A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions
Authors
Keywords
-
Journal
Electronics
Volume 9, Issue 7, Pages 1177
Publisher
MDPI AG
Online
2020-07-20
DOI
10.3390/electronics9071177
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Review: machine learning techniques applied to cybersecurity
- (2019) Javier Martínez Torres et al. International Journal of Machine Learning and Cybernetics
- Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset
- (2019) Nickolaos Koroniotis et al. Future Generation Computer Systems-The International Journal of eScience
- A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications
- (2019) Sahil Garg et al. Future Generation Computer Systems-The International Journal of eScience
- Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog
- (2019) Nour Moustafa et al. IEEE Transactions on Information Forensics and Security
- SDN-Based Secure and Privacy-Preserving Scheme for Vehicular Networks: A 5G Perspective
- (2019) Sahil Garg et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks
- (2019) Sahil Garg et al. IEEE Transactions on Network and Service Management
- Deep recurrent neural network for IoT intrusion detection system
- (2019) Muder Almiani et al. SIMULATION MODELLING PRACTICE AND THEORY
- Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment
- (2019) M. Mayuranathan et al. Journal of Ambient Intelligence and Humanized Computing
- A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks
- (2019) Marwa Keshk et al. IEEE Transactions on Industrial Informatics
- Nearest neighbors based density peaks approach to intrusion detection
- (2018) Lixiang Li et al. CHAOS SOLITONS & FRACTALS
- Internet of things security: A top-down survey
- (2018) Djamel Eddine Kouicem et al. Computer Networks
- Security threats in Bluetooth technology
- (2018) Shaikh Shahriar Hassan et al. COMPUTERS & SECURITY
- Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: State of the art and research challenges
- (2018) Henry Friday Nweke et al. EXPERT SYSTEMS WITH APPLICATIONS
- Secure integration of IoT and Cloud Computing
- (2018) Christos Stergiou et al. Future Generation Computer Systems-The International Journal of eScience
- A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Towards Universal and Resilient Systems
- (2018) Elhadj Benkhelifa et al. IEEE Communications Surveys and Tutorials
- A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- (2018) Preeti Mishra et al. IEEE Communications Surveys and Tutorials
- Deep Learning for IoT Big Data and Streaming Analytics: A Survey
- (2018) Mehdi Mohammadi et al. IEEE Communications Surveys and Tutorials
- Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing
- (2018) He Li et al. IEEE NETWORK
- A survey on deep learning for big data
- (2018) Qingchen Zhang et al. Information Fusion
- The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved
- (2018) Wei Zhou et al. IEEE Internet of Things Journal
- IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?
- (2018) Liang Xiao et al. IEEE SIGNAL PROCESSING MAGAZINE
- An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things
- (2018) Nour Moustafa et al. IEEE Internet of Things Journal
- Network Intrusion Detection Method Based on PCA and Bayes Algorithm
- (2018) Bing Zhang et al. Security and Communication Networks
- Privacy-preserving big data analytics for cyber-physical systems
- (2018) Marwa Keshk et al. WIRELESS NETWORKS
- State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems
- (2017) Zubair Md. Fadlullah et al. IEEE Communications Surveys and Tutorials
- A survey of intrusion detection in Internet of Things
- (2017) Bruno Bogaz Zarpelão et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Internet of Things security: A survey
- (2017) Fadele Ayotunde Alaba et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Novel Kernel SVM Algorithm with Game Theory for Network Intrusion Detection
- (2017) KSII Transactions on Internet and Information Systems
- A novel SVM-kNN-PSO ensemble method for intrusion detection system
- (2016) Abdulla Amin Aburomman et al. APPLIED SOFT COMPUTING
- OCPAD: One class Naive Bayes classifier for payload based anomaly detection
- (2016) Mayank Swarnkar et al. EXPERT SYSTEMS WITH APPLICATIONS
- Integration of Cloud computing and Internet of Things: A survey
- (2016) Alessio Botta et al. Future Generation Computer Systems-The International Journal of eScience
- Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
- (2016) Constantinos Kolias et al. IEEE Communications Surveys and Tutorials
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- Learning Internet-of-Things Security "Hands-On"
- (2016) Constantinos Kolias et al. IEEE SECURITY & PRIVACY
- A Lightweight Authenticated Communication Scheme for Smart Grid
- (2016) Yining Liu et al. IEEE SENSORS JOURNAL
- Reference Architectures for the Internet of Things
- (2016) Michael Weyrich et al. IEEE SOFTWARE
- Efficient k NN classification algorithm for big data
- (2016) Zhenyun Deng et al. NEUROCOMPUTING
- Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
- (2016) Sunil Kumar et al. Security and Communication Networks
- The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction
- (2016) Sandip Ray et al. IEEE Design & Test
- Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices
- (2016) Riham Altawy et al. IEEE Access
- A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
- (2016) Hamed Haddad Pajouh et al. IEEE Transactions on Emerging Topics in Computing
- Security, privacy and trust in Internet of Things: The road ahead
- (2015) S. Sicari et al. Computer Networks
- Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
- (2015) Jorge Granjal et al. IEEE Communications Surveys and Tutorials
- Android Security: A Survey of Issues, Malware Penetration, and Defenses
- (2015) Parvez Faruki et al. IEEE Communications Surveys and Tutorials
- Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism
- (2015) Ramsha Rizwan et al. International Journal of Distributed Sensor Networks
- Deep learning
- (2015) Yann LeCun et al. NATURE
- The emerging field of mobile health
- (2015) Steven R. Steinhubl et al. Science Translational Medicine
- Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism
- (2015) Ramsha Rizwan et al. International Journal of Distributed Sensor Networks
- A survey of intrusion detection techniques for cyber-physical systems
- (2014) Robert Mitchell et al. ACM COMPUTING SURVEYS
- A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things
- (2014) Doohwan Oh et al. SENSORS
- Security of the Internet of Things: perspectives and challenges
- (2014) Qi Jing et al. WIRELESS NETWORKS
- Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm
- (2014) Kuan-Cheng Lin et al. Journal of Applied Mathematics
- Big Data Deep Learning: Challenges and Perspectives
- (2014) Xue-Wen Chen et al. IEEE Access
- SVELTE: Real-time intrusion detection in the Internet of Things
- (2013) Shahid Raza et al. Ad Hoc Networks
- A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
- (2013) Gisung Kim et al. EXPERT SYSTEMS WITH APPLICATIONS
- On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
- (2013) Abror Abduvaliyev et al. IEEE Communications Surveys and Tutorials
- Context Aware Computing for The Internet of Things: A Survey
- (2013) Charith Perera et al. IEEE Communications Surveys and Tutorials
- Network Anomaly Detection: Methods, Systems and Tools
- (2013) Monowar H. Bhuyan et al. IEEE Communications Surveys and Tutorials
- A Survey of Intrusion Detection Systems in Wireless Sensor Networks
- (2013) Ismail Butun et al. IEEE Communications Surveys and Tutorials
- A survey of multiple classifier systems as hybrid systems
- (2013) Michał Woźniak et al. Information Fusion
- Network anomaly detection with the restricted Boltzmann machine
- (2013) Ugo Fiore et al. NEUROCOMPUTING
- A few useful things to know about machine learning
- (2012) Pedro Domingos COMMUNICATIONS OF THE ACM
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
- A survey of intrusion detection techniques in Cloud
- (2012) Chirag Modi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Decision trees: a recent overview
- (2011) S. B. Kotsiantis ARTIFICIAL INTELLIGENCE REVIEW
- Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems
- (2011) Ayan Banerjee et al. PROCEEDINGS OF THE IEEE
- The Internet of Things: A survey
- (2010) Luigi Atzori et al. Computer Networks
- Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers
- (2010) Ming-Yang Su EXPERT SYSTEMS WITH APPLICATIONS
- A survey on security issues in service delivery models of cloud computing
- (2010) S. Subashini et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Securing wireless implantable devices for healthcare: Ideas and challenges
- (2009) K. Malasri et al. IEEE COMMUNICATIONS MAGAZINE
- Data clustering: 50 years beyond K-means
- (2009) Anil K. Jain PATTERN RECOGNITION LETTERS
- Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
- (2008) Kemal Bicakci et al. COMPUTER STANDARDS & INTERFACES
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started