Deep Learning-Based Intrusion Detection Systems For Network Security in IoT System

Neibo Augustine Olobo, Waliu Adebayo Ayuba, Ayogoke Felix Omojola, Izevbigie Hope Iyobosa, Aderemi Ibraheem Adebayo, Abiamamela Obi-Obuoha, Unuigbokhai Peter Afegbai

Abstract

The Internet of Things (IoT) has revolutionised various sectors, including healthcare, education, agriculture, and military applications, by enabling seamless communication and data collection among interconnected devices. However, IoT networks' open and decentralised nature exposes them to many security threats and vulnerabilities. Intrusion Detection Systems (IDS) have been developed to address these challenges by identifying and mitigating malicious activities targeting these networks. Despite their importance, many organisations struggle to detect and prevent novel and sophisticated attacks effectively. This paper presents a comprehensive survey of the security issues inherent in IoT environments, emphasising the role of deep learning and machine learning techniques in enhancing IDS capabilities. By analysing existing vulnerabilities and evaluating various methodologies, we highlight the critical need for robust security measures that ensure IoT systems' reliability, privacy, and integrity. Through our findings, we advocate for integrating advanced analytical techniques in IDS to bolster defences against evolving threats in the IoT landscape.



Keywords


Intrusion Detection System; network security; deep learning; machine learning; vulnerabilities; malicious attacks; data privacy; security measures

Full Text:

PDF


References


1. Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516. doi: 10.1016/j.adhoc.2012.02.016

2. Weber, R. H. (2010). Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26(1), 23–30. doi: 10.1016/j.clsr.2009.11.008

3. Alam, M., & Khan, I. R. (2022). Cyber-physical attacks and IoT. In Chapman and Hall/CRC eBooks, 79–104. doi: 10.1201/9781003241348-5

4. Sommer, R., & Paxson, V. (2010). Outside the closed world: on using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316. doi: 10.1109/sp.2010.25

5. Djergou, A. A., Maleh, Y., & Mounir, S. (2022). Machine Learning Techniques for Intrusion Detection in SDN: A survey. In Lecture notes in networks and systems, 460–473. doi: 10.1007/978-3-030-91738-8_42

6. Dina, A. S., Siddique, A., & Manivannan, D. (2023). A deep learning approach for intrusion detection in the Internet of Things using focal loss function. Internet of Things, 22, 100699. doi: 10.1016/j.iot.2023.100699

7. Bertino, E., & Islam, N. (2017). Botnets and Internet of Things security. Computer, 50(2), 76–79. doi: 10.1109/mc.2017.62

8. Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258. doi: 10.1109/jiot.2017.2694844

9. Wanda, P., & Jie, H. J. (2020). A survey of Intrusion Detection system. International Journal of Informatics and Computation, 1(1), 1. doi: 10.35842/ijicom.v1i1.7

10. Selem, M., Jemili, F., & Korbaa, O. (2024). Deep learning for intrusion detection in IoT networks. Research Square. doi: 10.21203/rs.3.rs-4306367/v1

11. Smys, N. D. S., Basar, N. D. A., & Wang, N. D. H. (2020). Hybrid Intrusion Detection System for Internet of Things (IoT). Journal of ISMAC, 2(4), 190–199. doi: 10.36548/jismac.2020.4.002

12. Haripriya, L., & Jabbar, M. (2018). Role of Machine Learning in Intrusion Detection System: review. 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 925–929. doi: 10.1109/iceca.2018.8474576

13. Cao, Y., Wang, Z., Ding, H., Zhang, J., & Li, B. (2023). An intrusion detection system based on stacked ensemble learning for IoT network. Computers & Electrical Engineering, 110, 108836. doi: 10.1016/j.compeleceng.2023.108836

14. Zhang, Z., Hamadi, H. A., Damiani, E., Yeun, C. Y., & Taher, F. (2022). Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. IEEE Access, 10, 93104–93139. doi: 10.1109/access.2022.3204051


Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM

Refbacks

  • There are currently no refbacks.




Copyright (c) 2024 Neibo Augustine Olobo, Waliu Adebayo Ayuba, Ayogoke Felix Omojola, Izevbigie Hope Iyobosa, Aderemi Ibraheem Adebayo, Abiamamela Obi-Obuoha, Unuigbokhai Peter Afegbai

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.