A Review of Intrusion Detection System in IoT with Machine Learning Approach: Current and Future Research

E. Nugroho, Taufik Djatna, I. S. Sitanggang, A. Buono, I. Hermadi
{"title":"A Review of Intrusion Detection System in IoT with Machine Learning Approach: Current and Future Research","authors":"E. Nugroho, Taufik Djatna, I. S. Sitanggang, A. Buono, I. Hermadi","doi":"10.1109/ICSITech49800.2020.9392075","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) devices with their network services are often vulnerable to attacks because they are not designed for security. Especially with the rapid technological advances that make data increase exponentially. This is targeted by malicious users to exploit vulnerabilities or interfere with many vulnerability attacks. Therefore, deal with this vulnerability, an intrusion detection system that involves machine learning techniques is needed. Intrusion Detection System (IDS) is targeted to get intrusion in a communication system by looking at the IDS types and methods. This is influenced by the characteristics of the IoT network involved and the reference dataset used in the detection system. This dataset determines the categories or classes of attacks upon which the IDS decides whether or not to intrusion. Reference databases that already exist and are often used, such as KDD Cup 99, NSL KDD, and attack datasets obtained from conditions. In developing IDS in IoT Device, the Machine Learning approach can be used to solve the type of algorithm used consisting of supervised learning, unsupervised learning, or Reinforcement learning. These algorithm methods can be used include SVM, Decision Tree, K-NN, ANN, RNN, and others. From the review analysis of dominant research conducted in 2015–2020, the largest percentage was obtained using the artificial neural network and deep learning algorithm for the intrusion classification process, with details of 16% ANN, 12% RNN, and DNN.","PeriodicalId":408532,"journal":{"name":"2020 6th International Conference on Science in Information Technology (ICSITech)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 6th International Conference on Science in Information Technology (ICSITech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSITech49800.2020.9392075","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Internet of Things (IoT) devices with their network services are often vulnerable to attacks because they are not designed for security. Especially with the rapid technological advances that make data increase exponentially. This is targeted by malicious users to exploit vulnerabilities or interfere with many vulnerability attacks. Therefore, deal with this vulnerability, an intrusion detection system that involves machine learning techniques is needed. Intrusion Detection System (IDS) is targeted to get intrusion in a communication system by looking at the IDS types and methods. This is influenced by the characteristics of the IoT network involved and the reference dataset used in the detection system. This dataset determines the categories or classes of attacks upon which the IDS decides whether or not to intrusion. Reference databases that already exist and are often used, such as KDD Cup 99, NSL KDD, and attack datasets obtained from conditions. In developing IDS in IoT Device, the Machine Learning approach can be used to solve the type of algorithm used consisting of supervised learning, unsupervised learning, or Reinforcement learning. These algorithm methods can be used include SVM, Decision Tree, K-NN, ANN, RNN, and others. From the review analysis of dominant research conducted in 2015–2020, the largest percentage was obtained using the artificial neural network and deep learning algorithm for the intrusion classification process, with details of 16% ANN, 12% RNN, and DNN.
基于机器学习方法的物联网入侵检测系统综述:当前与未来研究
物联网(IoT)设备及其网络服务往往容易受到攻击,因为它们不是为安全而设计的。特别是随着技术的快速发展,数据呈指数级增长。这是恶意用户利用漏洞或干扰许多漏洞攻击的目标。因此,针对这一漏洞,需要一个涉及机器学习技术的入侵检测系统。通过分析入侵检测系统的类型和方法,对通信系统进行入侵检测。这受到所涉及的物联网网络特性和检测系统中使用的参考数据集的影响。该数据集确定IDS决定是否入侵的攻击类别或类别。已经存在并且经常使用的参考数据库,如KDD Cup 99、NSL KDD、从条件中获得的攻击数据集。在物联网设备中开发IDS时,机器学习方法可用于解决由监督学习、无监督学习或强化学习组成的算法类型。这些算法方法可用于支持向量机,决策树,K-NN, ANN, RNN等。从2015-2020年的主流研究综述分析来看,人工神经网络和深度学习算法在入侵分类过程中所占的比例最大,ANN占16%,RNN占12%,DNN占12%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信