Challenges in detecting security threats in WoT: a systematic literature review

IF 10.7 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Ruhma Sardar, Tayyaba Anees, Ahmad Sami Al-Shamayleh, Erum Mehmood, Wajeeha Khalil, Adnan Akhunzada, Fatema Sabeen Shaikh
{"title":"Challenges in detecting security threats in WoT: a systematic literature review","authors":"Ruhma Sardar,&nbsp;Tayyaba Anees,&nbsp;Ahmad Sami Al-Shamayleh,&nbsp;Erum Mehmood,&nbsp;Wajeeha Khalil,&nbsp;Adnan Akhunzada,&nbsp;Fatema Sabeen Shaikh","doi":"10.1007/s10462-025-11176-z","DOIUrl":null,"url":null,"abstract":"<div><p>The rapid expansion of the Web of Things (WoT) and the Internet of Things (IoT) has raised security issues, with Denial of Service (DoS) attacks becoming increasingly prevalent. So, the aim of this study is to identify the security concerns in the four architectural layers of the Web of Things, particularly DoS attacks. For this study, existing literature are identified using search queries, and approximately 80 of relevant primary papers published in the recent decade are obtained after a thorough review which helps in addressing our research questions. After finding the relevant primary studies, we applied strict quality evaluation criteria to verify that all studies are evaluated. In addition, a taxonomy of deep learning (DL) techniques is presented on the basis of literature analysis conducted in this research, which is then used to characterize the various security concerns that occur in IoT and WoT systems. The study also examines which DL approaches are used to detect DoS/DDoS attacks in IoT and WoT. Our findings indicate that the optimal form of Intrusion Detection System (IDS) for dealing with DoS attacks is a hybrid IDS, which uses both the signature-based and the anomaly-based IDS. Moreover, DL techniques such as, CNNs and LSTMs, produced excellent results but are still in the development stage in terms of scalability and practical use. This review further highlights the present state of security mechanisms and sets the basis for future research, with an emphasis on refining DL-based techniques and improving the scalability and adaptability of security systems for WoT networks.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 7","pages":""},"PeriodicalIF":10.7000,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-025-11176-z.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Artificial Intelligence Review","FirstCategoryId":"94","ListUrlMain":"https://link.springer.com/article/10.1007/s10462-025-11176-z","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid expansion of the Web of Things (WoT) and the Internet of Things (IoT) has raised security issues, with Denial of Service (DoS) attacks becoming increasingly prevalent. So, the aim of this study is to identify the security concerns in the four architectural layers of the Web of Things, particularly DoS attacks. For this study, existing literature are identified using search queries, and approximately 80 of relevant primary papers published in the recent decade are obtained after a thorough review which helps in addressing our research questions. After finding the relevant primary studies, we applied strict quality evaluation criteria to verify that all studies are evaluated. In addition, a taxonomy of deep learning (DL) techniques is presented on the basis of literature analysis conducted in this research, which is then used to characterize the various security concerns that occur in IoT and WoT systems. The study also examines which DL approaches are used to detect DoS/DDoS attacks in IoT and WoT. Our findings indicate that the optimal form of Intrusion Detection System (IDS) for dealing with DoS attacks is a hybrid IDS, which uses both the signature-based and the anomaly-based IDS. Moreover, DL techniques such as, CNNs and LSTMs, produced excellent results but are still in the development stage in terms of scalability and practical use. This review further highlights the present state of security mechanisms and sets the basis for future research, with an emphasis on refining DL-based techniques and improving the scalability and adaptability of security systems for WoT networks.

求助全文
约1分钟内获得全文 求助全文
来源期刊
Artificial Intelligence Review
Artificial Intelligence Review 工程技术-计算机:人工智能
CiteScore
22.00
自引率
3.30%
发文量
194
审稿时长
5.3 months
期刊介绍: Artificial Intelligence Review, a fully open access journal, publishes cutting-edge research in artificial intelligence and cognitive science. It features critical evaluations of applications, techniques, and algorithms, providing a platform for both researchers and application developers. The journal includes refereed survey and tutorial articles, along with reviews and commentary on significant developments in the field.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信