab, S., Ahmad, M., Khan, M. A., Abbas, S., & Soomro, T. R. (2021). Software defect prediction using ensemble learning: A systematic literature review. IEEE Access. Matloob, F., Ghazal, T. M., Taleb, N., Aftab, S., Ahmad, M., Khan, M. A., Abbas, S., & Soomro, T. R. (2021). Software defect prediction using ensemble learning: A systematic literature review. IEEE Access.
Zurück zum Zitat Mathew, A. et al. (2017). An improved transfer learning approach for intrusion detection. Procedia Computer Science, 115, 251–257. Mathew, A. et al. (2017). An improved transfer learning approach for intrusion detection. Procedia Computer Science, 115, 251–257.
Zurück zum Zitat Mehmood, T. (2021). Does information technology competencies and fleet management practices lead to effective service delivery? Empirical evidence from E-commerce industry. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 14–41. Mehmood, T. (2021). Does information technology competencies and fleet management practices lead to effective service delivery? Empirical evidence from E-commerce industry. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 14–41.
Zurück zum Zitat Mehmood, T., Alzoubi, H. M., & Ahmed, G. (2019). Schumpeterian entrepreneurship theory: Evolution and relevance. Academy of Entrepreneurship Journal, 25(4). Mehmood, T., Alzoubi, H. M., & Ahmed, G. (2019). Schumpeterian entrepreneurship theory: Evolution and relevance. Academy of Entrepreneurship Journal, 25(4).
Zurück zum Zitat Mohammadi, S., & Namadchian, A. (2017). A new deep learning approach for anomaly base IDS using memetic classifier. International Journal of Computers Communications & Control, 12(5), 677–688. Mohammadi, S., & Namadchian, A. (2017). A new deep learning approach for anomaly base IDS using memetic classifier. International Journal of Computers Communications & Control, 12(5), 677–688.
Zurück zum Zitat Munoz-Gonza´lez, L. et al. (2017). Towards poisoning of deep learning algorithms with back-gradient optimization. In Proceedings of the 10th ACM workshop on artificial intelligence and security. ACM. Munoz-Gonza´lez, L. et al. (2017). Towards poisoning of deep learning algorithms with back-gradient optimization. In Proceedings of the 10th ACM workshop on artificial intelligence and security. ACM.
Zurück zum Zitat Naqvi, R., Soomro, T. R., Alzoubi, H. M., Ghazal, T. M., & Alshurideh, M. T. (2021). The nexus between big data and decision-making: A study of big data techniques and technologies. The International Conference on Artificial Intelligence and Computer Vision, 838–853. Naqvi, R., Soomro, T. R., Alzoubi, H. M., Ghazal, T. M., & Alshurideh, M. T. (2021). The nexus between big data and decision-making: A study of big data techniques and technologies. The International Conference on Artificial Intelligence and Computer Vision, 838–853.
Zurück zum Zitat Nuseir, M. T., Al Kurdi, B. H., Alshurideh, M. T., & Alzoubi, H. M. (2021). Gender discrimination at workplace: Do artificial intelligence (AI) and machine learning (ML) have opinions about it. The International Conference on Artificial Intelligence and Computer Vision, 301–316. Nuseir, M. T., Al Kurdi, B. H., Alshurideh, M. T., & Alzoubi, H. M. (2021). Gender discrimination at workplace: Do artificial intelligence (AI) and machine learning (ML) have opinions about it. The International Conference on Artificial Intelligence and Computer Vision, 301–316.
Zurück zum Zitat Radwan, N., & Farouk, M. (2021). The growth of internet of things (IoT) in the management of healthcare issues and healthcare policy development. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 69–84. https://doi.org/10.54489/ijtim.v1i1.8 Radwan, N., & Farouk, M. (2021). The growth of internet of things (IoT) in the management of healthcare issues and healthcare policy development. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 69–84. https://​doi.​org/​10.​54489/​ijtim.​v1i1.​8
Zurück zum Zitat Rehman, E., Khan, M. A., Soomro, T. R., Taleb, N., Afifi, M. A., & Ghazal, T. M. (2021). Using blockchain to ensure trust between donor agencies and NGOs in under-developed countries. Computers, 10(8), 98.CrossRef Rehman, E., Khan, M. A., Soomro, T. R., Taleb, N., Afifi, M. A., & Ghazal, T. M. (2021). Using blockchain to ensure trust between donor agencies and NGOs in under-developed countries. Computers, 10(8), 98.CrossRef
Zurück zum Zitat Salloum, S. A., Alshurideh, M., Elnagar, A., & Shaalan, K. (2020). Machine learning and deep learning techniques for cybersecurity: A review. In Joint European-US Workshop on Applications of Invariance in Computer Vision (pp. 50–57). Salloum, S. A., Alshurideh, M., Elnagar, A., & Shaalan, K. (2020). Machine learning and deep learning techniques for cybersecurity: A review. In Joint European-US Workshop on Applications of Invariance in Computer Vision (pp. 50–57).
Zurück zum Zitat Saxe, J., & Berlin, K. (2015). Deep neural network-based malware detection using twodimensional binary program features. In 2015 10th international conference on malicious and unwanted software (MALWARE). IEEE. Saxe, J., & Berlin, K. (2015). Deep neural network-based malware detection using twodimensional binary program features. In 2015 10th international conference on malicious and unwanted software (MALWARE). IEEE.
Zurück zum Zitat Shamout, M., Ben-Abdallah, B., Alshurideh, M., Alzoubi, H., Al Kurdi, B., & Hamadneh, S. (2022). A conceptual model for the adoption of autonomous robots in supply chain and logistics industry. Uncertain Supply Chain Management, 10, 1–16.CrossRef Shamout, M., Ben-Abdallah, B., Alshurideh, M., Alzoubi, H., Al Kurdi, B., & Hamadneh, S. (2022). A conceptual model for the adoption of autonomous robots in supply chain and logistics industry. Uncertain Supply Chain Management, 10, 1–16.CrossRef
Zurück zum Zitat Shibahara, T. et al. (2016). Efficient dynamic malware analysis based on network behavior using deep learning. In 2016 IEEE on global communications conference (GLOBECOM). IEEE. Shibahara, T. et al. (2016). Efficient dynamic malware analysis based on network behavior using deep learning. In 2016 IEEE on global communications conference (GLOBECOM). IEEE.
Zurück zum Zitat Suleman, M., Soomro, T. R., Ghazal, T. M., & Alshurideh, M. (2021). Combating against potentially harmful mobile apps. The International Conference on Artificial Intelligence and Computer Vision, 154–173. Suleman, M., Soomro, T. R., Ghazal, T. M., & Alshurideh, M. (2021). Combating against potentially harmful mobile apps. The International Conference on Artificial Intelligence and Computer Vision, 154–173.
Zurück zum Zitat Taormina, R., & Galelli, S. (2017). Real-time detection of cyberphysical attacks on water distribution systems using deep learning. In World environmental and water resources congress 2017. Taormina, R., & Galelli, S. (2017). Real-time detection of cyberphysical attacks on water distribution systems using deep learning. In World environmental and water resources congress 2017.
Zurück zum Zitat Tariq, E., Alshurideh, M., Akour, I., & Al-Hawary, S. (2022). The effect of digital marketing capabilities on organizational ambidexterity of the information technology sector. International Journal of Data and Network Science, 6(2), 401–408.CrossRef Tariq, E., Alshurideh, M., Akour, I., & Al-Hawary, S. (2022). The effect of digital marketing capabilities on organizational ambidexterity of the information technology sector. International Journal of Data and Network Science, 6(2), 401–408.CrossRef
Zurück zum Zitat Thing, V. L. (2017). IEEE 802.11 network anomaly detection and attack classification: A deep learning approach. In 2017 IEEE on wireless communications and networking conference (WCNC). IEEE. Thing, V. L. (2017). IEEE 802.11 network anomaly detection and attack classification: A deep learning approach. In 2017 IEEE on wireless communications and networking conference (WCNC). IEEE.
Zurück zum Zitat Vinayakumar, R., Soman, K., & Poornachandran, P. (2017). Evaluating effectiveness of shallow and deep networks to intrusion detection system. In 2017 international conference on advances in computing, communications and informatics (ICACCI). IEEE. Vinayakumar, R., Soman, K., & Poornachandran, P. (2017). Evaluating effectiveness of shallow and deep networks to intrusion detection system. In 2017 international conference on advances in computing, communications and informatics (ICACCI). IEEE.
Zurück zum Zitat Wang, Q. et al. (2017). Adversary resistant deep neural networks with an application to malware detection. In Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. ACM. Wang, Q. et al. (2017). Adversary resistant deep neural networks with an application to malware detection. In Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. ACM.
Zurück zum Zitat Wei, J., & Mendis, G. J. (2016). A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids. In Joint workshop on cyber-physical security and resilience in smart grids (CPSR-SG). IEEE. Wei, J., & Mendis, G. J. (2016). A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids. In Joint workshop on cyber-physical security and resilience in smart grids (CPSR-SG). IEEE.
Zurück zum Zitat Wu, T. et al. (2017). Twitter spam detection based on deep learning. In Proceedings of the Australasian computer science week multiconference. ACM. Wu, T. et al. (2017). Twitter spam detection based on deep learning. In Proceedings of the Australasian computer science week multiconference. ACM.
Zurück zum Zitat Yuan, X., Li, C., & Li, X. (2017). Deep Defense: identifying DDoS attack via deep learning. In 2017 IEEE international conference on smart computing (SMARTCOMP). IEEE. Yuan, X., Li, C., & Li, X. (2017). Deep Defense: identifying DDoS attack via deep learning. In 2017 IEEE international conference on smart computing (SMARTCOMP). IEEE.
Zurück zum Zitat Zolotukhin, M. et al. (2016). Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic. In 2016 23rd international conference on telecommunications (ICT). IEEE. Zolotukhin, M. et al. (2016). Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic. In 2016 23rd international conference on telecommunications (ICT). IEEE.
Metadaten
Titel
Machine Learning-Based Intrusion Detection Approaches for Secured Internet of Things
verfasst von
Taher M. Ghazal
Mohammad Kamrul Hasan
Siti Norul Huda Sheikh Abdullah
Khairul Azmi Abu Bakar
Nidal A. Al-Dmour
Raed A. Said
Tamer Mohamed Abdellatif
Abdallah Moubayed
Haitham M. Alzoubi
Muhammad Alshurideh
Waleed Alomoush
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-12382-5_110

Premium Partner