{"title":"调查:软计算异常检测以减少物联网滥用","authors":"Rama Al-Attar, Mouhammd Alkasassbeh, Mu'awya Al-Dala'ien","doi":"10.1109/ICEMIS56295.2022.9914095","DOIUrl":null,"url":null,"abstract":"Internet of things is a group of heterogeneous devices communicating with each other over the internet. There has been a clear increase in the number of IoT devices worldwide, however with this growth and diversity comes the challenge of securing IoT devices. Conventional security mechanisms such as authentication, authorization and encryption are not sufficient, an intrusion detection system is essential to monitor and identify abnormal traffic. In this survey a comparison and analysis are performed on recent literature focused on building an anomaly-based intrusion detection model using the IoTID20 dataset.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Survey: Soft Computing for Anomaly Detection to Mitigate IoT Abuse\",\"authors\":\"Rama Al-Attar, Mouhammd Alkasassbeh, Mu'awya Al-Dala'ien\",\"doi\":\"10.1109/ICEMIS56295.2022.9914095\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of things is a group of heterogeneous devices communicating with each other over the internet. There has been a clear increase in the number of IoT devices worldwide, however with this growth and diversity comes the challenge of securing IoT devices. Conventional security mechanisms such as authentication, authorization and encryption are not sufficient, an intrusion detection system is essential to monitor and identify abnormal traffic. In this survey a comparison and analysis are performed on recent literature focused on building an anomaly-based intrusion detection model using the IoTID20 dataset.\",\"PeriodicalId\":191284,\"journal\":{\"name\":\"2022 International Conference on Engineering & MIS (ICEMIS)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Engineering & MIS (ICEMIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEMIS56295.2022.9914095\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Engineering & MIS (ICEMIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEMIS56295.2022.9914095","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey: Soft Computing for Anomaly Detection to Mitigate IoT Abuse
Internet of things is a group of heterogeneous devices communicating with each other over the internet. There has been a clear increase in the number of IoT devices worldwide, however with this growth and diversity comes the challenge of securing IoT devices. Conventional security mechanisms such as authentication, authorization and encryption are not sufficient, an intrusion detection system is essential to monitor and identify abnormal traffic. In this survey a comparison and analysis are performed on recent literature focused on building an anomaly-based intrusion detection model using the IoTID20 dataset.