{"title":"物联网入侵检测系统学习技术的前景:系统性文献综述","authors":"Amina Khacha , Zibouda Aliouat , Yasmine Harbi , Chirihane Gherbi , Rafika Saadouni , Saad Harous","doi":"10.1016/j.compeleceng.2024.109725","DOIUrl":null,"url":null,"abstract":"<div><div>The IoT has interconnected devices that collaborate via the Internet. Yet, its widespread connectivity and data generation pose cybersecurity risks. Integrating robust intrusion detection systems (IDSs) into the architecture has become crucial. IDSs safeguard data, detect attacks, and ensure network security and privacy. Constructing anomaly-based intrusion detection systems using artificial intelligence methods, often termed learning techniques, has gained significant traction lately. In this context, this study undertakes a systematic literature review to comprehensively analyze the current landscape of research concerning IoT security, explicitly employing learning techniques. These techniques fall under four primary categories: machine learning, deep learning, transfer learning, and federated learning. From a pool of 646 papers published between 2018 and 2023, we have selected 36 papers encompassing all these techniques based on the keywords of the study. These chosen studies were then categorized based on their respective learning techniques, with an additional hybrid classification that combines federated learning and transfer learning. Moreover, the paper provides a comparative analysis of the studied articles across different dimensions. The research outcomes demonstrate the effectiveness of each learning technique, shed light on the datasets and metrics employed, and conclude with a discussion on open challenges and future recommendations in this domain</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109725"},"PeriodicalIF":4.0000,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review\",\"authors\":\"Amina Khacha , Zibouda Aliouat , Yasmine Harbi , Chirihane Gherbi , Rafika Saadouni , Saad Harous\",\"doi\":\"10.1016/j.compeleceng.2024.109725\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The IoT has interconnected devices that collaborate via the Internet. Yet, its widespread connectivity and data generation pose cybersecurity risks. Integrating robust intrusion detection systems (IDSs) into the architecture has become crucial. IDSs safeguard data, detect attacks, and ensure network security and privacy. Constructing anomaly-based intrusion detection systems using artificial intelligence methods, often termed learning techniques, has gained significant traction lately. In this context, this study undertakes a systematic literature review to comprehensively analyze the current landscape of research concerning IoT security, explicitly employing learning techniques. These techniques fall under four primary categories: machine learning, deep learning, transfer learning, and federated learning. From a pool of 646 papers published between 2018 and 2023, we have selected 36 papers encompassing all these techniques based on the keywords of the study. These chosen studies were then categorized based on their respective learning techniques, with an additional hybrid classification that combines federated learning and transfer learning. Moreover, the paper provides a comparative analysis of the studied articles across different dimensions. The research outcomes demonstrate the effectiveness of each learning technique, shed light on the datasets and metrics employed, and conclude with a discussion on open challenges and future recommendations in this domain</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"120 \",\"pages\":\"Article 109725\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2024-10-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790624006529\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790624006529","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review
The IoT has interconnected devices that collaborate via the Internet. Yet, its widespread connectivity and data generation pose cybersecurity risks. Integrating robust intrusion detection systems (IDSs) into the architecture has become crucial. IDSs safeguard data, detect attacks, and ensure network security and privacy. Constructing anomaly-based intrusion detection systems using artificial intelligence methods, often termed learning techniques, has gained significant traction lately. In this context, this study undertakes a systematic literature review to comprehensively analyze the current landscape of research concerning IoT security, explicitly employing learning techniques. These techniques fall under four primary categories: machine learning, deep learning, transfer learning, and federated learning. From a pool of 646 papers published between 2018 and 2023, we have selected 36 papers encompassing all these techniques based on the keywords of the study. These chosen studies were then categorized based on their respective learning techniques, with an additional hybrid classification that combines federated learning and transfer learning. Moreover, the paper provides a comparative analysis of the studied articles across different dimensions. The research outcomes demonstrate the effectiveness of each learning technique, shed light on the datasets and metrics employed, and conclude with a discussion on open challenges and future recommendations in this domain
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.