1,962
Views
1
CrossRef citations to date
0
Altmetric
Review

Anomaly Detection for Cyber Internet of Things Attacks: A Systematic Review

, , , &
Article: 2137639 | Received 04 Jun 2022, Accepted 13 Oct 2022, Published online: 05 Dec 2022

References

  • Aljawarneh, S. A., and R. Vangipuram. 2018. GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things. The Journal of Supercomputing 76 (6):1–3263. doi:10.1007/s11227-018-2397-3.
  • Al-Makhadmeh, Z., and A. Tolba. 2019. Utilizing IoT wearable medical device for heart disease prediction using higher order Boltzmann model: A classification approach. Measurement 147:106815. doi:10.1016/j.measurement.2019.07.043.
  • Babar, M., and F. Arif. 2017. Smart urban planning using big data analytics to contend with the interoperability in internet of things. Future Generation Computer Systems 77:65–76. doi:10.1016/j.future.2017.07.029.
  • Baig, Z. A., S. Sanguanpong, S. N. Firdous, T. G. Nguyen, and C. So-In. 2020. Averaged dependence estimators for DoS attack detection in IoT networks. Future Generation Computer Systems 102:198–209. doi:10.1016/j.future.2019.08.007.
  • Bhatia, M., and S. K. Sood. 2017. A comprehensive health assessment framework to facilitate IoT-assisted smart workouts: A predictive healthcare perspective. Computers in Industry 92:50–66. doi:10.1016/j.compind.2017.06.009.
  • Bhattacharya, S., D. Manousakas, A. G. C. P. Ramos, S. I. Venieris, N. D. Lane, and C. Mascolo. 2020. Countering acoustic adversarial attacks in microphone-equipped smart home devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4 (2):1–24. doi:10.1145/3397332.
  • Čolaković, A., and M. Hadžialić. 2018. Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Computer Networks 144:17–39. doi:10.1016/j.comnet.2018.07.017.
  • Das, A. K., S. Zeadally, and D. He. 2018. Taxonomy and analysis of security protocols for Internet of Things. Future Generation Computer Systems 89:110–25. doi:10.1016/j.future.2018.06.027.
  • Demertzis, K., L. Iliadis, N. Tziritas, and P. Kikiras. 2020. Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Computing & Applications 32 (23):17361–78. doi:10.1007/s00521-020-05189-8.
  • Diro, A. A., and N. Chilamkurti. 2018. Distributed attack detection scheme using deep learning approach for internet of things. Future Generation Computer Systems 82:761–68. doi:10.1016/j.future.2017.08.043.
  • Elazhary, H. 2019. Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. Journal of Network and Computer Applications 128:105–40. doi:10.1016/j.jnca.2018.10.021.
  • Elrawy, M. F., A. I. Awad, and H. F. A. Hamed. 2018. Intrusion detection systems for IoT-based smart environments: A survey. Journal of Cloud Computing 7 (1):21. doi:10.1186/s13677-018-0123-6.
  • Fisher, P. S., J. James, J. Baek, and C. Kim. 2018. Mining intelligent solution to compensate missing data context of medical IoT devices. Personal and Ubiquitous Computing 22 (1):219–24. doi:10.1007/s00779-017-1106-1.
  • Geng, T., and Y. Du. 2020. The business model of intelligent manufacturing with internet of things and machine learning. Enterprise Information Systems 1–19.
  • Grammatikis, P. I. R., P. G. Sarigiannidis, and I. D. Moscholios. 2019. Securing the internet of things: Challenges, threats and solutions. Internet of Things 5:41–70. doi:10.1016/j.iot.2018.11.003.
  • Gupta, S. K., A. Gunasekaran, J. Antony, S. Gupta, S. Bag, and D. Roubaud. 2019. Systematic literature review of project failures: Current trends and scope for future research. Computers & Industrial Engineering 127:274–85. doi:10.1016/j.cie.2018.12.002.
  • Han, T., et al. 2020. An efficient deep learning framework for intelligent energy management in IoT networks. IEEE Internet of Things Journal. 8 5: 3170–3179. 10.1109/JIOT.2020.3013306
  • Hasan, M., M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem. 2019. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things. 7:100059. doi:10.1016/j.iot.2019.100059.
  • Hosseinpour, F., P. V. Amoli, J. Plosila, T. Hämäläinen, and H. Tenhunen. 2016. An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. International Journal of Digital Content Technology and Its Applications. 10:34–46 .
  • Hosseinzadeh M, Ahmed OH, Ghafour MY, Safara F, Ali S, Vo B, Chiang HS. 2020. A multiple multilayer perceptron neural network with an adaptive learning algorithm for thyroid disease diagnosis in the internet of medical things. The Journal of Supercomputing. 2021 Apr;77(4):3616–37.
  • Huang, D. Y., N. Apthorpe, F. Li, G. Acar, and N. Feamster. 2020. Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4 (2):1–21.
  • Jagannath, J., N. Polosky, A. Jagannath, F. Restuccia, and T. Melodia. 2019.Machine learning for wireless communications in the internet of things: A comprehensive survey. Ad Hoc Networks 93: 101913.doi: 10.1016/j.adhoc.2019.101913.
  • Jung, W., H. Zhao, M. Sun, and G. Zhou. 2020. IoT botnet detection via power consumption modeling. Smart Health 15:100103. doi:10.1016/j.smhl.2019.100103.
  • Kale, A. P., and S. P. Sonavane. 2019. IoT based smart farming: Feature subset selection for optimized high-dimensional data using improved GA based approach for ELM. Computers and Electronics in Agriculture 161:225–32. doi:10.1016/j.compag.2018.04.027.
  • Karanja, E. M., S. Masupe, and M. G. Jeffrey. 2020. Analysis of internet of things malware using image texture features and machine learning techniques. Internet of Things 9:100153. doi:10.1016/j.iot.2019.100153.
  • Kaur, M., G. Kaur, P. K. Sharma, A. Jolfaei, and D. Singh. 2019. Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home. The Journal of Supercomputing 76 (4):1–24. doi:10.1007/s11227-019-02998-0.
  • Khazbak, Y., J. Qiu, T. Tan, and G. Cao. 2020. TargetFinder: A privacy preserving system for locating targets through IoT cameras. ACM Transactions on Internet of Things 1 (3):1–23. doi:10.1145/3375878.
  • Kitchenham, B. 2004. Procedures for performing systematic reviews. Keele, UK, Keele University 33 (2004):1–26.
  • Koroniotis, N., N. Moustafa, and E. Sitnikova. 2020. A new network forensic framework based on deep learning for internet of things networks: A particle deep framework. Future Generation Computer Systems 110:91–106. doi:10.1016/j.future.2020.03.042.
  • Lin, P., D.-C. Lyu, F. Chen, S.-S. Wang, and Y. Tsao. 2017. Multi-style learning with denoising autoencoders for acoustic modeling in the internet of things (IoT). Computer Speech & Language 46:481–95. doi:10.1016/j.csl.2017.02.001.
  • Liu, Y., T. Dillon, W. Yu, W. Rahayu, and F. Mostafa. 2020. Missing value imputation for industrial IoT sensor data with large gaps. IEEE Internet of Things Journal 7 (8):6855–67. doi:10.1109/JIOT.2020.2970467.
  • Mehmood, A., M. Mukherjee, S. H. Ahmed, H. Song, and K. M. Malik. 2018. NBC-MAIDS: Naïve bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. The Journal of Supercomputing 74 (10):5156–70. doi:10.1007/s11227-018-2413-7.
  • Nesa, N., T. Ghosh, and I. Banerjee. 2018. Non-parametric sequence-based learning approach for outlier detection in IoT. Future Generation Computer Systems 82:412–21. doi:10.1016/j.future.2017.11.021.
  • Rahman, M. A., A. T. Asyhari, L. S. Leong, G. B. Satrya, M. Hai Tao, and M. F. Zolkipli. 2020.Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustainable Cities and Society 61: 102324.doi: 10.1016/j.scs.2020.102324.
  • Rathore, H., C. Fu, A. Mohamed, A. Al-Ali, X. Du, M. Guizani, and Z. Yu. 2020. Multi-layer security scheme for implantable medical devices. Neural Computing & Applications 32 (9):4347–60. doi:10.1007/s00521-018-3819-0.
  • Rathore, S., and J. H. Park. 2018. Semi-supervised learning based distributed attack detection framework for IoT. Applied Soft Computing 72:79–89. doi:10.1016/j.asoc.2018.05.049.
  • Ray, P. P. 2018. A survey on internet of things architectures. Journal of King Saud University-Computer and Information Sciences 30 (3):291–319. doi:10.1016/j.jksuci.2016.10.003.
  • Raza, S., L. Wallgren, and T. Voigt. 2013. SVELTE: Real-time intrusion detection in the internet of things. Ad Hoc Networks 11 (8):2661–74. doi:10.1016/j.adhoc.2013.04.014.
  • RM, S. P., Maddikunta, P. K. R., Parimala, M., Koppu, S., Gadekallu, T. R., Chowdhary, C. L., & Alazab, M. 2020. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Computer Communications, 160, 139–149.
  • Santos, L., C. Rabadao, and R. Gonçalves. 2018. Intrusion detection systems in internet of things: A literature review. 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), Caceres, Spain, IEEE.
  • Sarker, I. H., and K. Salah. 2019. Appspred: Predicting context-aware smartphone apps using random forest learning. Internet of Things 8:100106. doi:10.1016/j.iot.2019.100106.
  • Sharma, D., I. Mishra, and S. Jain. 2017. A detailed classification of routing attacks against RPL in internet of things. International Journal of Advance Research Ideas and Innovations in Technology 3: 692–703.
  • Shi, Y., X. Zhang, Q. Hu, and H. Cheng. 2020. Data recovery algorithm based on generative adversarial networks in crowd sensing internet of things. Personal and Ubiquitous Computing 1–14. doi:10.1007/s00779-020-01428-w.
  • Sicari, S., A. Rizzardi, L. A. Grieco, and A. Coen-Porisini. 2015. Security, privacy and trust in internet of things: The road ahead. Computer Networks 76:146–64. doi:10.1016/j.comnet.2014.11.008.
  • Skarmeta, A. F., Hernandez-Ramos, J. L., & Moreno, M. V. 2014, March. A decentralized approach for security and privacy challenges in the internet of things. In 2014 IEEE world forum on Internet of Things (WF-IoT) (pp. 67-72). Seoul, Korea (South), IEEE.
  • Sun, P., J. Li, M. Z. Alam Bhuiyan, L. Wang, and B. Li. 2019. Modeling and clustering attacker activities in IoT through machine learning techniques. Information Sciences 479:456–71. doi:10.1016/j.ins.2018.04.065.
  • Tong, C., X. Yin, S. Wang, and Z. Zheng. 2018. A novel deep learning method for aircraft landing speed prediction based on cloud-based sensor data. Future Generation Computer Systems 88:552–58. doi:10.1016/j.future.2018.06.023.
  • Wang, C., S. Dong, X. Zhao, G. Papanastasiou, H. Zhang, and G. Yang. 2019a. Saliencygan: Deep learning semisupervised salient object detection in the fog of iot. IEEE Transactions on Industrial Informatics 16 (4):2667–76. doi:10.1109/TII.2019.2945362.
  • Wang, T., S. Li, and B. Hannaford. 2019b. A model-based recurrent neural network with randomness for efficient control with applications. IEEE Transactions on Industrial Informatics 15 (4):2054–63. doi:10.1109/TII.2018.2869588.
  • Wang, H., Z. Zhao, Z. Wang, G. Xu, and L. Wang. 2019c. Independent component analysis-based baseline drift interference suppression of portable spectrometer for optical electronic nose of internet of things. IEEE Transactions on Industrial Informatics 16 (4):2698–706. doi:10.1109/TII.2019.2939645.
  • Xiao, L., Wan, X., Lu, X., Zhang, Y., & Wu, D. 2018. IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?. IEEE Signal Processing Magazine, 35(5), 41–49.
  • Xu, R., Y. Cheng, Z. Liu, Y. Xie, and Y. Yang. 2020. Improved long short-term memory based anomaly detection with concept drift adaptive method for supporting IoT services. Future Generation Computer Systems 112:228–42. doi:10.1016/j.future.2020.05.035.
  • Yin, C., Zhang, S., Wang, J., & Xiong, N. N. 2020. Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 52(1), 112–122.
  • Zahra, K., Azam, F., Ilyas, F., Faisal, H., Ambreen, N., & Gondal, N. 2017. Success factors of organizational change in software process improvement: A systematic literature review. Proceedings of the 5th International Conference on Information and Education Technology, Tokyo, Japan.
  • Zeng, S., X. Tong, N. Sang, and R. Huang. 2013. A study on semi-supervised FCM algorithm. Knowledge and Information Systems 35 (3):585–612. doi:10.1007/s10115-012-0521-x.
  • Zhang, C., and W. Ji. 2020. Edge computing enabled production anomalies detection and energy-efficient production decision approach for discrete manufacturing workshops. IEEE Access 8:158197–207. doi:10.1109/ACCESS.2020.3020136.
  • Zhang, X., X. Zhou, M. Lin, and J. Sun (2018). Shufflenet: An extremely efficient convolutional neural network for mobile devices. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 6848–56).