Skip to main content

Machine Learning-Based Intrusion Detection Approaches for Secured Internet of Things

  • Chapter
  • First Online:
The Effect of Information Technology on Business and Marketing Intelligence Systems

Abstract

Nowadays, protecting communication and information for Internet of Things (IOT) has emerged as a critical challenge. Existing systems use firewalls to ensure that they are safe from any unexpected occurrences that may disrupt the desired systems and applications. Intrusion detection systems (IDSs) are an acceptable second line of defence for IOT applications. IDS play a crucial role ensuring that it enhances the IOT security level maintaining sophisticated framework. Attackers have continuously been attempting to determine novel ways to circumnavigate security frameworks that prevent the structures. This paper reviews the security advances, threats and countermeasures for the IOT applications. A state of art review has accomplished using the references from 2009 to 2020 to encompass the real demography of the IOT security research data. This work also highlights the deep learning-based intrusion detection approaches for Internet of Things (IOT) security. With the systematic literature review approach, the review suggests that implementing existing security measures, such as encryption, authentication, access control, network and application security for IoT systems and their intrinsic amenability is ineffective for the IOT systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Afifi, M. A. M., Kalra, D., Ghazal, T. M., & Mago, B. (2020). Information technology ethics and professional responsibilities. International Journal of Advanced Science and Technology, 29(4), 11336–11343.

    Google Scholar 

  • Ahmad, A., Alshurideh, M. T., Al Kurdi, B. H., & Alzoubi, H. M. (2021). Digital strategies: A systematic literature review. The International Conference on Artificial Intelligence and Computer Vision, 807–822.

    Google Scholar 

  • Akhtar, A., Akhtar, S., Bakhtawar, B., Kashif, A. A., Aziz, N., & Javeid, M. S. (2021). COVID-19 detection from CBC using machine learning techniques. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 65–78. https://doi.org/10.54489/ijtim.v1i2.22

  • Akour, I., Alshurideh, M., Al Kurdi, B., Al Ali, A., & Salloum, S. (2021). Using machine learning algorithms to predict people’s intention to use mobile learning platforms during the COVID-19 pandemic: Machine learning approach. JMIR Medical Education, 7(1), 1–17. https://doi.org/10.2196/24032

    Article  Google Scholar 

  • Al Ali, A. (2021). The impact of information sharing and quality assurance on customer service at UAE banking sector. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 01–17. https://doi.org/10.54489/ijtim.v1i1.10

  • Al Batayneh, R. M., Taleb, N., Said, R. A., Alshurideh, M. T., Ghazal, T. M., & Alzoubi, H. M. (2021). IT governance framework and smart services integration for future development of Dubai infrastructure utilizing AI and big data, its reflection on the citizens standard of living. The International Conference on Artificial Intelligence and Computer Vision, 235–247.

    Google Scholar 

  • Al Kurdi, B., Alshurideh, M., Nuseir, M., Aburayya, A., & Salloum, S. A. (2021). The effects of subjective norm on the intention to use social media networks: An exploratory study using PLS-SEM and machine learning approach. Advanced Machine Learning Technologies and Applications: Proceedings of AMLTA, 2021, 581–592.

    Article  Google Scholar 

  • AlHamad, A., Alshurideh, M., Alomari, K., Kurdi, B., Alzoubi, H., Hamouche, S., & Al-Hawary, S. (2022). The effect of electronic human resources management on organizational health of telecommunications companies in Jordan. International Journal of Data and Network Science, 6(2), 429–438.

    Article  Google Scholar 

  • Alhamad, A. Q. M., Akour, I., Alshurideh, M., Al-Hamad, A. Q., Kurdi, B. A., & Alzoubi, H. (2021). Predicting the intention to use google glass: A comparative approach using machine learning models and PLS-SEM. International Journal of Data and Network Science, 5(3). https://doi.org/10.5267/j.ijdns.2021.6.002

  • Ali, N., Ahmed, A., Anum, L., Ghazal, T. M., Abbas, S., Khan, M. A., Alzoubi, H. M., & Ahmad, M. (2021). Modelling supply chain information collaboration empowered with machine learning technique. Intelligent Automation and Soft Computing, 30(1), 243–257. https://doi.org/10.32604/iasc.2021.018983

  • Ali, N., Ghazal, M. T., Ahmed, A., Abbas, S., A. Khan, M., Alzoubi, H., Farooq, U., Ahmad, M., & Adnan Khan, M. (2022). Fusion-based supply chain collaboration using machine learning techniques. Intelligent Automation & Soft Computing, 31(3), 1671–1687. https://doi.org/10.32604/iasc.2022.019892

  • Alnazer, N. N., Alnuaimi, M. A., & Alzoubi, H. M. (2017). Analysing the appropriate cognitive styles and its effect on strategic innovation in Jordanian universities. International Journal of Business Excellence, 13(1), 127–140. https://doi.org/10.1504/IJBEX.2017.085799

    Article  Google Scholar 

  • Alnuaimi, M., Alzoubi, H. M., Ajelat, D., & Alzoubi, A. A. (2021). Towards intelligent organisations: An empirical investigation of learning orientation’s role in technical innovation. International Journal of Innovation and Learning, 29(2), 207–221. https://doi.org/10.1504/IJIL.2021.112996

    Article  Google Scholar 

  • Alsharari, N. (2021). Integrating blockchain technology with internet of things to efficiency. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 1–13.

    Google Scholar 

  • Alshurideh, M. (2022). Does electronic customer relationship management (E-CRM) affect service quality at private hospitals in Jordan? Uncertain Supply Chain Management, 10(2), 1–8.

    Article  Google Scholar 

  • Alshurideh, M., Al Kurdi, B., Alzoubi, H., Ghazal, T., Said, R., AlHamad, A., Hamadneh, S., Sahawneh, N., & Al-kassem, A. (2022b). Fuzzy assisted human resource management for supply chain management issues. Annals of Operations Research, 1–19.

    Google Scholar 

  • Alshurideh, M., Al Kurdi, B., Salloum, S. A., Arpaci, I., & Al-Emran, M. (2020b). Predicting the actual use of m-learning systems: A comparative approach using PLS-SEM and machine learning algorithms. Interactive Learning Environments, 1–15.

    Google Scholar 

  • Alshurideh, M., Gasaymeh, A., Ahmed, G., Alzoubi, H., & Kurd, B. A. (2020a). Loyalty program effectiveness: Theoretical reviews and practical proofs. Uncertain Supply Chain Management, 8(3). https://doi.org/10.5267/j.uscm.2020.2.003

  • Alshurideh, M., Salloum, S. A., Al Kurdi, B., & Al-Emran, M. (2019). Factors affecting the social networks acceptance: An empirical study using PLS-SEM approach. In PervasiveHealth: Pervasive Computing Technologies for Healthcare, Part F1479. https://doi.org/10.1145/3316615.3316720

  • Alshurideh, M. T., Al Kurdi, B., Alzoubi, H. M., Ghazal, T. M., Said, R. A., AlHamad, A. Q., Hamadneh, S., Sahawneh, N., & Al-kassem, A. H. (2022a). Fuzzy assisted human resource management for supply chain management issues. Annals of Operations Research, 1–19.

    Google Scholar 

  • Alshurideh, M. T., Hassanien, A. E., & Masa’deh, R. (2021). The effect of coronavirus disease (COVID-19) on business intelligence. Springer.

    Google Scholar 

  • Alzoubi, A. (2021a). The impact of process quality and quality control on organizational competitiveness at 5-star hotels in Dubai. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 54–68. https://doi.org/10.54489/ijtim.v1i1.14

  • Alzoubi, A. (2021b). Renewable green hydrogen energy impact on sustainability performance. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 94–110. https://doi.org/10.54489/ijcim.v1i1.46

  • Alzoubi, H. M., Alshurideh, M., & Ghazal, T. M. (2021a). Integrating BLE beacon technology with intelligent information systems IIS for operations’ performance: A managerial perspective. The International Conference on Artificial Intelligence and Computer Vision, 527–538.

    Google Scholar 

  • Alzoubi, H. M., & Aziz, R. (2021). Does emotional intelligence contribute to quality of strategic decisions? The mediating role of open innovation. Journal of Open Innovation: Technology, Market, and Complexity, 7(2), 130. https://doi.org/10.3390/joitmc7020130

    Article  Google Scholar 

  • Alzoubi, H. M., Vij, M., Vij, A., & Hanaysha, J. R. (2021b). What leads guests to satisfaction and loyalty in UAE five-star hotels? AHP analysis to service quality dimensions. Enlightening Tourism, 11(1), 102–135. https://doi.org/10.33776/et.v11i1.5056

  • Alzoubi, H. M., & Yanamandra, R. (2020). Investigating the mediating role of information sharing strategy on agile supply chain. Uncertain Supply Chain Management, 8(2), 273–284. https://doi.org/10.5267/j.uscm.2019.12.004

    Article  Google Scholar 

  • Alzoubi, H., & Ahmed, G. (2019). Do TQM practices improve organisational success? A case study of electronics industry in the UAE. International Journal of Economics and Business Research, 17(4), 459–472. https://doi.org/10.1504/IJEBR.2019.099975

    Article  Google Scholar 

  • Alzoubi, H., Ahmed, G., Al-Gasaymeh, A., & Kurdi, B. (2020a). Empirical study on sustainable supply chain strategies and its impact on competitive priorities: The mediating role of supply chain collaboration. Management Science Letters, 10(3), 703–708.

    Article  Google Scholar 

  • Alzoubi, H., Alshurideh, M., Kurdi, B., Akour, I., & Aziz, R. (2022). Does BLE technology contribute towards improving marketing strategies, customers’ satisfaction and loyalty? The role of open innovation. International Journal of Data and Network Science, 6(2), 449–460.

    Article  Google Scholar 

  • Alzoubi, H., Alshurideh, M., Kurdi, B. A., & Inairat, M. (2020b). Do perceived service value, quality, price fairness and service recovery shape customer satisfaction and delight? A practical study in the service telecommunication context. Uncertain Supply Chain Management, 8(3), 579–588. https://doi.org/10.5267/j.uscm.2020.2.005

    Article  Google Scholar 

  • Aminanto, M. E. et al. (2018). Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Transactions on Information Forensics and Security, 13(3), 621–636.

    Google Scholar 

  • Aziz, N., & Aftab, S. (2021). Data mining framework for nutrition ranking: Methodology: SPSS modeller. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 85–95.

    Google Scholar 

  • Cruz, A. (2021). Convergence between blockchain and the internet of things. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 35–56.

    Google Scholar 

  • Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82:761–768.

    Google Scholar 

  • Eli, T. (2021). Students perspectives on the use of innovative and interactive teaching methods at the University of Nouakchott Al Aasriya, Mauritania: English Department as a case study. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 90–104.

    Google Scholar 

  • Farouk, M. (2021). The universal artificial intelligence efforts to face coronavirus COVID-19. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 77–93. https://doi.org/10.54489/ijcim.v1i1.47

  • Fiore, U. et al. (2019). Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Information Sciences, 479, 448–455.

    Google Scholar 

  • Ghazal, T., Alshurideh, M., & Alzoubi, H. (2021a). Blockchain-enabled internet of things (IoT) platforms for pharmaceutical and biomedical research. The International Conference on Artificial Intelligence and Computer Vision, 589–600.

    Google Scholar 

  • Ghazal, T., Soomro, T. R., & Shaalan, K. (2013). Integration of project management maturity (PMM) based on capability maturity model integration (CMMI). European Journal of Scientific Research, 99(3), 418–428.

    Google Scholar 

  • Ghazal, T. M. (2021). Positioning of UAV base stations using 5G and beyond networks for IoMT applications. Arabian Journal for Science and Engineering, 1–12.

    Google Scholar 

  • Ghazal, T. M., Anam, M., Hasan, M. K., Hussain, M., Farooq, M. S., Ali, H. M., Ahmad, M., & Soomro, T. R. (2021b). Hep-Pred: Hepatitis C staging prediction using fine Gaussian SVM. Comput Mater Continua, 69, 191–203.

    Article  Google Scholar 

  • Ghazal, T. M., Hasan, M. K., Alshurideh, M. T., Alzoubi, H. M., Ahmad, M., Akbar, S. S., Al Kurdi, B., & Akour, I. A. (2021c). IoT for smart cities: Machine learning approaches in smart healthcare—A review. Future Internet, 13(8), 218. https://doi.org/10.3390/fi13080218

    Article  Google Scholar 

  • Ghazal, T. M., Hussain, M. Z., Said, R. A., Nadeem, A., Hasan, M. K., Ahmad, M., Khan, M. A., & Naseem, M. T. (2021d). Performances of K-means clustering algorithm with different distance metrics.

    Google Scholar 

  • Ghazal, T. M., Said, R. A., & Taleb, N. (2021e). Internet of vehicles and autonomous systems with AI for medical things. Soft Computing, 1–13.

    Google Scholar 

  • Guergov, S., & Radwan, N. (2021). Blockchain convergence: Analysis of issues affecting IoT, AI and blockchain. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 1–17. https://doi.org/10.54489/ijcim.v1i1.48

  • Hamadneh, S., Pedersen, O., & Al Kurdi, B. (2021). An investigation of the role of supply chain visibility into the Scottish bood supply chain. Journal of Legal, Ethical and Regulatory Issues, 24(Special Issue 1), 1–12.

    Google Scholar 

  • Hanaysha, J. R., Al-Shaikh, M. E., Joghee, S., & Alzoubi, H. (2021a). Impact of innovation capabilities on business sustainability in small and medium enterprises. FIIB Business Review, 1–12,. https://doi.org/10.1177/23197145211042232

  • Hanaysha, J. R., Al Shaikh, M. E., & Alzoubi, H. M. (2021b). Importance of marketing mix elements in determining consumer purchase decision in the retail market. International Journal of Service Science, Management, Engineering, and Technology (IJSSMET), 12(6), 56–72.

    Google Scholar 

  • Hasan, O., McColl, J., Pfefferkorn, T., Hamadneh, S., Alshurideh, M., & Kurdi, B. (2022). Consumer attitudes towards the use of autonomous vehicles: Evidence from United Kingdom taxi services. International Journal of Data and Network Science, 6(2), 537–550.

    Article  Google Scholar 

  • Hou, S. et al. (2016). Deep4maldroid: a deep learning framework for android malware detection based on Linux kernel system call graphs. In 2016 IEEE/WIC/ACM international conference on web intelligence workshops (WIW). IEEE.

    Google Scholar 

  • Ishitaki, T. et al. (2017). Application of deep recurrent neural networks for prediction of user behavior in tor networks. In 2017 31st international conference on advanced information networking and applications workshops (WAINA). IEEE.

    Google Scholar 

  • Javaid, A., et al. (2016). A deep learning approach for network intrusion detection system. In Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.

    Google Scholar 

  • Joghee, S., Alzoubi, H. M., & Dubey, A. R. (2020). Decisions effectiveness of FDI investment biases at real estate industry: Empirical evidence from Dubai smart city projects. International Journal of Scientific and Technology Research, 9(3), 3499–3503.

    Google Scholar 

  • Kalra, D., Ghazal, T. M., & Afifi, M. A. M. (2020). Integration of collaboration systems in hospitality management as a comprehensive solution. International Journal of Advanced Science and Technology, 29(8s), 3155–3173.

    Google Scholar 

  • Kashif, A. A., Bakhtawar, B., Akhtar, A., Akhtar, S., Aziz, N., & Javeid, M. S. (2021). Treatment response prediction in hepatitis C patients using machine learning techniques. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 79–89. https://doi.org/10.54489/ijtim.v1i2.24

  • Khan, M. A. (2021). Challenges facing the application of IoT in medicine and healthcare. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 39–55. https://doi.org/10.54489/ijcim.v1i1.32

  • Khan, M. F., Ghazal, T. M., Said, R. A., Fatima, A., Abbas, S., Khan, M. A., Issa, G. F., Ahmad, M., & Khan, M. A. (2021a). An IoMT-enabled smart healthcare model to monitor elderly people using machine learning technique. Computational Intelligence and Neuroscience, 2021a.

    Google Scholar 

  • Khan, Q.-T.-A., Ghazal, T., Abbas, S., Khan, W., Khan, A., Muhammad, A., Said, Raed, A., Ahmad, M., & Asif, M. (2021b). Modeling habit patterns using conditional reflexes in agency. Intelligent Automation and Soft Computing, 30(2), 539–552.

    Google Scholar 

  • Lee, C., & Ahmed, G. (2021). Improving IoT privacy, data protection and security concerns. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 18–33. https://doi.org/10.54489/ijtim.v1i1.12

  • Lee, K., Azmi, N., Hanaysha, J., Alzoubi, H., & Alshurideh, M. (2022a). The effect of digital supply chain on organizational performance: An empirical study in Malaysia manufacturing industry. Uncertain Supply Chain Management, 10(2), 495–510.

    Article  Google Scholar 

  • Lee, K. L., Romzi, P. N., Hanaysha, J. R., Alzoubi, H. M., & Alshurideh, M. (2022b). Investigating the impact of benefits and challenges of IOT adoption on supply chain performance and organizational performance: An empirical study in Malaysia. Uncertain Supply Chain Management, 10(2), 537–550. https://doi.org/10.5267/j.uscm.2021.11.009

    Article  Google Scholar 

  • Lee, S.-W., Hussain, S., Issa, G. F., Abbas, S., Ghazal, T. M., Sohail, T., Ahmad, M., & Khan, M. A. (2021). Multi-dimensional trust quantification by artificial agents through evidential fuzzy multi-criteria decision making. IEEE Access, 9, 159399–159412.

    Article  Google Scholar 

  • Li, Z. et al. (2017). Intrusion detection using convolutional neural networks for representation learning. In International conference on neural information processing.

    Google Scholar 

  • Liu, Y. et al. (2017). Fault injection attack on deep neural network. In Proceedings of the 36th international conference on computeraided design. IEEE Press.

    Google Scholar 

  • Matloob, F., Ghazal, T. M., Taleb, N., Aftab, S., Ahmad, M., Khan, M. A., Abbas, S., & Soomro, T. R. (2021). Software defect prediction using ensemble learning: A systematic literature review. IEEE Access.

    Google Scholar 

  • Mathew, A. et al. (2017). An improved transfer learning approach for intrusion detection. Procedia Computer Science, 115, 251–257.

    Google Scholar 

  • Mehmood, T. (2021). Does information technology competencies and fleet management practices lead to effective service delivery? Empirical evidence from E-commerce industry. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 14–41.

    Google Scholar 

  • Mehmood, T., Alzoubi, H. M., & Ahmed, G. (2019). Schumpeterian entrepreneurship theory: Evolution and relevance. Academy of Entrepreneurship Journal, 25(4).

    Google Scholar 

  • Miller, D. (2021). The best practice of teach computer science students to use paper prototyping. International Journal of Technology, Innovation and Management (IJTIM), 1(2), 42–63. https://doi.org/10.54489/ijtim.v1i2.17

  • Mondol, E. P. (2021). The impact of block chain and smart inventory system on supply chain performance at retail industry. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 56–76. https://doi.org/10.54489/ijcim.v1i1.30

  • Mohammadi, S., & Namadchian, A. (2017). A new deep learning approach for anomaly base IDS using memetic classifier. International Journal of Computers Communications & Control, 12(5), 677–688.

    Google Scholar 

  • Munoz-Gonza´lez, L. et al. (2017). Towards poisoning of deep learning algorithms with back-gradient optimization. In Proceedings of the 10th ACM workshop on artificial intelligence and security. ACM.

    Google Scholar 

  • Naqvi, R., Soomro, T. R., Alzoubi, H. M., Ghazal, T. M., & Alshurideh, M. T. (2021). The nexus between big data and decision-making: A study of big data techniques and technologies. The International Conference on Artificial Intelligence and Computer Vision, 838–853.

    Google Scholar 

  • Nuseir, M. T., Al Kurdi, B. H., Alshurideh, M. T., & Alzoubi, H. M. (2021). Gender discrimination at workplace: Do artificial intelligence (AI) and machine learning (ML) have opinions about it. The International Conference on Artificial Intelligence and Computer Vision, 301–316.

    Google Scholar 

  • Obaid, A. J. (2021). Assessment of smart home assistants as an IoT. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1), 18–36. https://doi.org/10.54489/ijcim.v1i1.34

  • Radwan, N., & Farouk, M. (2021). The growth of internet of things (IoT) in the management of healthcare issues and healthcare policy development. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 69–84. https://doi.org/10.54489/ijtim.v1i1.8

  • Rehman, E., Khan, M. A., Soomro, T. R., Taleb, N., Afifi, M. A., & Ghazal, T. M. (2021). Using blockchain to ensure trust between donor agencies and NGOs in under-developed countries. Computers, 10(8), 98.

    Article  Google Scholar 

  • Salloum, S. A., Alshurideh, M., Elnagar, A., & Shaalan, K. (2020). Machine learning and deep learning techniques for cybersecurity: A review. In Joint European-US Workshop on Applications of Invariance in Computer Vision (pp. 50–57).

    Google Scholar 

  • Saxe, J., & Berlin, K. (2015). Deep neural network-based malware detection using twodimensional binary program features. In 2015 10th international conference on malicious and unwanted software (MALWARE). IEEE.

    Google Scholar 

  • Shamout, M., Ben-Abdallah, B., Alshurideh, M., Alzoubi, H., Al Kurdi, B., & Hamadneh, S. (2022). A conceptual model for the adoption of autonomous robots in supply chain and logistics industry. Uncertain Supply Chain Management, 10, 1–16.

    Article  Google Scholar 

  • Shibahara, T. et al. (2016). Efficient dynamic malware analysis based on network behavior using deep learning. In 2016 IEEE on global communications conference (GLOBECOM). IEEE.

    Google Scholar 

  • Suleman, M., Soomro, T. R., Ghazal, T. M., & Alshurideh, M. (2021). Combating against potentially harmful mobile apps. The International Conference on Artificial Intelligence and Computer Vision, 154–173.

    Google Scholar 

  • Taormina, R., & Galelli, S. (2017). Real-time detection of cyberphysical attacks on water distribution systems using deep learning. In World environmental and water resources congress 2017.

    Google Scholar 

  • Tariq, E., Alshurideh, M., Akour, I., & Al-Hawary, S. (2022). The effect of digital marketing capabilities on organizational ambidexterity of the information technology sector. International Journal of Data and Network Science, 6(2), 401–408.

    Article  Google Scholar 

  • Thing, V. L. (2017). IEEE 802.11 network anomaly detection and attack classification: A deep learning approach. In 2017 IEEE on wireless communications and networking conference (WCNC). IEEE.

    Google Scholar 

  • Vinayakumar, R., Soman, K., & Poornachandran, P. (2017). Evaluating effectiveness of shallow and deep networks to intrusion detection system. In 2017 international conference on advances in computing, communications and informatics (ICACCI). IEEE.

    Google Scholar 

  • Wang, Q. et al. (2017). Adversary resistant deep neural networks with an application to malware detection. In Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. ACM.

    Google Scholar 

  • Wei, J., & Mendis, G. J. (2016). A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids. In Joint workshop on cyber-physical security and resilience in smart grids (CPSR-SG). IEEE.

    Google Scholar 

  • Wu, T. et al. (2017). Twitter spam detection based on deep learning. In Proceedings of the Australasian computer science week multiconference. ACM.

    Google Scholar 

  • Yuan, X., Li, C., & Li, X. (2017). Deep Defense: identifying DDoS attack via deep learning. In 2017 IEEE international conference on smart computing (SMARTCOMP). IEEE.

    Google Scholar 

  • Zolotukhin, M. et al. (2016). Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic. In 2016 23rd international conference on telecommunications (ICT). IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haitham M. Alzoubi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ghazal, T.M. et al. (2023). Machine Learning-Based Intrusion Detection Approaches for Secured Internet of Things. In: Alshurideh, M., Al Kurdi , B.H., Masa’deh, R., Alzoubi , H.M., Salloum, S. (eds) The Effect of Information Technology on Business and Marketing Intelligence Systems. Studies in Computational Intelligence, vol 1056. Springer, Cham. https://doi.org/10.1007/978-3-031-12382-5_110

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-12382-5_110

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-12381-8

  • Online ISBN: 978-3-031-12382-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics