Ruhma Sardar, Tayyaba Anees, Ahmad Sami Al-Shamayleh, Erum Mehmood, Wajeeha Khalil, Adnan Akhunzada, Fatema Sabeen Shaikh
{"title":"Challenges in detecting security threats in WoT: a systematic literature review","authors":"Ruhma Sardar, Tayyaba Anees, Ahmad Sami Al-Shamayleh, Erum Mehmood, Wajeeha Khalil, Adnan Akhunzada, Fatema Sabeen Shaikh","doi":"10.1007/s10462-025-11176-z","DOIUrl":null,"url":null,"abstract":"<div><p>The rapid expansion of the Web of Things (WoT) and the Internet of Things (IoT) has raised security issues, with Denial of Service (DoS) attacks becoming increasingly prevalent. So, the aim of this study is to identify the security concerns in the four architectural layers of the Web of Things, particularly DoS attacks. For this study, existing literature are identified using search queries, and approximately 80 of relevant primary papers published in the recent decade are obtained after a thorough review which helps in addressing our research questions. After finding the relevant primary studies, we applied strict quality evaluation criteria to verify that all studies are evaluated. In addition, a taxonomy of deep learning (DL) techniques is presented on the basis of literature analysis conducted in this research, which is then used to characterize the various security concerns that occur in IoT and WoT systems. The study also examines which DL approaches are used to detect DoS/DDoS attacks in IoT and WoT. Our findings indicate that the optimal form of Intrusion Detection System (IDS) for dealing with DoS attacks is a hybrid IDS, which uses both the signature-based and the anomaly-based IDS. Moreover, DL techniques such as, CNNs and LSTMs, produced excellent results but are still in the development stage in terms of scalability and practical use. This review further highlights the present state of security mechanisms and sets the basis for future research, with an emphasis on refining DL-based techniques and improving the scalability and adaptability of security systems for WoT networks.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 7","pages":""},"PeriodicalIF":10.7000,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-025-11176-z.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Artificial Intelligence Review","FirstCategoryId":"94","ListUrlMain":"https://link.springer.com/article/10.1007/s10462-025-11176-z","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
The rapid expansion of the Web of Things (WoT) and the Internet of Things (IoT) has raised security issues, with Denial of Service (DoS) attacks becoming increasingly prevalent. So, the aim of this study is to identify the security concerns in the four architectural layers of the Web of Things, particularly DoS attacks. For this study, existing literature are identified using search queries, and approximately 80 of relevant primary papers published in the recent decade are obtained after a thorough review which helps in addressing our research questions. After finding the relevant primary studies, we applied strict quality evaluation criteria to verify that all studies are evaluated. In addition, a taxonomy of deep learning (DL) techniques is presented on the basis of literature analysis conducted in this research, which is then used to characterize the various security concerns that occur in IoT and WoT systems. The study also examines which DL approaches are used to detect DoS/DDoS attacks in IoT and WoT. Our findings indicate that the optimal form of Intrusion Detection System (IDS) for dealing with DoS attacks is a hybrid IDS, which uses both the signature-based and the anomaly-based IDS. Moreover, DL techniques such as, CNNs and LSTMs, produced excellent results but are still in the development stage in terms of scalability and practical use. This review further highlights the present state of security mechanisms and sets the basis for future research, with an emphasis on refining DL-based techniques and improving the scalability and adaptability of security systems for WoT networks.
期刊介绍:
Artificial Intelligence Review, a fully open access journal, publishes cutting-edge research in artificial intelligence and cognitive science. It features critical evaluations of applications, techniques, and algorithms, providing a platform for both researchers and application developers. The journal includes refereed survey and tutorial articles, along with reviews and commentary on significant developments in the field.