{"title":"A review of intrusion detection system and security threat in internet of things enabled environment","authors":"N. Nisha, N. S. Gill, P. Gulia","doi":"10.11591/ijeecs.v35.i1.pp428-435","DOIUrl":null,"url":null,"abstract":"Thousands of devices communicate globally to share data and information without any human intervention. A network of physical objects with numerous sensors and other network hardware to exchange data with servers and additional devices that are linked is referred to as the \"internet of things (IoT)”. The actions hurting the communication system are known as intrusions. Security features such as (integrity, and confidentiality) within IoT networks are compromised when any kind of intrusion occurs. To identify multiple infiltration types in an environment where IoT is enabled, an intrusion detection system (IDS) is required. In environments where IoT is enabled, security vulnerabilities are now more prevalent than ever. In this study, the IoT architecture is reviewed, and potential security risks at each tier are investigated. It is also hoped that this research will stimulate thought about the expanding risks posed by unprotected IoT devices. The paper also intends to provide an in-depth analysis of intrusion detection systems for identifying and classifying security threats in an IoT-enabled environment. Furthermore, this study investigates a variety of efficient machine learning-based methods for detecting cyberattacks on IoT devices.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Indonesian Journal of Electrical Engineering and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11591/ijeecs.v35.i1.pp428-435","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0
Abstract
Thousands of devices communicate globally to share data and information without any human intervention. A network of physical objects with numerous sensors and other network hardware to exchange data with servers and additional devices that are linked is referred to as the "internet of things (IoT)”. The actions hurting the communication system are known as intrusions. Security features such as (integrity, and confidentiality) within IoT networks are compromised when any kind of intrusion occurs. To identify multiple infiltration types in an environment where IoT is enabled, an intrusion detection system (IDS) is required. In environments where IoT is enabled, security vulnerabilities are now more prevalent than ever. In this study, the IoT architecture is reviewed, and potential security risks at each tier are investigated. It is also hoped that this research will stimulate thought about the expanding risks posed by unprotected IoT devices. The paper also intends to provide an in-depth analysis of intrusion detection systems for identifying and classifying security threats in an IoT-enabled environment. Furthermore, this study investigates a variety of efficient machine learning-based methods for detecting cyberattacks on IoT devices.
期刊介绍:
The aim of Indonesian Journal of Electrical Engineering and Computer Science (formerly TELKOMNIKA Indonesian Journal of Electrical Engineering) is to publish high-quality articles dedicated to all aspects of the latest outstanding developments in the field of electrical engineering. Its scope encompasses the applications of Telecommunication and Information Technology, Applied Computing and Computer, Instrumentation and Control, Electrical (Power), Electronics Engineering and Informatics which covers, but not limited to, the following scope: Signal Processing[...] Electronics[...] Electrical[...] Telecommunication[...] Instrumentation & Control[...] Computing and Informatics[...]