当前位置: X-MOL 学术Arch. Computat. Methods Eng. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges
Archives of Computational Methods in Engineering ( IF 9.7 ) Pub Date : 2020-10-20 , DOI: 10.1007/s11831-020-09496-0
Ankit Thakkar , Ritika Lohiya

Internet of Things (IoT) is widely accepted technology in both industrial as well as academic field. The objective of IoT is to combine the physical environment with the cyber world and create one big intelligent network. This technology has been applied to various application domains such as developing smart home, smart cities, healthcare applications, wireless sensor networks, cloud environment, enterprise network, web applications, and smart grid technologies. These wide emerging applications in variety of domains raise many security issues such as protecting devices and network, attacks in IoT networks, and managing resource-constrained IoT networks. To address the scalability and resource-constrained security issues, many security solutions have been proposed for IoT such as web application firewalls and intrusion detection systems. In this paper, a comprehensive survey on Intrusion Detection System (IDS) for IoT is presented for years 2015–2019. We have discussed various IDS placement strategies and IDS analysis strategies in IoT architecture. The paper discusses various intrusions in IoT, along with Machine Learning (ML) and Deep Learning (DL) techniques for detecting attacks in IoT networks. The paper also discusses security issues and challenges in IoT.



中文翻译:

物联网IDS的机器学习和深度学习观点回顾:最新更新,安全性问题和挑战

物联网(IoT)在工业和学术领域都是广泛接受的技术。物联网的目标是将物理环境与网络世界结合起来,创建一个大型智能网络。该技术已应用于各种应用领域,例如开发智能家居,智能城市,医疗保健应用,无线传感器网络,云环境,企业网络,Web应用和智能电网技术。这些在各个领域中广泛出现的应用程序引发了许多安全问题,例如保护设备和网络,物联网网络中的攻击以及管理资源受限的物联网网络。为了解决可伸缩性和资源受限的安全性问题,已针对物联网提出了许多安全性解决方案,例如Web应用程序防火墙和入侵检测系统。本文对2015-2019年的物联网入侵检测系统(IDS)进行了全面调查。我们已经讨论了物联网架构中的各种IDS放置策略和IDS分析策略。本文讨论了物联网中的各种入侵,以及用于检测物联网网络中的攻击的机器学习(ML)和深度学习(DL)技术。本文还讨论了物联网中的安全性问题和挑战。

更新日期:2020-10-20
down
wechat
bug