Research 5
Research 5
Mona Esmaeili1, Morteza Rahimi2,*, Hadise Pishdast3, Dorsa Farahmandazad4, Matin Khajavi5,
Hadi Jabbari Saray6
1. Department of Electrical & Computer Engineering, University of New Mexico, Albuquerque, NM, USA
2. School of Computing and Information Sciences, Florida International University, Miami, FL, USA
3. College of Engineering and Computer Science, Florida Atlantic University, Boca Raton, FL, USA
4. College of Business, Florida Atlantic University, Boca Raton, FL, USA
5. Foster School of Business, University of Washington, Seattle, WA, USA
6. Department of Computer Engineering, Islamic Azad University, Urmia Branch, Urmia, Iran
Abstract
Attacks against the Internet of Things (IoT) are rising as devices, applications, and
interactions become more networked and integrated. The increase in cyber-attacks that
target IoT networks poses a considerable vulnerability and threat to the privacy, security,
functionality, and availability of critical systems, which leads to operational disruptions,
financial losses, identity thefts, and data breaches. To efficiently secure IoT devices, real-
time detection of intrusion systems is critical, especially those using machine learning to
identify threats and mitigate risks and vulnerabilities. This paper investigates the latest
research on machine learning-based intrusion detection strategies for IoT security,
concentrating on real-time responsiveness, detection accuracy, and algorithm efficiency.
Key studies were reviewed from all well-known academic databases, and a taxonomy was
provided for the existing approaches. This review also highlights existing research gaps
and outlines the limitations of current IoT security frameworks to offer practical insights
for future research directions and developments.
*
Corresponding author: Morteza Rahimi (Email: mrahi011@fiu.edu)
1
1-Introduction
The IoT market has grown by 200 percent from 2006 to 2021 because of "coupling IT
devices on the Internet that can send and receive data regularly" [2]. Materials and products
connected to the Internet of Things have become more complex. Internet of Things
technology is currently being applied to various industries, including residential, education,
banking, infrastructure, smart cities, tourism, and even transportation [93, 94]. Institutions,
analysts, and individuals need to take into account the unique security and availability of
IoT equipment and networks to address the accelerated marketing phenomenon. The
omission could negatively affect users of the IoT and disrupt the complex ecosystem.
Fraudsters can access intelligent homes remotely, and intelligent automobiles can be used
to terrorize residents from afar [3]. Through wired (e.g., Ethernet, WiFi) and wireless (e.g.,
RFID, Zigbee, WiFi, Bluetooth, 3G/4G) technologies, low-power, low-processing-power
sensors can interact with other devices (e.g., gateways, cloud servers) [4, 5].
Several IoT devices are used for wearables (fitness trackers, smartwatches), home
automation (lighting systems, thermostats, cameras, and locks), as well as industrial
automation (process control, safety monitoring, and equipment management). According
to predictions, by 2025, there will be nearly 41 billion Internet-connected devices around
the world [6, 7]. Malicious software is increasingly targeting devices for several reasons,
including a lack of security updates for legacy devices connected to the Internet, a lack of
security priorities during development, and weak login credentials. To illustrate how an
injection attack affects IoT applications, it is necessary to take a closer look at the
framework of the IoT paradigm. Figure 1 shows the IoT architecture. The first layer has
four basic components: perception, network, middleware, and applications. Perception is
responsible for integrating intelligent devices with the framework. Cloud nodes and IoT
devices communicate through the network layer. IoT data is abstracted from user
applications through the middleware layer, and analytics capabilities, device management,
and user reporting are supported [8-10].
Two types of intrusion detection systems (IDS) exist: based on signatures and based on
anomalies. IDSs that use signatures detect attacks based on previously known attacks.
These IDSs do not detect novel attack types and zero-day attacks. Anomaly-based IDSes,
on the other hand, gather information on lawful user activity to determine if those users are
legitimate or malicious; consequently, these IDSes can detect undiscovered attacks [11].
While anomaly-based IDSes are often more likely to generate false positives than false
negatives, signature-based IDSes are more likely to create false negatives [12]. Anomaly-
based techniques require collecting and monitoring data regarding the system's regular
operation in the training phase to develop a model of legitimate users' behavior. To
2
determine if a behavior is authentic or abnormal, we compare it to the model. The
exponential increase in cyber-attacks has increased the need for enhanced Intrusion
Detection Systems (IDS).
Methods such as Machine Learning (ML) are crucial since they allow for early detection
of intrusions inside the system [5, 7]. Despite the plethora of alternatives, selecting the best
approach is difficult due to many algorithms and optimization methods in IoT [13]. Deep
Learning (DL) encompasses the three terms Machine Learning (ML), Artificial
Intelligence (AI), and Artificial Intelligence (AI) simultaneously. Figure 2 shows them as
subfields of each other.
3
Fig. 2. Relationship between AI, ML, ANN, and DL.
There are specific connections between ANN, deep learning, and machine learning. Using
computers to study human cognition is analogous to studying biological processes [14, 15].
In machine learning, algorithms are used to assess data relevant to a specific issue (e.g.,
intrusion detection), learn from it, and then use that knowledge to identify patterns that
help solve the issue. Neurons are the building blocks of neural networks (NN). A neural
network simulates the behavior of a real neuron by sending data across links of neurons.
Using a weighted average of their inputs, neural neurons affect the behavior of real neurons.
Theoretically, researchers [16] describes NN as a "massively parallel aggregation of basic
processing units that learn from their surroundings and store that information in their
connections." Machine Learning (ML) has proven helpful in addressing a variety of risks
in the Internet of Things (IoT) environment, mainly when applied to various IoT security
aspects [17-20].
Figure 3 shows the components of an IoT system and several ways to create an intelligent
IoT system. The purpose of this study is to compare machine learning-based intrusion
detection systems against techniques used in IoT attacks. This essay is structured as
follows. Section 2 reviews various publications on this topic from 2015 to 2022. In Section
3, we describe intrusion detection and anomaly detection systems for IoT, identify IoT
botnet attacks, and use machine learning to detect IoT attacks. We conclude our study by
discussing its limitations and making several recommendations for future study.
4
Fig. 3. Intelligent IoT systems at different stages of development: machine learning approach [21]
2- Literature review
This section discusses how to protect settings powered by machine learning and the
Internet of Things by utilizing intrusion detection and identification technologies provided
by various authors. Literature reviews were conducted on the topic. The IEEE and ACM
Digital Libraries, as well as Elsevier and Springer databases, were searched. Here, we
discuss and compare the articles found during the review. Table 1 is an overview of
intrusion detection systems for the Internet of Things [21]. It is possible to determine which
techniques are capable of multiclass detection and their primary shortcomings. A detection
method developed by Hagos et al. [22] Support Vector Machines (SVMs) and the Least
Absolute Shrinkage and Selection Operator are combined in this algorithm (LASSO). As
part of an IoT context, Diro and Chilamkurti [23] propose using Deep Neural Networks
(DNN) as a distributed solution for detecting intrusions. Detection methods are dispersed
throughout the fog layer. A DNN detection model is trained across each distributed node,
resulting in a model for each node. To verify the technique, the NSL-KDD dataset was
used. In [24], the authors present a hybrid technique for binary intrusion detection in fog
computing settings using Deep Neural Networks and K-nearest neighbors (KNN).
Additionally, we describe the framework that underpins this work. Vinayakumar et al. [25]
5
also examined deep networks for intrusion detection. They presented their method using
Deep Belief Networks (DBN).
6
possible [34]. This is referred to as a penny-flooding assault. Kumar et al. [35] investigate
blockchain stress by assessing the vulnerabilities revealed by distributed ledger
technologies.
Kumar et al. [36] created an IDS for a blockchain-based Internet of Things (IoT) system.
The authors proposed a federated learning-based IoT-based attack detection system. They
accomplished this by using the PySyft package. However, crucial evaluation criteria, such
as the false alarm rate, were missing from this research. Bakhsh et al. [37] suggested an
adaptive IDS for IoT devices that makes use of agent technology to provide portability,
rigidity, and self-starting behaviors. This hybrid system identified both abuse and
irregularities by using both host-based and network-based capabilities. This research
lacked performance data for the IDS or its operating systems. Anthi et al. [38] suggested
an adaptive and predictive IDS system for IoT contexts based on signatures and anomaly
detection. Due to the study's imprecise model assumptions, it was only possible to identify
a small amount of assault. We determine the predicted threat model and attack aim in a
blockchain-enabled IoT network from the literature (see Tables 1 and 2).
7
Table 2: Machine learning background
8
architecture should consider functional factors. The transfer of packets in a normal network
is controlled by the switches and routers attached to the end systems. However, traditional
nodes often serve as packet transporters and terminals in IoT networks since they are
designed in multiple steps. Network protocols are also part of IoT networks. In the Internet
of Things networks, protocols such as RPL LoWPAN IEEE802.15.4 and CoAP are used
that are not found in conventional networks [62]. On the other hand, these studies focus on
the development of intrusion detection systems for Internet of Things components.
However, none of them examine key methods for penetration into the Internet of Things
systems. The following sections describe how to implement intrusion detection systems
and common security issues relating to the Internet of Things. We will also discuss the
validation process for intrusion detection systems for the Internet of Things. According to
Figure 4 [73], comparable works are grouped as follows: 1. Strategic positioning 2. Design
3. Methods of detection 4. Threats to security 5. Methods of validation.
Intrusive
detection systems
in IoT
Conventional
Distributed Independent Signature based Hypothetical
attack
Distributed and
Centeralized Anomaly-based Routing attack Empirical
participatory
Specification Man-in-the-
Hybrid Hierarchical Simulation
based Middle
None
9
3.1. Large-scale attacks
The Internet of Things has increased visibility, control, and potential practically
everywhere. There are many applications for IoT today, among them autonomous cars,
traffic congestion, patient monitoring, high-quality health care, and smart home appliances
[92]. Individuals have increased their productivity and improved their quality of life
through these solutions [70-72]. Despite this, these ubiquitous networked gadgets are
vulnerable to cyber-attacks due to their widespread connectivity and processing
capabilities. These devices may become bots or zombies because there are no security
precautions. These devices form a botnet when hundreds of millions of them become
infected. Command and control (C&C) servers manage these botnets, and they are used to
carry out a variety of large-scale malicious attacks. These attacks take many forms [73].
In some cases, such as TCP timeout retransmission and maintaining an open HTTP
connection, exhaust the server's resources, rendering the server inaccessible to valid
requests. Alternatively, some large-scale assaults rely on volume. As a result of
transmitting large amounts of bandwidth, these attacks prevent legitimate queries from
accessing crucial services. Attacks include DDoS, Simple Network Management Protocol
(SNMP), TCP SYN, UDP flooding, and ICMP flooding [73]. In addition, it featured a
category of application-layer attacks, which used fewer resources to disrupt critical
systems. A few examples of such attacks include zero-day vulnerabilities, Slowloris, web
server exploits, and OpenBSD attacks. By flooding the internet with traffic, DDoS attacks
attempt to interrupt normal operations and deplete the server's resources or bandwidth,
thereby shutting down the website. A network attack, a protocol attack, and an application
attack [5] are three types of attacks. Regardless of their type, their primary objective is to
interfere with harmless communications in order to prevent real users from accessing the
service.
10
established threats. It takes time to maintain a signature database, which is one of the
drawbacks of a signature-based strategy. As a database grows, it becomes increasingly
computationally expensive to compare the input to it. This technique relies on previously
known attack signatures; it cannot detect zero-day attacks or new attacks. Anomaly-based
detection is preferred by analyzing regular traffic patterns and alerting or restricting traffic
when an aberrant way is detected. Using anomaly-based systems can effectively identify
zero-days and unknown threats; however, many false positives may result [43]. An
anomaly-based IDS is a key focus of research because of its robust detection capabilities
for large-scale, zero-day, and unknown threats.
11
programmers need to automate spotting complicated patterns and generating intelligent
judgments based on data. One of the most challenging aspects of machine learning is
teaching the computer to automatically recognize a handwritten postal code after learning
several examples from a collection of samples. In recent years, machine learning has
expanded rapidly [66].
12
4.2. Clustering
Clustering is the same as unsupervised learning. Since the input examples lack class
markers, the approach is called unsupervised learning. Most often, data are classified using
clustering. An unsupervised learning approach, for example, accepts photographs of
handwritten numbers as input in the case of postal code recognition. Suppose ten clusters
are discovered in this way. Each cluster corresponds to a distinct digit between 0 and 9.
The model does not convey the semantic meaning of the discovered clusters due to the
unlabeled nature of the training data [18].
4.3. Semi-supervised learning
Semi-supervised learning employs both labeled and unlabeled data to build the model.
As one example, labeled examples aid in learning class models, whereas unlabeled
examples are used to correct class boundaries [19]. With two classes, a subset of cases may
be categorized as positive, while the remaining are labeled as negative. Unlabeled
examples may allow the decision boundary to be set more precisely. Furthermore, despite
their labeling, two positive examples in the top right corner are likely skewed or noisy
[19]. Computer-based active learning programs engage students in the educational process
by actively encouraging them to take part. A user (for example, a subject matter expert)
can tag an Instance, which may be derived from a collection of unlabeled Instances or
generated by the learning program [45]. Since the model is only tested in many situations,
this technique seeks to improve its accuracy by using input derived from human users.
Machine learning and data mining are closely related. Similarly, machine learning depends
on the correctness of models regarding classification and clustering. The importance of
scalability and reliability of mining techniques for large datasets and the creation of novel
and alternative methods is emphasized in data mining [11] (see Table 3).
Table 3. A recent survey and comparison of machine learning techniques for IoT systems.
Ref. Year Optimization KPIs Results
13
Ref. Year Optimization KPIs Results
[101] 2022 ✗ ✗ Focused on security, privacy, and safety in IoT using ML.
14
Ref. Year Optimization KPIs Results
5.1. Classification
Data classes and ideas are classified using a model (or a function) that describes and separates
them. The model is built based on the evaluation of experimental outcomes (data objects with class
15
labels). Undefined data objects are annotated with class tags using the model. As part of the
categorization procedure for data (during which the constructed model is used to predict the label
for the given data class), the learning step (during which a classification model is constructed) and
the classification stage (during which the data is classified) are also included [18]. During the first
phase, a classifier is constructed to represent the sets of data or ideas to be analyzed. An algorithm
is used to generate this learning step (or learning phase) based on a collection of database instances
and class tags. The model is used in the second procedure to categorize the data. To apply the
model to original data, the model must first be assessed for accuracy. This is done through a series
of trials. Models may be developed using a variety of techniques, including categorization
principles, decision trees, mathematical formulae, and neural networks [34-38].
16
incapable of detecting large-scale attacks, malicious traffic may not be detected. System security
will be compromised as a result.
17
7- Dataset
7.1. KDD99
A benchmark dataset for evaluating various IDSes is KDD (Discovering knowledge through
databases), released in 1996. The dataset was compiled by Stolfo et al. [85] .According to [21]
DARPA 98, the KDD99 dataset was constructed. The KDD99 dataset consists of 41 attributes
classified as either normal or attack. Twenty-one different assault types are included in the dataset.
In addition to Denial of Service (DoS) attacks, User to Root (U2R) attacks, Remote to Local (R2L)
attacks, and Probing attacks, there are several other kinds of attacks. There are 78 percent and 75
percent duplicate entries in the training and testing datasets, respectively. A machine learning
model cannot be trained using U2R (52 attacks in the training dataset) and R2L (1106 attacks in
the training dataset) attacks, resulting in an inbalanced KDD99 dataset.
7.2. NSL-KDD
In addition to NSL-KDD, another dataset that is used a lot is Network Socket Layer-Knowledge
Discovery in Databases (NSL-KDD). This dataset was derived from the KDD99 dataset by
Tavallaee et al. [86]. This dataset does not contain duplicate entries, making it a better candidate
for testing machine learning-based IDSes than KDD99 [21]. The distribution of data across
different classes is asymmetric, though, as with KDD99.
7.3. UNSW-NB15
A new dataset for evaluating IDSs was suggested by Moustafa et al. [87] in 2015. As faithfully as
possible, this dataset captures network activity. Tcpdump was used to capture raw network traffic.
A number of critical features were derived from traffic data by Argus and Bro-IDS [28, 29]. There
are 49 distinct features in the dataset and 2,540,044 unique entries. Fuzzers, Analysis, Backdoors,
Denial of Service, Exploits, Generic, Reconnaissance, Shellcode, and Worms are among the nine
attack types in this collection. For Analysis, Backdoor, Shellcode, and Worm, only a few samples
are available for training.
18
8.1. Intrusion detection system architectures
This section [20] describes how the detection system's design enables automatic, distributed,
participatory, hierarchical, and agent-based classification. Every observer node identifies
intrusions independently and gathers data independently. This could be centralized or distributed.
Each network node operates as an observer node in a centralized observer node architecture. In a
distributed observer node design, each sensor node must be included in at least one observer node,
and each observer node monitors a different part of the network. A separate intrusion detection
system is installed in each monitoring node.
• Distributed architecture: intrusion detection system agents are executed on each
monitoring node. Monitoring nodes collaborate to detect intrusions. Data and warnings
shared across the network with another monitoring node contribute to the conclusion of the
intrusion detection system as it monitors its surrounding nodes. Diagnostic performance is
improved with this method. An infrastructure that adheres to the DODAG standard can
benefit from this design.
• Hierarchical architecture: compatible with hierarchical sensor networks. Multiple
DODAGs (with a common sink node) are supported. The sink nodes serve as cluster head
agents for an intrusion detection system. In contrast, the local agents are created and
deployed according to the system's autonomous architecture and collaborate in the
intrusion detection process.
• Moving agent architecture: Collaborates on detecting intrusions between various mobile
agents. Agent mobility may enhance the performance of intrusion detection systems.
Mobile agents are executable pieces of code that travel from one node to another as a part
of a self-controlled program. While an agent migrates from one node to another,
computations are also performed.
• Examines several routing attacks: It is including sinkholes, selective send, hello floods,
wormholes, identifier attacks, and Sybil. Walgren et al. [88] have developed an intrusion
detection system confined to selective sending of attacks. Reza et al. [89] have developed
a technique to detect sinkholes and selective sending attacks. Cervantes et al. [90]
developed a method for identifying sinkhole attacks. The authors of this study focus on
node mobility and self-repair, which are closely related to [91].
19
general, deep learning approaches have three significant drawbacks: (1) highly linked layers lack
intra-layer connections; (2) DL layered networks must be manually tuned to get optimum results;
and (3) big DL models use a significant amount of energy and computational resources [19]. In
addition, deep learning models are subject to training time constraints as the amount of training
data grows [12].
The use of CNNs in image and language processing is widespread [12]. Also, CNN has
demonstrated impressive performance in various other applications, including detecting benign
and malicious network traffic in an IoT setting [11, 12, 14, 79]. CNN-based models are
computationally complex, making them difficult to implement on IoT devices with limited
resources [3]. In a CNN, the complexity increases as the layer count increases and the levels are
connected in large dimensions. The CNN begins to make judgments about the characteristics [63].
Natural language handling and text processing are promising applications for RNNs [77]. Because
they can process sequential data, RNNs are well-suited for analyzing IoT sensor data and detecting
attacks. Gradients disappearing or ballooning is one of the shortcomings of RNNs. They cannot
capture long-term relationships. As a result of the timestamp's computation reliance on the
previous timestamp, parallelism's capabilities are limited. As an alternative, the LSTM emerged
from RNN and can detect regular and malicious traffic through pattern learning based on ling
sequences [91]. Due to its ability to learn long-term dependencies and address the vanishing
gradient issue, LSTM is used more extensively than RNN. In comparison to CNN and RNN,
LSTMs are superior IDSs since they can learn from temporal sequences and long-term
dependencies. As a result, LSTM requires a large amount of training time since it cannot calculate
simultaneously at multiple timestamps.
Using deep learning models to detect threats in IoT systems, researchers have combined deep
learning models to improve performance [19, 10]. An algorithm combining CNN with LSTM is
presented [91] for detecting large-scale attacks. Their technique begins with a CNN layer, then
moves to LSTM layers, drop-out layers, and finally, a fully connected layer. A comparison was
made between the performance of hybrid models and the performance of individual models
(MLPs, CNNs, and LSTMs) and classical machine learning models (SVMs, Random Forests, and
Naive Bayesian models). In terms of performance, CNN and LSTM outperformed separate
models. Using their suggested model, they generated accuracy, precision, and recall values that
exceeded 97.16 percent. When CNN and LSTM were run independently, their accuracy was 95.14
percent and 86.34 percent.
20
a number of machine learning algorithms examine input data for features that represent the data
set. Several examples include support vector machines (SVMs), random forests, and decision trees.
Errors in network traffic patterns are evaluated by using a learned classifier [63]. An important
aspect of feature selection is the input data and classifier being used. When there are many
characteristics in the input data, feature selection is complicated by the lengthy computation time
[64].
There are no predefined criteria for the type and quantity of classification characteristics that
should be used. Researchers use the dataset to examine stateless and stateful traffic from different
perspectives; some examine network traffic for abnormalities from stateful traffic, while others
investigate stateless traffic. In a similar line, other studies propose manual feature selection based
on personal experience. In contrast, others advocate using statistical approaches to determine the
fewest possible ideal characteristics that provide the same accuracy as the whole set of input data.
KNN is a policy-based machine learning model that uses four traffic metrics to identify DDoS
attacks in the IoT: the number of unique IP addresses at the destination and the maximum,
minimum, and mean packet counts per destination [75]. IoT devices are believed to create random
IP addresses when attacked and transmit malicious data. They detected attacks 94 percent of the
time with their classifier. An alternative method, based on a single DNS record [37], was offered
as a solution to the time-consuming feature selection process. According to the authors, the best
way to identify Mirai-like botnets in IoT networks is to examine a single DNS record at the IoT
transportation layer. Using a statistical approach to feature selection, another study looked at the
timestamp of the request, calculated the time difference between the previous and subsequent
requests, and generated statistical characteristics like mean, standard deviation, and so on [48].
According to the authors, a standard deviation greater than the mean indicates abnormal traffic.
Without explicitly picking features to understand how these data are connected, deep learning
classifiers perform well on huge datasets [20]. According to some researchers, deep learning-based
models have advantages over traditional models regarding feature selection. In one study, the
authors chose features based on multiple objectives (NSGA-ii-aJG) [19]. They were able to
identify DDoS activities with 99.03 percent accuracy by using CNN+LSTM. Using the feature
selection process, the authors were able to reduce training time by fivefold after running the same
model on the entire feature set. In another study [84], deep learning techniques automatically
identified characteristics and classified raw data to detect irregular traffic patterns. The suggested
LSTM model scored 99.98 percent accuracy, whereas the SVM model scored 88.18 percent. In
deep learning, CNNs are frequently used to select features automatically. In IDS, CNN is used to
extract relevant characteristics from raw network data and then applied to image processing. In
image processing applications, CNN is often applied to image processing applications. Feature
selection is a labor-intensive, time-consuming, difficult, and error-prone process in machine
learning [84]. It is important to have a deep understanding of network traffic to discover realistic
and linked aspects. An additional constraint on the execution of feature selection is its
independence from the training phase. Due to this, they do not occur simultaneously, so the
21
classifier can perform better [84]. Deep learning overcomes these limitations by automatically
detecting underlying patterns and correlations within the data set for optimal performance. A
feature selection algorithm enhances significant characteristics and diminishes irrelevant ones in
deep learning. IoT threat categories are discovered and classified simultaneously using feature
selection and classification.
22
9.3 Selecting the Right Dataset
Model development and training for intrusion detection must consider the unique characteristics
of the IoT environment. The reduced memory, processing power, and energy of IoT devices and
the increased network traffic they create require solutions that differ from those used by traditional
computer systems. The IoT dataset must include various attack types to train machine learning and
deep learning models. Datasets for training an IDS are available today in many forms; however,
not all are current or include IoT traffic. It is necessary to pay special attention to models with
unbalanced classes or fewer attack labels since they will suffer from poor performance.
10. Conclusion
Every human being has access to related items. Through gimmicks, the Internet of Things alters
people's lives. Internet of Things applications include smart cities (such as smart parking), smart
environments (such as noise pollution), smart meters (such as smart grids), and industrial controls.
All sectors are affected, even those particularly vulnerable, such as the military, healthcare, and
construction. Unfortunately, firms rely on inventiveness and increasingly integrated products
instead of consistency and proof of durability. The Internet of Things is a double-edged sword.
Humans can hack and exploit this connected army. An infected node can affect the entire IoT
network. An unsuspecting person might be hacked into to take their automobiles via remote control
by a malevolent person. In the future, IoT-based research will yield more results. The validation
strategy needs to be refined, namely creating a public data set as a baseline for network sharing
with IoT devices. A systematic analysis of the use of deep learning methods for the security of
IoT-based systems was conducted in this work.
We presented a full taxonomy of DL approaches and discussed the context of IoT security. The
second part of the paper discusses the methodology we used, beginning with elaborating the
queries generated sequentially from the research questions and progressing through several
23
screening and refining procedures to arrive at the final collection of 69 studied articles. Lastly, we
categorized the findings based on the study topics into three broad categories. The security issues
addressed, the DLN architectures used, their application areas, and the datasets used were all
included. Our closing debate shed some light on several difficulties we have yet to resolve on the
subject we chose, demonstrating that more research efforts will be necessary in the near future to
make the use of DL a permanent and mature solution to IoT security. We are of the opinion that
this is true. Different Internet of Things protocols may be used for other attacks. Comparing the
various constructed NIDS is easy, realistic, and practical using this data collection method. In
addition, IoT NIDS must detect both known and unknown attacks without being protocol
dependent. Finally, NIDS designs for IoT should combine edge computing and fog computing
strategies extensively. It is possible to detect IoT intrusions with these techniques with little effort.
Funding Statement
In this paper, the authors did not receive funding from any institution or company and declared
that they do not have any conflict of interest.
References
[1] Wahab, O. A. (2022). Intrusion detection in the IoT under data and concept drifts: Online
deep learning approach. IEEE Internet of Things Journal, 9(20), 19706-19716
[2] Umer, M. A., Junejo, K. N., Jilani, M. T., & Mathur, A. P. (2022). Machine learning for
intrusion detection in industrial control systems: Applications, challenges, and
recommendations. International Journal of Critical Infrastructure Protection, 100516.
https://doi.org/10.1016/j.ijcip.2022.100516
[3] Saveetha, D., & Maragatham, G. (2022). Design of blockchain enabled intrusion detection
model for detecting security attacks using deep learning. Pattern Recognition Letters, 153,
24-28.
[4] Ibrahim, D. S., Mahdi, A. F., & Yas, Q. M. (2021). Challenges and issues for wireless sensor
networks: A survey. Journal of Global Scientific Research, 6(1), 1079-1097.
[5] Rastegari, S., Hingston, P., & Lam, C. P. (2015). Evolving statistical rulesets for network
intrusion detection. Applied Soft Computing, 33, 348-359.
[6] Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of
intrusion detection in Internet of Things. Journal of Network and Computer Applications,
84, 25-37.
24
[7] Mehic, M., Niemiec, M., Rass, S., Ma, J., Peev, M., Aguado, A., Martin, V., Schauer, S.,
Poppe, A., Pacher, C., & Voznak, M. (2020). Quantum key distribution: A networking
perspective. ACM Computing Surveys, 53(5), 1-41.
[8] Aldweesh, A., Derhab, A., & Emam, A. Z. (2020). Deep learning approaches for anomaly-
based intrusion detection systems: A survey, taxonomy, and open issues. Knowledge-Based
Systems, 189, 105124.
[9] Rbah, Y., Mahfoudi, M., Balboul, Y., Fattah, M., Mazer, S., Elbekkali, M., & Bernoussi, B.
(2022, March). Machine learning and deep learning methods for intrusion detection systems
in IoMT: A survey. In 2022 2nd International Conference on Innovative Research in Applied
Science, Engineering and Technology (IRASET) (pp. 1-9). IEEE.
[10] Granjal, J., & Pedroso, A. (2018). An intrusion detection and prevention framework for
internet-integrated CoAP WSN. Security and Communication Networks, 2018.
https://doi.org/10.1155/2018/1753897
[11] Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for
cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of
Information Security and Applications, 50, 102419.
[12] Sivanathan, A. (2020). IoT behavioral monitoring via network traffic analysis. arXiv
preprint arXiv:2001.10632. https://doi.org/10.48550/arXiv.2001.10632
[13] Asadi, S., Gharibzadeh, S., Zangeneh, S., Reihanifar, M., Rahimi, M., & Abdullah, L.
(2024). Comparative analysis of gradient-based optimization techniques using
multidimensional surface 3D visualizations and initial point sensitivity. arXiv preprint,
Article arXiv:2409.04470. https://doi.org/10.48550/arXiv.2409.04470.
[14] Cho, E., Kim, J., & Hong, C. (2009). Attack model and detection scheme for botnet on
6LoWPAN. In: Hong, C., Tonouchi, T., Ma, Y., & Chao, C.-S. (Eds.), Management enabling
the future internet for changing business and new computing services, Lecture Notes in
Computer Science 5787 (pp. 515–518).
[15] Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., & Faruki, P. (2019). Network
intrusion detection for IoT security based on learning techniques. IEEE Communications
Surveys & Tutorials, 21(3), 2671-2701.
[16] Le, A., Loo, J., Chai, K. K., & Aiash, M. (2016). A specification-based IDS for detecting
attacks on RPL-based network topology. Information, 7(2), 25.
25
[17] Misra, S., Krishna, P., Agarwal, H., Saxena, A., & Obaidat, M. (2011). A learning automata-
based solution for preventing Distributed Denial of Service in Internet of Things. In 2011
International Conference on Internet of Things and 4th International Conference on Cyber,
Physical and Social Computing (pp. 114–122).
[18] Salih, A. A., Ameen, S. Y., Zeebaree, S. R., Sadeeq, M. A., Kak, S. F., Omar, N., ... &
Ageed, Z. S. (2021). Deep learning approaches for intrusion detection. Asian Journal of
Research in Computer Science, 50-64.
[19] Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-
based Internet of Things. International Journal of Distributed Sensor Networks, 9(8).
https://doi.org/10.1155/2013/794326
[20] Sommer, R., & Paxson, V. (2010, May). Outside the closed world: On using machine
learning for network intrusion detection. In 2010 IEEE Symposium on Security and Privacy
(pp. 305-316). IEEE.
[21] Amaral, J., Oliveira, L., Rodrigues, J., Han, G., & Shu, L. (2014). Policy and network-based
intrusion detection system for IPv6-enabled wireless sensor networks. In 2014 IEEE
International Conference on Communications (ICC) (pp. 1796–1801). IEEE.
[22] Hagos, D. H., Yazidi, A., Kure, Ø., & Engelstad, P. E. (2017, March). Enhancing security
attacks analysis using regularized machine learning techniques. In 2017 IEEE 31st
International Conference on Advanced Information Networking and Applications (AINA)
(pp. 909-918). IEEE.
[23] Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep
learning approach for Internet of Things. Future Generation Computer Systems, 82, 761-
768.
[24] de Souza, C. A., Westphall, C. B., Machado, R. B., Sobral, J. B. M., & dos Santos Vieira,
G. (2020). Hybrid approach to intrusion detection in fog-based IoT environments. Computer
Networks, 180, 107417.
[25] Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017, September). Evaluating
effectiveness of shallow and deep networks to intrusion detection system. In 2017
International Conference on Advances in Computing, Communications and Informatics
(ICACCI) (pp. 1282-1289). IEEE.
26
[26] Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2015). Intrusion detection in
802.11 networks: Empirical evaluation of threats and a public dataset. IEEE
Communications Surveys & Tutorials, 18(1), 184-208.
[27] Thanthrige, U. S. K. P. M., Samarabandu, J., & Wang, X. (2016, May). Machine learning
techniques for intrusion detection on public dataset. In 2016 IEEE Canadian Conference on
Electrical and Computer Engineering (CCECE) (pp. 1-4). IEEE.
[28] Aminanto, M. E., Tanuwidjaja, H., Yoo, P. D., & Kim, K. (2017, January). Weighted feature
selection techniques for detecting impersonation attack in Wi-Fi networks. In Proc. Symp.
Cryptogr. Inf. Secur. (SCIS) (pp. 1-8).
[29] Kaleem, D., & Ferens, K. (2017, July). A cognitive multi-agent model to detect malicious
threats. In Proceedings of the 2017 International Conference on Applied Cognitive
Computing (ACC’17).
[30] Kwon, Y., Kim, D., Son, Y., Vasserman, E., & Kim, Y. (2017, October). Be selfish and
avoid dilemmas: Fork after withholding (FAW) attacks on bitcoin. In Proceedings of the
2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 195-209).
[31] Bastiaan, M. (2015, January). Preventing the 51%-attack: A stochastic analysis of two phase
proof of work in bitcoin. In Conference on Proof of Work.
[32] Oh, D., Kim, D., & Ro, W. W. (2014). A malicious pattern detection engine for embedded
security systems in the Internet of Things. Sensors, 14(12), 24188–24211.
[33] Belhadi, A., Djenouri, Y., Srivastava, G., Djenouri, D., Lin, J. C. W., & Fortino, G. (2021).
Deep learning for pedestrian collective behavior analysis in smart cities: A model of group
trajectory outlier detection. Information Fusion, 65, 13-20.
[34] Eyal, I., & Sirer, E. G. (2014, March). Majority is not enough: Bitcoin mining is vulnerable.
In International Conference on Financial Cryptography and Data Security (pp. 436-454).
Springer, Berlin, Heidelberg.
[35] Sirer, E. G., & Eyal, I. (2014). How to disincentivize large bitcoin mining pools. Hacking
Distributed Blog Post. http://hackingdistributed.com/2014/06/18/how-to-disincentivize-
large-bitcoin-mining-pools
[36] Kumar, P., Gupta, G. P., & Tripathi, R. (2021). TP2SF: A Trustworthy Privacy-Preserving
Secured Framework for sustainable smart cities by leveraging blockchain and machine
learning. Journal of Systems Architecture, 115, 101954.
27
[37] Bakhsh, S. T., Alghamdi, S., Alsemmeari, R. A., & Hassan, S. R. (2019). An adaptive
intrusion detection and prevention system for Internet of Things. International Journal of
Distributed Sensor Networks, 15(11), 1550147719888109.
[38] Anthi, E., Williams, L., & Burnap, P. (2018). Pulse: An adaptive intrusion detection for the
Internet of Things. Computers & Security, 78, 333-349.
[39] Cho, E. J., Kim, J. H., & Hong, C. S. (2009). Attack model and detection scheme for botnet
on 6LoWPAN. In Asia-Pacific Network Operations and Management Symposium (pp. 515–
518). Springer.
[40] Liu, C., Yang, J., Chen, R., Zhang, Y., & Zeng, J. (2011, July). Research on immunity-based
intrusion detection technology for the Internet of Things. In 2011 Seventh International
Conference on Natural Computation (pp. 212-216). IEEE.
[41] Le, A., Loo, J., Chai, K., & Aiash, M. (2016). A specification-based IDS for detecting attacks
on RPL-based network topology. Information, 7(2), 25.
[42] Misra, S., Krishna, P. V., Agarwal, H., Saxena, A., & Obaidat, M. (2011). A learning
automata-based solution for preventing Distributed Denial of Service in Internet of Things.
In 2011 International Conference on Internet of Things and 4th International Conference on
Cyber, Physical and Social Computing (pp. 114–122).
[43] Far, A. Z., Far, M. Z., Gharibzadeh, S., Zangeneh, S., Amini, L., & Rahimi, M. (2024).
Artificial intelligence for secured information systems in smart cities: Collaborative IoT
computing with deep reinforcement learning and blockchain. arXiv preprint, Article
arXiv:2409.16444. https://doi.org/10.48550/arXiv.2409.16444.
[44] Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-
based Internet of Things. International Journal of Distributed Sensor Networks, 9(8).
[45] Gupta, A., Pandey, O. J., Shukla, M., Dadhich, A., Mathur, S., & Ingle, A. (2013).
Computational intelligence-based intrusion detection systems for wireless communication
and pervasive computing networks. In 2013 IEEE International Conference on
Computational Intelligence and Computing Research (pp. 1-7).
[46] Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-of-Service
detection in 6LoWPAN-based Internet of Things. In 2013 IEEE 9th International
Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
(pp. 600-607).
28
[47] Amaral, J. P., Oliveira, L. M., Rodrigues, J. J., Han, G., & Shu, L. (2014). Policy and
network-based intrusion detection system for IPv6-enabled wireless sensor networks. In
2014 IEEE International Conference on Communications (ICC) (pp. 1796-1801).
[48] Oh, D., Kim, D., & Ro, W. W. (2014). A malicious pattern detection engine for embedded
security systems in the Internet of Things. Sensors, 14(12), 24188–24211.
[49] Lee, T.-H., Wen, C.-H., Chang, L.-H., Chiang, H.-S., & Hsieh, M.-C. (2014). A lightweight
intrusion detection scheme based on energy consumption analysis in 6LowPAN. In
Advanced Technologies, Embedded and Multimedia for Human-centric Computing (pp.
1205-1213). Springer, Dordrecht.
[50] Granjal, J., & Pedroso, A. (2018). An intrusion detection and prevention framework for
internet-integrated CoAP WSN. Security and Communication Networks, 2018, Article ID
1753897. https://doi.org/10.1155/2018/1753897
[51] Krimmling, J., & Peter, S. (2014). Integration and evaluation of intrusion detection for CoAP
in smart city applications. In 2014 IEEE Conference on Communications and Network
Security (pp. 73–78). IEEE.
[52] Cervantes, C., Poplade, D., Nogueira, M., & Santos, A. (2015). Detection of sinkhole attacks
for supporting secure routing on 6LoWPAN for Internet of Things. In 2015 IFIP/IEEE
International Symposium on Integrated Network Management (IM) (pp. 606-611). IEEE.
[53] Summerville, D. H., Zach, K. M., & Chen, Y. (2015). Ultra-lightweight deep packet anomaly
detection for Internet of Things devices. In 2015 IEEE 34th International Performance
Computing and Communications Conference (IPCCC) (pp. 1-8). IEEE.
[54] Thanigaivelan, N. K., Nigussie, E., Kanth, R. K., Virtanen, S., & Isoaho, J. (2016).
Distributed internal anomaly detection system for Internet-of-Things. In 2016 13th IEEE
Annual Consumer Communications & Networking Conference (CCNC) (pp. 319-320).
IEEE.
[55] Pongle, P., & Chavan, G. (2015). Real-time intrusion and wormhole attack detection in
Internet of Things. International Journal of Computer Applications, 121(9), 1-9.
[56] Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of
intrusion detection in Internet of Things. Journal of Network and Computer Applications,
84, 25-37.
29
[57] Rehman, A., Khan, M. M., Lodhi, M. A., & Hussain, F. B. (2016). Rank attack using
objective function in RPL for low power and lossy networks. In 2016 International
Conference on Industrial Informatics and Computer Systems (CIICS) (pp. 1-5). IEEE.
[58] Le, A., Loo, J., Chai, K., & Aiash, M. (2016). A specification-based IDS for detecting attacks
on RPL-based network topology. Information, 7(2), 25.
[59] Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2017). A trust-aware RPL routing protocol to
detect blackhole and selective forwarding attacks. Journal of Telecommunications and the
Digital Economy, 5(1), 50-69.
[60] Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2019). SecTrust-RPL: A secure trust-aware
RPL routing protocol for Internet of Things. Future Generation Computer Systems, 93, 860-
876.
[61] Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-
based Internet of Things. International Journal of Distributed Sensor Networks, 9(8).
[62] Sheikhan, M., & Bostani, H. (2017). A security mechanism for detecting intrusions in
Internet of Things using selected features based on MI-BGSA. International Journal of
Information & Communication Technology Research, 9(2), 53-62.
[63] Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2016). Using the
RPL protocol for supporting passive monitoring in the Internet of Things. In NOMS 2016 -
IEEE/IFIP Network Operations and Management Symposium (pp. 366-374). IEEE.
[64] Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A taxonomy of attacks in RPL-based
Internet of Things. International Journal of Network Security, 18(3), 459-473.
[65] Lee, T.-H., Wen, C.-H., Chang, L.-H., Chiang, H.-S., & Hsieh, M.-C. (2014). A lightweight
intrusion detection scheme based on energy consumption analysis in 6LowPAN. In
Advanced Technologies, Embedded and Multimedia for Human-centric Computing (pp.
1205-1213). Springer, Dordrecht.
[66] Sousa, N., Sobral, J. V., Rodrigues, J. J., Rabêlo, R. A., & Solic, P. (2017). ERAOF: A new
RPL protocol objective function for Internet of Things applications. In 2017 2nd
International Multidisciplinary Conference on Computer and Energy Science (SpliTech)
(pp. 1-5). IEEE.
30
[67] Napiah, M. N., Bin Idris, M. Y. I., Ramli, R., & Ahmedy, I. (2018). Compression header
analyzer intrusion detection system (CHA-IDS) for 6LoWPAN communication protocol.
IEEE Access, 6, 16623-16638.
[68] Farah, N., Avishek, M., Muhammad, F., Rahman, A., Rafni, M., & Md, D. (2015).
Application of machine learning approaches in intrusion detection system: A survey.
International Journal of Advanced Research in Artificial Intelligence, 4(3), 9-18.
[69] Lu, N., Sun, Y., Liu, H., & Li, S. (2018). Intrusion detection system based on evolving rules
for wireless sensor networks. Journal of Sensors, 2018, Article ID 5948146.
https://doi.org/10.1155/2018/5948146
[70] Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
1153-1176.
[71] Alam, F., Mehmood, R., Katib, I., & Albeshri, A. (2016). Analysis of eight data mining
algorithms for smarter Internet of Things (IoT). Procedia Computer Science, 98, 437-442.
[72] Yin, H., & Gai, K. (2015). An empirical study on preprocessing high-dimensional class-
imbalanced data for classification. In 2015 IEEE 17th International Conference on High
Performance Computing and Communications, 2015 IEEE 7th International Symposium on
Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on
Embedded Software and Systems (pp. 1314-1319). IEEE.
[73] Seyfollahi, A., & Ghaffari, A. (2021). A review of intrusion detection systems in RPL
routing protocol based on machine learning for Internet of Things applications. Wireless
Communications and Mobile Computing, 2021, Article ID 6623202.
https://doi.org/10.1155/2021/6623202
[74] Klaine, P. V., Imran, M. A., Onireti, O., & Souza, R. D. (2017). A survey of machine learning
techniques applied to self-organizing cellular networks. IEEE Communications Surveys &
Tutorials, 19(4), 2392-2431.
[75] Ye, H., Liang, L., Li, G. Y., Kim, J., Lu, L., & Wu, M. (2018). Machine learning for vehicular
networks: Recent advances and application examples. IEEE Vehicular Technology
Magazine, 13(2), 94-101.
[76] Sezer, O. B., Dogdu, E., & Ozbayoglu, A. M. (2017). Context-aware computing, learning,
and big data in Internet of Things: A survey. IEEE Internet of Things Journal, 5(1), 1-27.
31
[77] Chen, M., Challita, U., Saad, W., Yin, C., & Debbah, M. (2019). Artificial neural networks-
based machine learning for wireless networks: A tutorial. IEEE Communications Surveys &
Tutorials, 21(4), 3039-3071.
[78] Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., & Faruki, P. (2019). Network
intrusion detection for IoT security based on learning techniques. IEEE Communications
Surveys & Tutorials, 21(3), 2671-2701.
[79] Mohammadi, M., Al-Fuqaha, A., Sorour, S., & Guizani, M. (2018). Deep learning for IoT
big data and streaming analytics: A survey. IEEE Communications Surveys & Tutorials,
20(4), 2923-2960.
[80] Krishna Sharma, S., & Wang, X. (2018). Towards massive machine type communications
in ultra-dense cellular IoT networks: Current issues and machine learning-assisted solutions.
arXiv e-prints, arXiv:1808.
[81] Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
1153-1176.
[82] Fadlullah, Z. M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., & Mizutani, K. (2017).
State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelligent
network traffic control systems. IEEE Communications Surveys & Tutorials, 19(4), 2432-
2455.
[83] Wang, W., Kwasinski, A., Niyato, D., & Han, Z. (2016). A survey on applications of model-
free strategy learning in cognitive wireless networks. IEEE Communications Surveys &
Tutorials, 18(3), 1717-1757.
[84] Nwankwo, C. D., Zhang, L., Quddus, A., Imran, M. A., & Tafazolli, R. (2017). A survey of
self-interference management techniques for single frequency full duplex systems. IEEE
Access, 6, 30242-30268.
[85] Chan, P. K., & Stolfo, S. J. (1996, January). Sharing learned models among remote database
partitions by local meta-learning. In KDD (pp. 2-7).
[86] Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of
the KDD CUP 99 data set. In 2009 IEEE Symposium on Computational Intelligence for
Security and Defense Applications (pp. 1-6). IEEE.
32
[87] Moustafa, N., & Slay, J. (2015, November). UNSW-NB15: A comprehensive data set for
network intrusion detection systems (UNSW-NB15 network data set). In 2015 Military
Communications and Information Systems Conference (MilCIS) (pp. 1-6). IEEE.
[88] Chowdhury, M. M. U., Hammond, F., Konowicz, G., Xin, C., Wu, H., & Li, J. (2017,
October). A few-shot deep learning approach for improved intrusion detection. In 2017 IEEE
8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference
(UEMCON) (pp. 456-462). IEEE.
[89] Eastman, D., & Kumar, S. A. (2017, November). A simulation study to detect attacks on
Internet of Things. In 2017 IEEE 15th International Conference on Dependable, Autonomic
and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl
Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress
(DASC/PiCom/DataCom/CyberSciTech) (pp. 645-650). IEEE.
[90] Ismail, S., Dawoud, D., & Reza, H. (2022, January). A lightweight multilayer machine
learning detection system for cyber-attacks in WSN. In 2022 IEEE 12th Annual Computing
and Communication Workshop and Conference (CCWC) (pp. 0481-0486). IEEE.
[91] Escobar-Chávez, J. J., López-Cervantes, M., Naik, A., Kalia, Y., Quintanar-Guerrero, D., &
Ganem-Quintanar, A. (2006). Applications of thermo-reversible pluronic F-127 gels in
pharmaceutical formulations. Journal of Pharmacy & Pharmaceutical Sciences, 9(3), 339-
358.
[92] Rahimi, M., Songhorabadi, M., & Kashani, M. H. (2020). Fog-based smart homes: A
systematic review. Journal of Network and Computer Applications, 153, 102531.
https://doi.org/10.1016/j.jnca.2020.102531
[93] Songhorabadi, M., Rahimi, M., MoghadamFarid, A., & Kashani, M. H. (2023). Fog
computing approaches in IoT-enabled smart cities. Journal of Network and Computer
Applications, 211, 103557. https://doi.org/10.1016/j.jnca.2023.103557
[94] Songhorabadi, M., Rahimi, M., Farid, A. M. M., & Kashani, M. H. (2020). Fog computing
approaches in smart cities: A state-of-the-art review. arXiv preprint arXiv:2011.14732.
https://doi.org/10.48550/arXiv.2011.14732
[95] Abdalzaher, M. S., Fouda, M. M., Elsayed, H. A., & Salim, M. M. (2023). Toward secured
IoT-based smart systems using machine learning. IEEE Access, 11, 20827-20841.
https://doi.org/10.1109/ACCESS.2023.3250235
[96] Chen, H., & Babar, M. A. (2024). Security for machine learning-based software systems: A
survey of threats, practices, and challenges. ACM Computing Surveys, 56(6), Article 151, 38
pages. https://doi.org/10.1145/3638531
[97] Liu, C., Chen, B., Shao, W., Zhang, C., Wong, K. K. L., & Zhang, Y. (2024). Unraveling
attacks to machine-learning-based IoT systems: A survey and the open libraries behind them.
33
IEEE Internet of Things Journal, 11(11), 19232-19255.
https://doi.org/10.1109/JIOT.2024.3377730
[98] Gaurav, A., Gupta, B. B., & Panigrahi, P. K. (2022). A comprehensive survey on machine
learning approaches for malware detection in IoT-based enterprise information systems.
Enterprise Information Systems, 17(3). https://doi.org/10.1080/17517575.2021.2023764
Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., Ali, I., & Guizani, M. (2020). A
survey of machine and deep learning methods for Internet of Things (IoT) security. IEEE
Communications Surveys & Tutorials, 22(3), 1646-1685.
https://doi.org/10.1109/COMST.2020.2988293
[99] Ahmad, R., & Alsmadi, I. (2021). Machine learning approaches to IoT security: A systematic
literature review. Internet of Things, 14, Article 100365.
https://doi.org/10.1016/j.iot.2021.100365
[100] Kumar, S. V. N., Selvi, M., & Kannan, A. (2023). A comprehensive survey on machine
learning-based intrusion detection systems for secure communication in Internet of Things.
Computational Intelligence and Neuroscience, 2023, Article 8981988, 24 pages.
https://doi.org/10.1155/2023/8981988
[101] Abbas, G., Mehmood, A., Carsten, M., Epiphaniou, G., & Lloret, J. (2022). Safety,
security, and privacy in machine learning-based Internet of Things. Journal of Sensor and
Actuator Networks, 11(3), Article 38. https://doi.org/10.3390/jsan11030038
[102] Aversano, L., Bernardi, M. L., Cimitile, M., & Pecori, R. (2021). A systematic review on
deep learning approaches for IoT security. Computer Science Review, 40, Article 100389.
https://doi.org/10.1016/j.cosrev.2021.100389
[103] Sarker, I. H., Khan, A. I., Abushark, Y. B., & Abushark, M. Y. (2023). Internet of Things
(IoT) security intelligence: A comprehensive overview, machine learning solutions and
research directions. Mobile Networks and Applications, 28, 296-312.
https://doi.org/10.1007/s11036-022-01937-3
34