Abstract
Nowadays, protecting communication and information for Internet of Things (IOT) has emerged as a critical challenge. Existing systems use firewalls to ensure that they are safe from any unexpected occurrences that may disrupt the desired systems and applications. Intrusion detection systems (IDSs) are an acceptable second line of defence for IOT applications. IDS play a crucial role ensuring that it enhances the IOT security level maintaining sophisticated framework. Attackers have continuously been attempting to determine novel ways to circumnavigate security frameworks that prevent the structures. This paper reviews the security advances, threats and countermeasures for the IOT applications. A state of art review has accomplished using the references from 2009 to 2020 to encompass the real demography of the IOT security research data. This work also highlights the deep learning-based intrusion detection approaches for Internet of Things (IOT) security. With the systematic literature review approach, the review suggests that implementing existing security measures, such as encryption, authentication, access control, network and application security for IoT systems and their intrinsic amenability is ineffective for the IOT systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Afifi, M. A. M., Kalra, D., Ghazal, T. M., & Mago, B. (2020). Information technology ethics and professional responsibilities. International Journal of Advanced Science and Technology, 29(4), 11336–11343.
Ahmad, A., Alshurideh, M. T., Al Kurdi, B. H., & Alzoubi, H. M. (2021). Digital strategies: A systematic literature review. The International Conference on Artificial Intelligence and Computer Vision, 807–822.
Akhtar, A., Akhtar, S., Bakhtawar, B., Kashif, A. A., Aziz, N., & Javeid, M. S. (2021). COVID-19 detection from CBC using machine learning techniques. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 65–78. https://doi.org/10.54489/ijtim.v1i2.22
Akour, I., Alshurideh, M., Al Kurdi, B., Al Ali, A., & Salloum, S. (2021). Using machine learning algorithms to predict people’s intention to use mobile learning platforms during the COVID-19 pandemic: Machine learning approach. JMIR Medical Education, 7(1), 1–17. https://doi.org/10.2196/24032
Al Ali, A. (2021). The impact of information sharing and quality assurance on customer service at UAE banking sector. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 01–17. https://doi.org/10.54489/ijtim.v1i1.10
Al Batayneh, R. M., Taleb, N., Said, R. A., Alshurideh, M. T., Ghazal, T. M., & Alzoubi, H. M. (2021). IT governance framework and smart services integration for future development of Dubai infrastructure utilizing AI and big data, its reflection on the citizens standard of living. The International Conference on Artificial Intelligence and Computer Vision, 235–247.
Al Kurdi, B., Alshurideh, M., Nuseir, M., Aburayya, A., & Salloum, S. A. (2021). The effects of subjective norm on the intention to use social media networks: An exploratory study using PLS-SEM and machine learning approach. Advanced Machine Learning Technologies and Applications: Proceedings of AMLTA, 2021, 581–592.
AlHamad, A., Alshurideh, M., Alomari, K., Kurdi, B., Alzoubi, H., Hamouche, S., & Al-Hawary, S. (2022). The effect of electronic human resources management on organizational health of telecommunications companies in Jordan. International Journal of Data and Network Science, 6(2), 429–438.
Alhamad, A. Q. M., Akour, I., Alshurideh, M., Al-Hamad, A. Q., Kurdi, B. A., & Alzoubi, H. (2021). Predicting the intention to use google glass: A comparative approach using machine learning models and PLS-SEM. International Journal of Data and Network Science, 5(3). https://doi.org/10.5267/j.ijdns.2021.6.002
Ali, N., Ahmed, A., Anum, L., Ghazal, T. M., Abbas, S., Khan, M. A., Alzoubi, H. M., & Ahmad, M. (2021). Modelling supply chain information collaboration empowered with machine learning technique. Intelligent Automation and Soft Computing, 30(1), 243–257. https://doi.org/10.32604/iasc.2021.018983
Ali, N., Ghazal, M. T., Ahmed, A., Abbas, S., A. Khan, M., Alzoubi, H., Farooq, U., Ahmad, M., & Adnan Khan, M. (2022). Fusion-based supply chain collaboration using machine learning techniques. Intelligent Automation & Soft Computing, 31(3), 1671–1687. https://doi.org/10.32604/iasc.2022.019892
Alnazer, N. N., Alnuaimi, M. A., & Alzoubi, H. M. (2017). Analysing the appropriate cognitive styles and its effect on strategic innovation in Jordanian universities. International Journal of Business Excellence, 13(1), 127–140. https://doi.org/10.1504/IJBEX.2017.085799
Alnuaimi, M., Alzoubi, H. M., Ajelat, D., & Alzoubi, A. A. (2021). Towards intelligent organisations: An empirical investigation of learning orientation’s role in technical innovation. International Journal of Innovation and Learning, 29(2), 207–221. https://doi.org/10.1504/IJIL.2021.112996
Alsharari, N. (2021). Integrating blockchain technology with internet of things to efficiency. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 1–13.
Alshurideh, M. (2022). Does electronic customer relationship management (E-CRM) affect service quality at private hospitals in Jordan? Uncertain Supply Chain Management, 10(2), 1–8.
Alshurideh, M., Al Kurdi, B., Alzoubi, H., Ghazal, T., Said, R., AlHamad, A., Hamadneh, S., Sahawneh, N., & Al-kassem, A. (2022b). Fuzzy assisted human resource management for supply chain management issues. Annals of Operations Research, 1–19.
Alshurideh, M., Al Kurdi, B., Salloum, S. A., Arpaci, I., & Al-Emran, M. (2020b). Predicting the actual use of m-learning systems: A comparative approach using PLS-SEM and machine learning algorithms. Interactive Learning Environments, 1–15.
Alshurideh, M., Gasaymeh, A., Ahmed, G., Alzoubi, H., & Kurd, B. A. (2020a). Loyalty program effectiveness: Theoretical reviews and practical proofs. Uncertain Supply Chain Management, 8(3). https://doi.org/10.5267/j.uscm.2020.2.003
Alshurideh, M., Salloum, S. A., Al Kurdi, B., & Al-Emran, M. (2019). Factors affecting the social networks acceptance: An empirical study using PLS-SEM approach. In PervasiveHealth: Pervasive Computing Technologies for Healthcare, Part F1479. https://doi.org/10.1145/3316615.3316720
Alshurideh, M. T., Al Kurdi, B., Alzoubi, H. M., Ghazal, T. M., Said, R. A., AlHamad, A. Q., Hamadneh, S., Sahawneh, N., & Al-kassem, A. H. (2022a). Fuzzy assisted human resource management for supply chain management issues. Annals of Operations Research, 1–19.
Alshurideh, M. T., Hassanien, A. E., & Masa’deh, R. (2021). The effect of coronavirus disease (COVID-19) on business intelligence. Springer.
Alzoubi, A. (2021a). The impact of process quality and quality control on organizational competitiveness at 5-star hotels in Dubai. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 54–68. https://doi.org/10.54489/ijtim.v1i1.14
Alzoubi, A. (2021b). Renewable green hydrogen energy impact on sustainability performance. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 94–110. https://doi.org/10.54489/ijcim.v1i1.46
Alzoubi, H. M., Alshurideh, M., & Ghazal, T. M. (2021a). Integrating BLE beacon technology with intelligent information systems IIS for operations’ performance: A managerial perspective. The International Conference on Artificial Intelligence and Computer Vision, 527–538.
Alzoubi, H. M., & Aziz, R. (2021). Does emotional intelligence contribute to quality of strategic decisions? The mediating role of open innovation. Journal of Open Innovation: Technology, Market, and Complexity, 7(2), 130. https://doi.org/10.3390/joitmc7020130
Alzoubi, H. M., Vij, M., Vij, A., & Hanaysha, J. R. (2021b). What leads guests to satisfaction and loyalty in UAE five-star hotels? AHP analysis to service quality dimensions. Enlightening Tourism, 11(1), 102–135. https://doi.org/10.33776/et.v11i1.5056
Alzoubi, H. M., & Yanamandra, R. (2020). Investigating the mediating role of information sharing strategy on agile supply chain. Uncertain Supply Chain Management, 8(2), 273–284. https://doi.org/10.5267/j.uscm.2019.12.004
Alzoubi, H., & Ahmed, G. (2019). Do TQM practices improve organisational success? A case study of electronics industry in the UAE. International Journal of Economics and Business Research, 17(4), 459–472. https://doi.org/10.1504/IJEBR.2019.099975
Alzoubi, H., Ahmed, G., Al-Gasaymeh, A., & Kurdi, B. (2020a). Empirical study on sustainable supply chain strategies and its impact on competitive priorities: The mediating role of supply chain collaboration. Management Science Letters, 10(3), 703–708.
Alzoubi, H., Alshurideh, M., Kurdi, B., Akour, I., & Aziz, R. (2022). Does BLE technology contribute towards improving marketing strategies, customers’ satisfaction and loyalty? The role of open innovation. International Journal of Data and Network Science, 6(2), 449–460.
Alzoubi, H., Alshurideh, M., Kurdi, B. A., & Inairat, M. (2020b). Do perceived service value, quality, price fairness and service recovery shape customer satisfaction and delight? A practical study in the service telecommunication context. Uncertain Supply Chain Management, 8(3), 579–588. https://doi.org/10.5267/j.uscm.2020.2.005
Aminanto, M. E. et al. (2018). Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Transactions on Information Forensics and Security, 13(3), 621–636.
Aziz, N., & Aftab, S. (2021). Data mining framework for nutrition ranking: Methodology: SPSS modeller. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 85–95.
Cruz, A. (2021). Convergence between blockchain and the internet of things. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 35–56.
Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82:761–768.
Eli, T. (2021). Students perspectives on the use of innovative and interactive teaching methods at the University of Nouakchott Al Aasriya, Mauritania: English Department as a case study. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 90–104.
Farouk, M. (2021). The universal artificial intelligence efforts to face coronavirus COVID-19. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 77–93. https://doi.org/10.54489/ijcim.v1i1.47
Fiore, U. et al. (2019). Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Information Sciences, 479, 448–455.
Ghazal, T., Alshurideh, M., & Alzoubi, H. (2021a). Blockchain-enabled internet of things (IoT) platforms for pharmaceutical and biomedical research. The International Conference on Artificial Intelligence and Computer Vision, 589–600.
Ghazal, T., Soomro, T. R., & Shaalan, K. (2013). Integration of project management maturity (PMM) based on capability maturity model integration (CMMI). European Journal of Scientific Research, 99(3), 418–428.
Ghazal, T. M. (2021). Positioning of UAV base stations using 5G and beyond networks for IoMT applications. Arabian Journal for Science and Engineering, 1–12.
Ghazal, T. M., Anam, M., Hasan, M. K., Hussain, M., Farooq, M. S., Ali, H. M., Ahmad, M., & Soomro, T. R. (2021b). Hep-Pred: Hepatitis C staging prediction using fine Gaussian SVM. Comput Mater Continua, 69, 191–203.
Ghazal, T. M., Hasan, M. K., Alshurideh, M. T., Alzoubi, H. M., Ahmad, M., Akbar, S. S., Al Kurdi, B., & Akour, I. A. (2021c). IoT for smart cities: Machine learning approaches in smart healthcare—A review. Future Internet, 13(8), 218. https://doi.org/10.3390/fi13080218
Ghazal, T. M., Hussain, M. Z., Said, R. A., Nadeem, A., Hasan, M. K., Ahmad, M., Khan, M. A., & Naseem, M. T. (2021d). Performances of K-means clustering algorithm with different distance metrics.
Ghazal, T. M., Said, R. A., & Taleb, N. (2021e). Internet of vehicles and autonomous systems with AI for medical things. Soft Computing, 1–13.
Guergov, S., & Radwan, N. (2021). Blockchain convergence: Analysis of issues affecting IoT, AI and blockchain. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 1–17. https://doi.org/10.54489/ijcim.v1i1.48
Hamadneh, S., Pedersen, O., & Al Kurdi, B. (2021). An investigation of the role of supply chain visibility into the Scottish bood supply chain. Journal of Legal, Ethical and Regulatory Issues, 24(Special Issue 1), 1–12.
Hanaysha, J. R., Al-Shaikh, M. E., Joghee, S., & Alzoubi, H. (2021a). Impact of innovation capabilities on business sustainability in small and medium enterprises. FIIB Business Review, 1–12,. https://doi.org/10.1177/23197145211042232
Hanaysha, J. R., Al Shaikh, M. E., & Alzoubi, H. M. (2021b). Importance of marketing mix elements in determining consumer purchase decision in the retail market. International Journal of Service Science, Management, Engineering, and Technology (IJSSMET), 12(6), 56–72.
Hasan, O., McColl, J., Pfefferkorn, T., Hamadneh, S., Alshurideh, M., & Kurdi, B. (2022). Consumer attitudes towards the use of autonomous vehicles: Evidence from United Kingdom taxi services. International Journal of Data and Network Science, 6(2), 537–550.
Hou, S. et al. (2016). Deep4maldroid: a deep learning framework for android malware detection based on Linux kernel system call graphs. In 2016 IEEE/WIC/ACM international conference on web intelligence workshops (WIW). IEEE.
Ishitaki, T. et al. (2017). Application of deep recurrent neural networks for prediction of user behavior in tor networks. In 2017 31st international conference on advanced information networking and applications workshops (WAINA). IEEE.
Javaid, A., et al. (2016). A deep learning approach for network intrusion detection system. In Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
Joghee, S., Alzoubi, H. M., & Dubey, A. R. (2020). Decisions effectiveness of FDI investment biases at real estate industry: Empirical evidence from Dubai smart city projects. International Journal of Scientific and Technology Research, 9(3), 3499–3503.
Kalra, D., Ghazal, T. M., & Afifi, M. A. M. (2020). Integration of collaboration systems in hospitality management as a comprehensive solution. International Journal of Advanced Science and Technology, 29(8s), 3155–3173.
Kashif, A. A., Bakhtawar, B., Akhtar, A., Akhtar, S., Aziz, N., & Javeid, M. S. (2021). Treatment response prediction in hepatitis C patients using machine learning techniques. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 79–89. https://doi.org/10.54489/ijtim.v1i2.24
Khan, M. A. (2021). Challenges facing the application of IoT in medicine and healthcare. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 39–55. https://doi.org/10.54489/ijcim.v1i1.32
Khan, M. F., Ghazal, T. M., Said, R. A., Fatima, A., Abbas, S., Khan, M. A., Issa, G. F., Ahmad, M., & Khan, M. A. (2021a). An IoMT-enabled smart healthcare model to monitor elderly people using machine learning technique. Computational Intelligence and Neuroscience, 2021a.
Khan, Q.-T.-A., Ghazal, T., Abbas, S., Khan, W., Khan, A., Muhammad, A., Said, Raed, A., Ahmad, M., & Asif, M. (2021b). Modeling habit patterns using conditional reflexes in agency. Intelligent Automation and Soft Computing, 30(2), 539–552.
Lee, C., & Ahmed, G. (2021). Improving IoT privacy, data protection and security concerns. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 18–33. https://doi.org/10.54489/ijtim.v1i1.12
Lee, K., Azmi, N., Hanaysha, J., Alzoubi, H., & Alshurideh, M. (2022a). The effect of digital supply chain on organizational performance: An empirical study in Malaysia manufacturing industry. Uncertain Supply Chain Management, 10(2), 495–510.
Lee, K. L., Romzi, P. N., Hanaysha, J. R., Alzoubi, H. M., & Alshurideh, M. (2022b). Investigating the impact of benefits and challenges of IOT adoption on supply chain performance and organizational performance: An empirical study in Malaysia. Uncertain Supply Chain Management, 10(2), 537–550. https://doi.org/10.5267/j.uscm.2021.11.009
Lee, S.-W., Hussain, S., Issa, G. F., Abbas, S., Ghazal, T. M., Sohail, T., Ahmad, M., & Khan, M. A. (2021). Multi-dimensional trust quantification by artificial agents through evidential fuzzy multi-criteria decision making. IEEE Access, 9, 159399–159412.
Li, Z. et al. (2017). Intrusion detection using convolutional neural networks for representation learning. In International conference on neural information processing.
Liu, Y. et al. (2017). Fault injection attack on deep neural network. In Proceedings of the 36th international conference on computeraided design. IEEE Press.
Matloob, F., Ghazal, T. M., Taleb, N., Aftab, S., Ahmad, M., Khan, M. A., Abbas, S., & Soomro, T. R. (2021). Software defect prediction using ensemble learning: A systematic literature review. IEEE Access.
Mathew, A. et al. (2017). An improved transfer learning approach for intrusion detection. Procedia Computer Science, 115, 251–257.
Mehmood, T. (2021). Does information technology competencies and fleet management practices lead to effective service delivery? Empirical evidence from E-commerce industry. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 14–41.
Mehmood, T., Alzoubi, H. M., & Ahmed, G. (2019). Schumpeterian entrepreneurship theory: Evolution and relevance. Academy of Entrepreneurship Journal, 25(4).
Miller, D. (2021). The best practice of teach computer science students to use paper prototyping. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 42–63. https://doi.org/10.54489/ijtim.v1i2.17
Mondol, E. P. (2021). The impact of block chain and smart inventory system on supply chain performance at retail industry. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 56–76. https://doi.org/10.54489/ijcim.v1i1.30
Mohammadi, S., & Namadchian, A. (2017). A new deep learning approach for anomaly base IDS using memetic classifier. International Journal of Computers Communications & Control, 12(5), 677–688.
Munoz-Gonza´lez, L. et al. (2017). Towards poisoning of deep learning algorithms with back-gradient optimization. In Proceedings of the 10th ACM workshop on artificial intelligence and security. ACM.
Naqvi, R., Soomro, T. R., Alzoubi, H. M., Ghazal, T. M., & Alshurideh, M. T. (2021). The nexus between big data and decision-making: A study of big data techniques and technologies. The International Conference on Artificial Intelligence and Computer Vision, 838–853.
Nuseir, M. T., Al Kurdi, B. H., Alshurideh, M. T., & Alzoubi, H. M. (2021). Gender discrimination at workplace: Do artificial intelligence (AI) and machine learning (ML) have opinions about it. The International Conference on Artificial Intelligence and Computer Vision, 301–316.
Obaid, A. J. (2021). Assessment of smart home assistants as an IoT. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 18–36. https://doi.org/10.54489/ijcim.v1i1.34
Radwan, N., & Farouk, M. (2021). The growth of internet of things (IoT) in the management of healthcare issues and healthcare policy development. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 69–84. https://doi.org/10.54489/ijtim.v1i1.8
Rehman, E., Khan, M. A., Soomro, T. R., Taleb, N., Afifi, M. A., & Ghazal, T. M. (2021). Using blockchain to ensure trust between donor agencies and NGOs in under-developed countries. Computers, 10(8), 98.
Salloum, S. A., Alshurideh, M., Elnagar, A., & Shaalan, K. (2020). Machine learning and deep learning techniques for cybersecurity: A review. In Joint European-US Workshop on Applications of Invariance in Computer Vision (pp. 50–57).
Saxe, J., & Berlin, K. (2015). Deep neural network-based malware detection using twodimensional binary program features. In 2015 10th international conference on malicious and unwanted software (MALWARE). IEEE.
Shamout, M., Ben-Abdallah, B., Alshurideh, M., Alzoubi, H., Al Kurdi, B., & Hamadneh, S. (2022). A conceptual model for the adoption of autonomous robots in supply chain and logistics industry. Uncertain Supply Chain Management, 10, 1–16.
Shibahara, T. et al. (2016). Efficient dynamic malware analysis based on network behavior using deep learning. In 2016 IEEE on global communications conference (GLOBECOM). IEEE.
Suleman, M., Soomro, T. R., Ghazal, T. M., & Alshurideh, M. (2021). Combating against potentially harmful mobile apps. The International Conference on Artificial Intelligence and Computer Vision, 154–173.
Taormina, R., & Galelli, S. (2017). Real-time detection of cyberphysical attacks on water distribution systems using deep learning. In World environmental and water resources congress 2017.
Tariq, E., Alshurideh, M., Akour, I., & Al-Hawary, S. (2022). The effect of digital marketing capabilities on organizational ambidexterity of the information technology sector. International Journal of Data and Network Science, 6(2), 401–408.
Thing, V. L. (2017). IEEE 802.11 network anomaly detection and attack classification: A deep learning approach. In 2017 IEEE on wireless communications and networking conference (WCNC). IEEE.
Vinayakumar, R., Soman, K., & Poornachandran, P. (2017). Evaluating effectiveness of shallow and deep networks to intrusion detection system. In 2017 international conference on advances in computing, communications and informatics (ICACCI). IEEE.
Wang, Q. et al. (2017). Adversary resistant deep neural networks with an application to malware detection. In Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. ACM.
Wei, J., & Mendis, G. J. (2016). A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids. In Joint workshop on cyber-physical security and resilience in smart grids (CPSR-SG). IEEE.
Wu, T. et al. (2017). Twitter spam detection based on deep learning. In Proceedings of the Australasian computer science week multiconference. ACM.
Yuan, X., Li, C., & Li, X. (2017). Deep Defense: identifying DDoS attack via deep learning. In 2017 IEEE international conference on smart computing (SMARTCOMP). IEEE.
Zolotukhin, M. et al. (2016). Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic. In 2016 23rd international conference on telecommunications (ICT). IEEE.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ghazal, T.M. et al. (2023). Machine Learning-Based Intrusion Detection Approaches for Secured Internet of Things. In: Alshurideh, M., Al Kurdi , B.H., Masa’deh, R., Alzoubi , H.M., Salloum, S. (eds) The Effect of Information Technology on Business and Marketing Intelligence Systems. Studies in Computational Intelligence, vol 1056. Springer, Cham. https://doi.org/10.1007/978-3-031-12382-5_110
Download citation
DOI: https://doi.org/10.1007/978-3-031-12382-5_110
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-12381-8
Online ISBN: 978-3-031-12382-5
eBook Packages: EngineeringEngineering (R0)