Comprehensive Survey of Deep Learning-Based Intrusion Detection and Prevention Systems for Secure Communication in the Internet of Things

Authors

  • V. G. Saranya Vaishalini, A. Ramathilagam, R. Palanikumar, P. Raghavan, P. Gopikannan, K. Manikandan

Keywords:

Internet Of Things, Intrusion Detection System, Malicious, Reliability, Security

Abstract

The Internet of Things (IoT) is a gadget that is connected to many devices that are permitted to detect and collect data from the provided environment and communicate the data over wireless media without any human involvement. IoT is widely used in various applications, namely healthcare, education, agriculture, military applications, etc. Due to its open nature and design, it is vulnerable to various kinds of network attacks. In an IoT environment, security should be stronger in order to prevent malicious activities. The Intrusion Detection System (IDS) was created to identify and prevent various types of harmful assaults on the network. Every organisation needs to manage these kinds of attacks and malicious activities. Many organisations fail to detect and prevent many unknown malicious attacks. So, safeguard measures have to be taken by the organisation in order to provide better security, reliability, and privacy in the IoT environment. In this paper, a survey on security issues related to the methods of deep learning and machine learning was used to analyse vulnerabilities in the IDS network.

Downloads

Download data is not yet available.

References

S. M. Kasongo and Y. Sun, “A deep learning method with wrapper-based feature extraction for wireless intrusion detection system,” Computers & Security, vol. 92, article 101752, 2020.

F. A. Khan, A. Gumaei, A. Derhab, and A. Hussain, “TSDL: a two-stage deep learning model for efficient network intrusion detection,” IEEE Access, vol. 7, pp. 30373–30385, 2019.

N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A deep learning approach to network intrusion detection,” IEEE transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41–50, 2018.

A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, and A. Alazab, “A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks,” Electronics, vol. 8, no. 11, p. 1210, 2019.

A. Derhab, M. Guerroumi, A. Gumaei et al., “Blockchain and random subspace learning-based ids for sdn-enabled industrial iot security,” Sensors, vol. 19, no. 14, p. 3119, 2019

Y. Otoum, D. Liu, and A. Nayak, “DL‐IDS: a deep learning– based intrusion detection framework for securing IoT,” Transactions on Emerging Telecommunications Technologies, no. - article e3803, 2019.

M. Kumar, Deep learning approach for intrusion detection system (ids) in the internet of things (iot) network using gated recurrent neural networks (gru), Wright State University, 2017.

M. Roopak, G. Y. Tian, and J. Chambers, “Deep learning models for cyber security in IoT networks,” in 2019 IEEE 9th annual computing and communication workshop and conference (CCWC), pp. 452–457, Las Vegas, NV, USA, 2019.

M. Roopak, G. Y. Tian, and J. Chambers, “An intrusion detection system against ddos attacks in iot networks,” in 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), pp. 562–567, Las Vegas, NV, USA, 2020.

B. Roy and H. Cheung, “A deep learning approach for intrusion detection in internet of things using bi-directional long short-term memory recurrent neural network,” in 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–6, Sydney, NSW, Australia, 2018.

Constantinides, Christos, Shiaeles Stavros, GhitaBogdan, and Kolokotronis Nicholas. (2019) “A novel online incremental learning intrusion prevention system.” 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 1–6.

Jiang, Chao, JianKuang, and Shirui Wang. (2019) “Home iot intrusion prevention strategy based on edge computing.” 2019 IEEE 2nd International Conference on Electronics and Communication Engineering (ICECE), 94–98.

Gonçalves, Daniel GV, et al. (2019) “IPS architecture for IoT networks overlapped in SDN.” 2019 Workshop on Communication Networks and Power Systems (WCNPS), 1–6.

James, Fathima. (2019) “IoTcybersecurity based smart home intrusion prevention system.” 2019 3rd Cyber Security in Networking Conference (CSNet), 107–113.

Sharma, Rajesh Kumar, and Ravi Singh Pippal. (2020) “Malicious Attack and Intrusion Prevention in IoT Network Using Blockchain Based Security Analysis.” 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), 380–385.

Haghighi, Mohammad Sayad, FaezehFarivar, and AlirezaJolfaei. (2020) “A machine learning-based approach to build zero false-positive IPSs for industrial IoT and CPS with a case study on power grids security.” IEEE Transactions on Industry Applications, 1–9.

Kasongo, Sydney Mambwe. (2021) “An advanced intrusion detection system for IIoT based on GA and tree based algorithms.” IEEE Access 9: 113199–113212.

Kumar, Randhir, et al. (2022) “A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network.” Journal of Parallel and Distributed Computing 164: 55–68.

Basati, Amir, and Mohammad Mehdi Faghih. (2022) “PDAE: Efficient network intrusion detection in IoT using parallel deep auto-encoders.” Information Sciences 598: 57–74

Saheed, YakubKayode, et al. (2022) “A machine learning-based intrusion detection for detecting internet of things network attacks.” Alexandria Engineering Journal 61 (12): 9395–9409.

De Souza, Cristiano Antonio, Carlos Becker Westphall, and Renato Bobsin Machado. (2022) “Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments.” Computers & Electrical Engineering 98: 107694.

A. Derhab, M. Belaoued, M. Guerroumi, and F. A. Khan, “Two-factor mutual authentication offloading for mobile cloud computing,” IEEE Access, vol. 8, pp. 28956–28969, 2020.

A. Boulemtafes, A. Derhab, and Y. Challal, “A review of privacy-preserving techniques for deep learning,” Neurocomputing, vol. 384, pp. 21–45, 2020.

A. A. Diro and N. Chilamkurti, “Distributed attack detection scheme using deep learning approach for internet of things,” Future Generation Computer Systems, vol. 82, pp. 761–768, 2018.

A. Aldweesh, A. Derhab, and A. Z. Emam, “Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues,” Knowledge-Based Systems, vol. 189, article 105124, 2020.

M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, “Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study,”Journal of Information Security and Applications, vol. 50, article 102419, 2020.

S. Mahdavifar and A. A. Ghorbani, “Application of deep learning to cybersecurity: A survey,” Neurocomputing, vol. 347, pp. 149–176, 2019.

Z. Ning, P. Dong, X. Wang et al., “Mobile edge computing enabled 5g health monitoring for internet of medical things: a decentralized game theoretic approach,” IEEE Journal on Selected Areas in Communications, pp. 1–16, 2020

S. Ni, Q. Qian, and R. Zhang, “Malware identification using visualization images and deep learning,” Computers & Security, vol. 77, pp. 871–885, 2018.

G. Sun and Q. Qian, “Deep learning and visualization for identifying malware familes,” IEEE Transactions on Dependable and Secure Computing, p. 1, 2018.

Y. N. Soe, P. I. Santosa, and R. Hartanto, “Ddos attack detection based on simple ann with smote for iot environment,” in 2019 Fourth International Conference on Informatics and Computing (ICIC), pp. 1–5, Semarang, Indonesia, 2019.

Downloads

Published

24.03.2024

How to Cite

A. Ramathilagam, R. Palanikumar, P. Raghavan, P. Gopikannan, K. Manikandan, V. G. S. V. (2024). Comprehensive Survey of Deep Learning-Based Intrusion Detection and Prevention Systems for Secure Communication in the Internet of Things. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 1822–1828. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5647

Issue

Section

Research Article