Skip to main content

A Review of the Progressive Odyssey of AI-Driven Intrusion Detection Within Embedded Systems

  • Conference paper
  • First Online:
Risks and Security of Internet and Systems (CRiSIS 2023)

Abstract

Security of Embedded Systems (ES) has become a major concern due to their growing usage in numerous industries. Their connectivity to the internet made them vulnerable to sophisticated cyber-attacks. One of the most important strategies for strengthening their security posture is using Intrusion Detection Systems (IDS). However, the limited resources of ES make it difficult to utilize IDS. This paper reviews the primary studies that contributed to developing IDS systems applicable to ES. It examines the challenges of building such systems, reports the current trends, and proposes future recommendations to enhance the deployment of IDS in ES. The findings showed that most studies currently employ machine and deep learning algorithms to build IDS for ES. Although significant results were achieved, several gaps were reported. The proposed frameworks did not investigate the security, privacy, and interpretability concerns of employing machine and deep learning. Moreover, a feasible framework to address all the ES resource constraints is lacking. Future recommendations include solutions to enhance such models’ security, privacy, and interoperability. Moreover, it includes the employment of differential privacy, explainable artificial intelligence, federated learning, and trusted executed environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Vahid, F., Givargis, T.D.: Embedded System Design: A Unified Hardware/Software Introduction. Wiley, New York (2001)

    Google Scholar 

  2. Papp, D., Ma, Z., Buttyan, L.: Embedded systems security: threats, vulnerabilities, and attack taxonomy. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), Izmir, Turkey, pp. 145-152 (2015)

    Google Scholar 

  3. Hammoudeh, M., Newman, R.: Information extraction from sensor networks using the Watershed transform algorithm. Inf. Fusion 22, 39–49 (2015)

    Article  Google Scholar 

  4. Ambrose, J.A., Ragel, R.G., Jayasinghe, D., Li, T., Parameswaran, S.: Side channel attacks in embedded systems: a tale of hostilities and deterrence. In: Sixteenth International Symposium on Quality Electronic Design, Santa Clara, CA, USA, pp. 452–459 (2015)

    Google Scholar 

  5. Azzedin, F., Albinali, H.: Security in Internet of Things: RPL attacks taxonomy. In: The 5th International Conference on Future Networks & Distributed Systems, pp. 820–825 (2021)

    Google Scholar 

  6. Azzedin, F., Alhejri, I.: A layered taxonomy of internet of things attacks. In: Proceedings of the 6th International Conference on Future Networks & Distributed Systems, pp. 631–636 (2022)

    Google Scholar 

  7. Epiphaniou, G., Pillai, P., Bottarelli, M., Al-Khateeb, H., Hammoudesh, M., Maple, C.: Electronic regulation of data sharing and processing using smart ledger technologies for supply-chain security. IEEE Trans. Eng. Manage. 67(4), 1059–1073 (2020)

    Article  Google Scholar 

  8. Benoudifa, O., Wakrime, A.A., Benaini, R.: Autonomous solution for controller placement problem of software-defined networking using MuZero based intelligent agents. J. King Saud Univ.-Comput. Inf. Sci. 35(10), 101842 (2023)

    Google Scholar 

  9. Saadatmand, M., Cicchetti, A., Sjödin, M.: On generating security implementations from models of embedded systems. In: International Conference on Software Engineering Advances, Barcelona, Spain, (2011)

    Google Scholar 

  10. Cysneiros, L.M., do Prado Leite, J.C.S.: Nonfunctional requirements: from elicitation to conceptual models. IEEE Trans. Softw. Eng. 30(5), 328–350 (2004)

    Google Scholar 

  11. Gala, Y., Vanjari, N., Doshi, D., Radhanpurwala, I.: AI based techniques for network-based intrusion detection system: a review. In: 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 1544–1551 (2023)

    Google Scholar 

  12. Sethi, K., Kumar, R., Prajapati, N., Bera, P.: A lightweight intrusion detection system using Benford’s law and network flow size difference. In: 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), Bengaluru, India, pp. 1–6 (2020)

    Google Scholar 

  13. Carlin, A., Hammoudeh, M., Aldabbas, O.: Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges. Int. J. Adv. Comput. Sci. Appl. 6(6) (2015)

    Google Scholar 

  14. Lahbib, A., Ait Wakrime, A., Laouiti, A., Toumi, K., Martin, S.: An event-B based approach for formal modelling and verification of smart contracts. In: Advanced Information Networking and Applications: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020), pp. 1303–1318 (2020)

    Google Scholar 

  15. Aloseel, A., He, H., Shaw, C., Khan, M.A.: Analytical review of cybersecurity for embedded systems. IEEE Access 9, 961–982 (2021)

    Article  Google Scholar 

  16. Bansod, G., Raval, N., Pisharoty, N.: Implementation of a new lightweight encryption design for embedded security. IEEE Trans. Inf. Forensics Secur. 10(1), 142–151 (2015)

    Article  Google Scholar 

  17. Koopman, P.: Embedded System Security. Computer 37(7), 95–97 (2004)

    Article  Google Scholar 

  18. National Institute of Standards and Technology. https://www.nist.gov/publications/intrusion-detection-systems

  19. Binbusayyis, A., Vaiyapuri, T.: Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection. Heliyon 6(7), e04262 (2020)

    Google Scholar 

  20. Kumar, S., Gupta, S., Arora, S.: Research trends in network-based intrusion detection systems: a review. IEEE Access 9, 157761–157779 (2021)

    Article  Google Scholar 

  21. Aloseel, A., He, H., Shaw, C., Khan, M.A.: Analytical review of cybersecurity for embedded systems. IEEE Access 9, 961–982 (2020)

    Article  Google Scholar 

  22. Ghorbani, A.A., Lu, W., Tavallaee, M.: Network Intrusion Detection and Prevention: Concepts and Techniques. Springer Science & Business Media, 47 (2009). https://doi.org/10.1007/978-0-387-88771-5

  23. Anchugam, C.V., Thangadurai, K.: Classification of network attacks and countermeasures of different attacks. In: Network Security Attacks and Countermeasures, pp. 115–156. IGI Global (2016)

    Google Scholar 

  24. Agrawal, S., et al.: Federated Learning for Intrusion Detection System: Concepts. Challenges and Future Directions, Computer Communications (2022)

    Google Scholar 

  25. Butt, M.A., Qayyum, A., Ali, H., Al-Fuqaha, A., Qadir, J.: Towards secure private and trustworthy human-centric embedded machine learning: an emotion-aware facial recognition case study. Comput. Secur. 125, 103058 (2023)

    Article  Google Scholar 

  26. Hammoudeh, M., Newman, R., Dennett, C., Mount, S., Aldabbas, O.: Map as a service: a framework for visualising and maximising information return from multi-modal wireless sensor networks. Sensors 15(9), 22970–23003 (2015)

    Article  Google Scholar 

  27. Balasaraswathi, V.R., Sugumaran, M., Hamid, Y.: Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. J. Commun. Inf. Netw. 2, 107–119 (2017)

    Article  Google Scholar 

  28. Walshe, M., Epiphaniou, G., Al-Khateeb, H., Hammoudeh, M., Katos, V., Dehghantanha, A.: Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Netw. 95, 101988 (2019)

    Article  Google Scholar 

  29. Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20), 4396 (2019)

    Article  Google Scholar 

  30. Sharmila, B.S., Nagapadma, R.: Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset. Cybersecurity 6(1), 41 (2023)

    Article  Google Scholar 

  31. Mahbooba, B., Timilsina, M., Sahal, R., Serrano, M.: Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity 2021, 1–11 (2021)

    Google Scholar 

  32. Martinez, C.V., Vogel-Heuser, B.: A host intrusion detection system architecture for embedded industrial devices. J. Franklin Inst. 358(1), 210–236 (2021)

    Article  Google Scholar 

  33. Reyes, D.L., Perez-Pons, A., Dean, R.B.: Anomaly detection in embedded devices through hardware introspection. In: 2023 Silicon Valley Cybersecurity Conference (SVCC), pp. 1–7, IEEE, San Jose, CA, USA (2023)

    Google Scholar 

  34. de Almeida Florencio, F., Moreno, E.D., Macedo, H.T., de Britto Salgueiro, R.J.P., do Nascimento, F.B., Santos, F.A.O.: Intrusion detection via MLP neural network using an arduino embedded system. In: 2018 VIII Brazilian Symposium on Computing Systems Engineering (SBESC), pp. 190–195. IEEE, Salvador, Brazil (2018)

    Google Scholar 

  35. Liu, M., Xue, Z., He, X.: Two-tier intrusion detection framework for embedded systems. IEEE Consum. Electron. Mag. 10(5), 102–108 (2020)

    Article  Google Scholar 

  36. Khan, H.A., et al.: IDEA: intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems. IEEE Trans. Dependable Secure Comput. 18(3), 1150–1163 (2019)

    Google Scholar 

  37. Kadar, M., Tverdyshev, S., Fohler, G.: Towards host intrusion detection for embedded industrial systems. In: 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), pp. 5–8. IEEE, Valencia, Spain (2020)

    Google Scholar 

  38. Viegas, E., Santin, A., Oliveira, L., Franca, A., Jasinski, R., Pedroni, V.: A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems. Comput. Secur. 78, 16–32 (2018)

    Article  Google Scholar 

  39. Viegas, E.K., Santin, A.O., Oliveira, L.S.: Toward a reliable anomaly-based intrusion detection in real-world environments. Comput. Netw. 127, 200–216 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Hammoudeh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alansari, A., Alfaqeer, R., Hammoudeh, M. (2024). A Review of the Progressive Odyssey of AI-Driven Intrusion Detection Within Embedded Systems. In: Ait Wakrime, A., Navarro-Arribas, G., Cuppens, F., Cuppens, N., Benaini, R. (eds) Risks and Security of Internet and Systems. CRiSIS 2023. Lecture Notes in Computer Science, vol 14529. Springer, Cham. https://doi.org/10.1007/978-3-031-61231-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-61231-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-61230-5

  • Online ISBN: 978-3-031-61231-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics