Challenges in detecting security threats in WoT: a systematic literature review

IF 10.7 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Ruhma Sardar, Tayyaba Anees, Ahmad Sami Al-Shamayleh, Erum Mehmood, Wajeeha Khalil, Adnan Akhunzada, Fatema Sabeen Shaikh
{"title":"Challenges in detecting security threats in WoT: a systematic literature review","authors":"Ruhma Sardar,&nbsp;Tayyaba Anees,&nbsp;Ahmad Sami Al-Shamayleh,&nbsp;Erum Mehmood,&nbsp;Wajeeha Khalil,&nbsp;Adnan Akhunzada,&nbsp;Fatema Sabeen Shaikh","doi":"10.1007/s10462-025-11176-z","DOIUrl":null,"url":null,"abstract":"<div><p>The rapid expansion of the Web of Things (WoT) and the Internet of Things (IoT) has raised security issues, with Denial of Service (DoS) attacks becoming increasingly prevalent. So, the aim of this study is to identify the security concerns in the four architectural layers of the Web of Things, particularly DoS attacks. For this study, existing literature are identified using search queries, and approximately 80 of relevant primary papers published in the recent decade are obtained after a thorough review which helps in addressing our research questions. After finding the relevant primary studies, we applied strict quality evaluation criteria to verify that all studies are evaluated. In addition, a taxonomy of deep learning (DL) techniques is presented on the basis of literature analysis conducted in this research, which is then used to characterize the various security concerns that occur in IoT and WoT systems. The study also examines which DL approaches are used to detect DoS/DDoS attacks in IoT and WoT. Our findings indicate that the optimal form of Intrusion Detection System (IDS) for dealing with DoS attacks is a hybrid IDS, which uses both the signature-based and the anomaly-based IDS. Moreover, DL techniques such as, CNNs and LSTMs, produced excellent results but are still in the development stage in terms of scalability and practical use. This review further highlights the present state of security mechanisms and sets the basis for future research, with an emphasis on refining DL-based techniques and improving the scalability and adaptability of security systems for WoT networks.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 7","pages":""},"PeriodicalIF":10.7000,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-025-11176-z.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Artificial Intelligence Review","FirstCategoryId":"94","ListUrlMain":"https://link.springer.com/article/10.1007/s10462-025-11176-z","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid expansion of the Web of Things (WoT) and the Internet of Things (IoT) has raised security issues, with Denial of Service (DoS) attacks becoming increasingly prevalent. So, the aim of this study is to identify the security concerns in the four architectural layers of the Web of Things, particularly DoS attacks. For this study, existing literature are identified using search queries, and approximately 80 of relevant primary papers published in the recent decade are obtained after a thorough review which helps in addressing our research questions. After finding the relevant primary studies, we applied strict quality evaluation criteria to verify that all studies are evaluated. In addition, a taxonomy of deep learning (DL) techniques is presented on the basis of literature analysis conducted in this research, which is then used to characterize the various security concerns that occur in IoT and WoT systems. The study also examines which DL approaches are used to detect DoS/DDoS attacks in IoT and WoT. Our findings indicate that the optimal form of Intrusion Detection System (IDS) for dealing with DoS attacks is a hybrid IDS, which uses both the signature-based and the anomaly-based IDS. Moreover, DL techniques such as, CNNs and LSTMs, produced excellent results but are still in the development stage in terms of scalability and practical use. This review further highlights the present state of security mechanisms and sets the basis for future research, with an emphasis on refining DL-based techniques and improving the scalability and adaptability of security systems for WoT networks.

在WoT中检测安全威胁的挑战:系统的文献回顾
物联网(WoT)和物联网(IoT)的快速扩张引发了安全问题,拒绝服务(DoS)攻击变得越来越普遍。因此,本研究的目的是确定物联网四个架构层中的安全问题,特别是DoS攻击。在本研究中,使用搜索查询来识别现有文献,并在彻底审查后获得了近十年发表的大约80篇相关主要论文,这有助于解决我们的研究问题。在找到相关的初步研究后,我们采用严格的质量评价标准来验证所有的研究都得到了评价。此外,在本研究中进行的文献分析的基础上,提出了深度学习(DL)技术的分类,然后用于表征物联网和坦克世界系统中出现的各种安全问题。该研究还研究了哪些深度学习方法用于检测物联网和WoT中的DoS/DDoS攻击。我们的研究结果表明,处理DoS攻击的入侵检测系统(IDS)的最佳形式是混合入侵检测系统,它同时使用基于签名的入侵检测和基于异常的入侵检测。此外,深度学习技术(如cnn和lstm)取得了优异的成绩,但在可扩展性和实际应用方面仍处于发展阶段。这篇综述进一步强调了安全机制的现状,并为未来的研究奠定了基础,重点是改进基于dl的技术,提高WoT网络安全系统的可扩展性和适应性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Artificial Intelligence Review
Artificial Intelligence Review 工程技术-计算机:人工智能
CiteScore
22.00
自引率
3.30%
发文量
194
审稿时长
5.3 months
期刊介绍: Artificial Intelligence Review, a fully open access journal, publishes cutting-edge research in artificial intelligence and cognitive science. It features critical evaluations of applications, techniques, and algorithms, providing a platform for both researchers and application developers. The journal includes refereed survey and tutorial articles, along with reviews and commentary on significant developments in the field.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信