Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A SURVEY OF INTRUSION DETECTION SYSTEMS IN IOT: MACHINE LEARNING AND FEATURE SELECTION APPROACHES

View through CrossRef
The Internet of Things (IoT) enables automation and seamless data flow by connecting billions of devices across multiple industries. However, this networked environment also poses serious security risks, including denial-of-service attacks, unauthorized access, and data leaks. Intrusion Detection Systems (IDS) are essential for protecting IoT networks by detecting and halting malicious activity. This paper offers a comprehensive analysis of IDS created for IoT environments, looking at advancements, challenges, and possible patterns from 2020 to 2024. Hybrid IDS models have been created by combining multiple strategies to improve detection accuracy, scalability, and efficacy. While lightweight IDS frameworks balance robust security performance with the resource limitations of IoT devices, feature selection techniques further optimize these systems by reducing computational overhead. With some frameworks nearly reaching peak performance, deep learning and machine learning techniques have shown remarkable accuracy, often surpassing 95%. However, critical metrics like F1-score, accuracy, precision, and recall need to be carefully considered in order to assess these systems. This work also compares its results with popular datasets, such as NSL-KDD, CICIDS2017, UNSW-NB15, and Bot-IoT, among others, to enable meaningful comparisons between various IDS models. Emerging research employs synthetic data creation techniques to address problems like class imbalance, even as domain-specific IDS solutions for cloud-based IoT, industrial, and medical applications gain popularity. Despite these developments, there are still significant challenges, including the need for real-time flexibility and computational overhead. Finally, future research will probably focus on combining state-of-the-art artificial intelligence techniques like supervised and unsupervised learning to create adaptive, lightweight, and privacy-preserving IDS for IoT environments.
Title: A SURVEY OF INTRUSION DETECTION SYSTEMS IN IOT: MACHINE LEARNING AND FEATURE SELECTION APPROACHES
Description:
The Internet of Things (IoT) enables automation and seamless data flow by connecting billions of devices across multiple industries.
However, this networked environment also poses serious security risks, including denial-of-service attacks, unauthorized access, and data leaks.
Intrusion Detection Systems (IDS) are essential for protecting IoT networks by detecting and halting malicious activity.
This paper offers a comprehensive analysis of IDS created for IoT environments, looking at advancements, challenges, and possible patterns from 2020 to 2024.
Hybrid IDS models have been created by combining multiple strategies to improve detection accuracy, scalability, and efficacy.
While lightweight IDS frameworks balance robust security performance with the resource limitations of IoT devices, feature selection techniques further optimize these systems by reducing computational overhead.
With some frameworks nearly reaching peak performance, deep learning and machine learning techniques have shown remarkable accuracy, often surpassing 95%.
However, critical metrics like F1-score, accuracy, precision, and recall need to be carefully considered in order to assess these systems.
This work also compares its results with popular datasets, such as NSL-KDD, CICIDS2017, UNSW-NB15, and Bot-IoT, among others, to enable meaningful comparisons between various IDS models.
Emerging research employs synthetic data creation techniques to address problems like class imbalance, even as domain-specific IDS solutions for cloud-based IoT, industrial, and medical applications gain popularity.
Despite these developments, there are still significant challenges, including the need for real-time flexibility and computational overhead.
Finally, future research will probably focus on combining state-of-the-art artificial intelligence techniques like supervised and unsupervised learning to create adaptive, lightweight, and privacy-preserving IDS for IoT environments.

Related Results

Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling development of future cities that are inherently sustainable. Intrusion detection for suc...
Clustering model for the first line of defense in IDS for IoT
Clustering model for the first line of defense in IDS for IoT
The Internet of Things (IoT) applications are prone to security attacks due to their distributed nature. Intrusion detection systems are the prominent security devices used to prot...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
Review of Adaptive Deep Learning Approaches for Intrusion Detection in IoT Network
Review of Adaptive Deep Learning Approaches for Intrusion Detection in IoT Network
As the Internet of Things (IoT) ecosystem continues to expand, the security of IoT networks becomes an increasingly critical concern. The vast and interconnected nature of IoT devi...
Selection Gradients
Selection Gradients
Natural selection and sexual selection are important evolutionary processes that can shape the phenotypic distributions of natural populations and, consequently, a primary goal of ...

Back to Top