基于ML和DL的物联网入侵检测系统综述

Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio
{"title":"基于ML和DL的物联网入侵检测系统综述","authors":"Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio","doi":"10.1109/iCoMET57998.2023.10099142","DOIUrl":null,"url":null,"abstract":"The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL\",\"authors\":\"Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio\",\"doi\":\"10.1109/iCoMET57998.2023.10099142\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.\",\"PeriodicalId\":369792,\"journal\":{\"name\":\"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iCoMET57998.2023.10099142\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iCoMET57998.2023.10099142","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

智能传感器和家用电器等物联网技术的快速扩张可能会产生深远的影响。连接性、无处不在的存在和低计算能力是物联网设备的标志。物联网设备的全球数量正在上升。由于这些设备的激增,基于物联网的网络攻击事件有所增加,这比使用台式电脑要容易得多。需要新的方法来识别从受损物联网设备发起的攻击,以帮助解决这一问题。在这种情况下,对来自物联网设备的攻击进行检测控制的最有效方法是ML和DL技术的应用。本研究的主要目的是提供入侵检测模型的概述,以及由受损的物联网设备对物联网系统造成的威胁的全面审查。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL
The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信