{"title":"A Survey: Soft Computing for Anomaly Detection to Mitigate IoT Abuse","authors":"Rama Al-Attar, Mouhammd Alkasassbeh, Mu'awya Al-Dala'ien","doi":"10.1109/ICEMIS56295.2022.9914095","DOIUrl":null,"url":null,"abstract":"Internet of things is a group of heterogeneous devices communicating with each other over the internet. There has been a clear increase in the number of IoT devices worldwide, however with this growth and diversity comes the challenge of securing IoT devices. Conventional security mechanisms such as authentication, authorization and encryption are not sufficient, an intrusion detection system is essential to monitor and identify abnormal traffic. In this survey a comparison and analysis are performed on recent literature focused on building an anomaly-based intrusion detection model using the IoTID20 dataset.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Engineering & MIS (ICEMIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEMIS56295.2022.9914095","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Internet of things is a group of heterogeneous devices communicating with each other over the internet. There has been a clear increase in the number of IoT devices worldwide, however with this growth and diversity comes the challenge of securing IoT devices. Conventional security mechanisms such as authentication, authorization and encryption are not sufficient, an intrusion detection system is essential to monitor and identify abnormal traffic. In this survey a comparison and analysis are performed on recent literature focused on building an anomaly-based intrusion detection model using the IoTID20 dataset.