Abstract
Globally, data security and privacy over the Internet of Things (IoT) are necessary due to its emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT security is significant. The nature of attacks is dynamic, and addressing this requires designing dynamic methods and a self-adaptable scheme to discover security attacks from malicious use of IoT equipment. The best detection mechanism against attacks from compromised IoT devices includes machine learning techniques. This study emphasizes the latest literature on attack types and uses a scheme based on machine learning for network support in IoT and intrusion detection. Therefore, the current work includes a thorough analysis of multiple intelligence methods and their deployed architectures of network intrusion detection, focusing on IoT attacks and machine learning-based intrusion detection schemes. Moreover, it explores methods based on machine learning appropriate for identifying IoT devices associated with cyber attacks.
Similar content being viewed by others
Change history
13 February 2024
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11227-024-05973-6
References
Sundmaeker H, Guillemin P, Friess P, Woelfflé S (2010) Vision and challenges for realising the internet of things. Cluster Eur Res Projects Internet Things Eur Commision 3:34–36
Amaral LA, Hessel FP, Bezerra EA, Corrêa JC, Longhi OB, Dias TFO (2011) eCloudRFID–A mobile software framework architecture for pervasive RFID-based applications. J Netw Comput Appl 34:972–979. https://doi.org/10.1016/j.jnca.2010.04.005
Johannes D, Heineke K, Reinbacher T, Wee D (2018) The internet of things: how to capture the value of IoT. Technical Report pp. 1–124
Mosenia A, Jha NK (2016) A comprehensive study of security of Internet-of-Things. IEEE Trans Emerg Topics Comput 5:586–602
M Young 1989 Checklist before starting the analysis 2 In: The Technical Writer’s Handbook University Science Mill Valley: CA
Yousuf O, Mir RN (2019) A survey on the internet of things security: State-of-art, architecture, issues and countermeasures. Inf Comput Secur 27:292–323
Karsligil ME, Yavuz AG, Guvensan MA, Hanifi K, Bank B (2017) Network intrusion detection using machine learning anomaly detection algorithms. In: 25th Signal Processing Commun Applications Conf (SIU), IEEE. https://doi.org/10.1109/siu.2017.7960616
Yang Z, Yue Y, Yang Y, Peng Y, Xiaobo et al. (2011) Study and application on the architecture and key technologies for IoT. In: 2011 Int Conf Multimed Technol, IEEE, pp. 747–751
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54:2787–2805
Torkaman A, Seyyedi MA (2016) Analyzing IoT reference architecture models. Int J Comput Sci Softw Eng 5:154
Chaqfeh MA, Mohamed N (2012) Challenges in middleware solutions for the Internet of Things. In: 2012 Int Conf Collaboration Technol Syst (CTS), pp. 21–26, IEEE
Moustafa N, Creech G, Sitnikova E, Keshk M (2017) Collaborative anomaly detection framework for handling big data of cloud computing. In: 2017 Military Commun Inf Syst Conf (MilCIS), pp. 1–6, IEEE
Moustafa N, Choo KR, Radwan I, Camtepe S (2019) Outlier dirichlet mixture mechanism: adversarial statistical learning for anomaly detection in the fog. IEEE Trans Inf Foren Secur 14:1975–1987
Li F, Han Y, Jin C (2016) Practical access control for sensor networks in the context of the internet of things. Comput Commun 89–90:154–164. https://doi.org/10.1016/j.comcom.2016.03.007
Sudqi Khater B, Wahid A, Idris M, Hussain M, Ibrahim AA (2019) A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9:178. https://doi.org/10.3390/app9010178
Sicari S, Rizzardi A, Grieco LA, Cen-Porisini A (2015) Security, privacy and trust in internet of things: The road ahead. Comput Netw 76:146–164
Asharf J, Moustafa N, Khurshid H, Debie E, Haider W, Wahab A (2020) A review of intrusion detection systems using machine and deep learning in internet of things: challenges, solutions and future directions. Electronics 9:1177
Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743. https://doi.org/10.1109/ACCESS.2019.2924045
Sharma V, You I, Andersson K, Palmieri F, Rehmani MH, Lim J (2019) Security, privacy and trust for smart mobile-Internet of Things (M-IoT): a survey. IEEE Access 8:167123–167163. https://doi.org/10.1109/ACCESS.2020.3022661
Liao B, Ali Y, Nazir S, He L, Khan HU (2020) Security analysis of IoT devices by using mobile computing: a systematic literature review. IEEE Access 8:120331–120350. https://doi.org/10.1109/ACCESS.2020.3006358
Nandy T, Idris MYIB, Md Noor R, Mat Kiah L, Lun LS, Annuar Juma’at NB, Ahmedy I, Abdul Ghani N, Bhattacharyya S, (2019) Review on security of internet of things authentication mechanism. IEEE Access 7:151054–151089. https://doi.org/10.1109/ACCESS.2019.2947723
Sen S, Clark JA (2011) Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Comput Netw 55:3441–3457
Keshk M, Moustafa N, Sitnikova E, Creech G (2017) Privacy preservation intrusion detection technique for SCADA systems. In: 2017 Military Commun Inf Syst Conf (MilCIS) IEEE pp. 1–6
Zhao K, Ge L (2013) A survey on the internet of things security. Comput Intell Secur (CIS) 10
Kumar JS, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90:11
Suo H, Wan J, Zou JC, Liu J (2012) Security in the internet of things: a review. In: Proc 2012 Int Conf Comput Sci Electron Eng Hangzhou China, 3: 648–651
Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 14:199–221
Zarpelão BB, Miani RS, Kawakani CT, Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25–37
Da Costa KAP et al (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157
Kolias CG, Kambourakis AS, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50:80–84
Garadi A, Mohamed MA, Al-Ali A, Du A, Guizani M (2018) A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv:1807.11023
Kolias C, Stavrou A, Voas J, Bojanova I, Kuhn R (2016) Learning Internet-of-Things security hands-on. IEEE Secur Privacy 14:37–46
Marsden T, Moustafa N, Sitnikova E, Creech G (2017) Probability risk identification-based intrusion detection system for SCADA systems. In: Int Conf Mobile Netw Manag pp. 353–363
Moustafa N, Misra G, Slay J (2021) Generalized outlier gaussian mixture technique based on automated association features for simulating and detecting web application attacks. IEEE Trans Sustain Comput 6(2):245–256. https://doi.org/10.1109/TSUSC.2018.2808430
Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36:42–57
Rizwan R, Khan FA, Abbas H, Chauhdary SH (2015) Anomaly detection in wireless sensor networks using immune-based bioinspired mechanism. Int J Distribut Sens Netw 2015:11–10
Moustafa N, Creech G, Slay J (2018) Anomaly detection system using beta mixture models and outlier detection. Progress in Computing. Springer, Analytics and Networking, pp 125–135
Butun I, Morgera SD, Sankar R (2013) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16:266–282
Mitchell R, Chen I (2014) A survey of intrusion detection techniques for cyber-physical systems. ACM Comput Surv (CSUR) 46:1–29
Mishra A, Nadkarni K, Patcha A (2004) Intrusion detection in wireless ad hoc networks. IEEE Wirel Commun 11:48–60
Elrawy M, Awad A, Hamed H (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comp 7:21. https://doi.org/10.1186/s13677-018-0123-6
Benkhelifa E, Welsh T, Hamouda W (2018) A critical review of practices and challenges in intrusion detection systems for IoT: toward universal and resilient systems. IEEE Commun Surv Tutor 20:3496–3509
Abduvaliyev A, Pathan AK, Zhou J, Roman R, Wong W (2013) On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 15:1223–1237
Anantvalee T, Wu J (2007) A survey on intrusion detection in mobile ad hoc networks. Wireless Network Security. Springer, Boston, MA, pp 159–180
Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Secur Commun Netw 9:2484–2556
Lawal MA, Hassan SRA, SR (2020) Security analysis of network anomalies mitigation schemes in IoT networks. IEEE Access 8:43355–43374
Garg S, Kaur K, Batra S, Kaddoum G, Kumar N, Boukerche A (2020) A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications. Future Generation Comput Syst 104:105–118
Garg S, Kaur K, Kumar N, Kaddoum G, Zomaya A, Ranjan R (2019) A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans Netw Service Manag 16:24–935
Cirani S et al (2014) A scalable and self-configuring architecture for service discovery in the internet of things. IEEE Internet of Things J 1:508–521
Wu M, Lu T-J, Ling F-Y, Sun J, Du H-Y (2010) Research on the architecture of Internet of Things. Int Conf Adv Comput Theory Eng ICACTE 5:484–487. https://doi.org/10.1109/ICACTE.2010.5579493
Sethi P, Sarangi S (2017) Internet of things: architectures, protocols, and applications. J Electric Comput Eng 2017:1–25
Khan MA, Muhammad K, Sharif M, Akram T, Kadry S (2021) Intelligent fusion-assisted skin lesion localization and classification for smart healthcare. Neural Comput Appl. https://doi.org/10.1007/s00521-021-06490-w
Vacca J (2013) Computer and information security handbook. Morgan Kaufmann, Amsterdam
Ning J, Xu J, Liang K, Zhang F, Chang EC (2018) Passive attacks against searchable encryption. IEEE Trans Inf Forensics Secur 14(3):789–802
Faruki P, Bharmal A, Laxmi V, Ganmoor V, Gaur MS, Conti M, Rajarajan M (2014) Android security: a survey of issues, malware penetration, and defenses. IEEE Commun Surv Tutor 17:998–1022
Hemant N, Nihan S, Suresh, (2021) Survey on cyber attack. IRJCS Int Res J Comput Sci 8(4):97–101
Lounis K, Zulkernine M (2020) Attacks and defenses in short-range wireless technologies for IoT. IEEE Access 8:88892–88932
Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: 2017 International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), IEEE, Palladam, India, pp. 32–37. https://doi.org/10.1109/I-SMAC.2017.8058363
Rajan A, Jithish J, Sankaran S (2017) Sybil attack in IoT: modelling and defenses. In: 2017 Int Conf Adv Comput, Commun Informatics (ICACCI) pp. 2323–2327
Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 18:459–473
Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surv Tutor 22:1646–1685
Khanam S, Ahmedy I, Idris M, Jaward M, Sabri A (2020) A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access. https://doi.org/10.1109/ACCESS.2020.3037359
Singh A, Patro B (2019) Security of low computing power devices: a survey of requirements, challenges & possible solutions. Cybern Inf Technol 19:133–164. https://doi.org/10.2478/cait-2019-0008
Sun L, Wang X, Wang J, Liu M, Xia G (2020) RELAP5 foresight thermal-hydraulic analysis of hypothesis passive safety injection system under LOCA for an existing NPP in China. Sci Technol Nuclear Install 2020:1–14
Heydt-Benjamin TS, Bailey DV, Fu K, Juels A, O’Hare T (2007) Vulnerabilities in first-generation RFID-enabled credit cards. In: Dietrich S, Dhamija R (eds) Financial Cryptography and Data Security. FC 2007. Lecture Notes in Computer Science, p. 4886, Springer, Berlin: Heidelberg
Amin YM, Abdel-Hamid AT (2016) A comprehensive taxonomy and analysis of IEEE 802. 15. 4 attacks. J Electr Comput Eng 2016:4
Bicakci K, Tavli B (2009) Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput Stand Interfaces 31:931–941
Kumar A, Varadarajan V, Kumar A, Dadheech P, Choudhary SS, Kumar VA, Veluvolu KC (2021) Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocess Microsyst 80:103352
Mathur A, Newe T, Rao M (2016) Defence against black hole and selective forwarding attacks for medical WSNs in the IoT. Sensors 16:118
Attique Khan M, Sharif M, Akram T, Kadry S, Hsu C-H (2021) A two-stream deep neural network-based intelligent system for complex skin cancer types classification. Int J Intell Syst. https://doi.org/10.1002/int.22691
Abdul-Ghani HA, Konstantas D, Mahyoub M (2018) A comprehensive IoT attacks survey based on a building-blocked reference model. Int J Adv Comput Sci Appl 9:355–373
Hamza A, Gharakheili HH, Sivaraman V (2020) IoT network security: requirements, threats, and countermeasures. arXiv preprint arXiv:2008.09339
Farooq M, Waseem M, Khairi A, Mazhar P (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111:1–6. https://doi.org/10.5120/19547-1280
Mitropoulos D, Spinellis D (2017) Fatal injection: A survey of modern code injection attack countermeasures. Peer J Comput Sci 3:e136
Aman MN, Sikdar B, Chua KC, Ali A (2018) Low power data integrity in IoT systems. IEEE Internet of Things J 5:3102–3113
Staddon E, Loscri V, Mitton N (2021) Attack categorisation for IoT applications in critical infrastructures, a Survey. Appl Sci 11:7228
Liang X, Kim Y (2021) A survey on security attacks and solutions in the IoT network, 2021 IEEE 11th Ann Comput Commun Workshop Conf (CCWC), pp. 0853–0859
Hoang TM, Duong TQ, Tuan HD, Lambotharan S, Hanzo L (2021) Physical layer security: detection of active eavesdropping attacks by support vector machines. IEEE Access 9:31595–31607
Xu L, Chen J, Liu M, Wang X (2019) Active eavesdropping detection based on large-dimensional random matrix theory for massive MIMO-enabled IoT. Electronics 8:146
Patel A, Qassim Q, Wills C (2010) A survey of intrusion detection and prevention systems. Inf Manag Comput Secur 18:277–290
Hanif, M. A., Akram, T., Shahzad, A., Tariq, U., Choi, J. I., & Zulfiqar, Z (2021). Smart Devices Based Multisensory Approach for Complex Human Activity Recognition. CMC 1–15.
Alladi T et al (2021) Artificial intelligence (AI)-empowered intrusion detection architecture for the internet of vehicles. IEEE Wirel Commun 28:144–149
Creech G, Hu J (2014) A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans Comput 63:807–819
Macia-Perez F, Mora-Gimeno FJ, Marcos-Jorquera D, Gil-Martinez-Abarca JA, Ramos-Morillo H, Lorenzo-Fonseca, (2011) Network intrusion detection system embedded on a smart sensor. IEEE Trans Ind Electron 58:722–732
Santos L, Gonçalves R, Rabadao C, Martins J (2021) A flow-based intrusion detection framework for Internet of Things networks. Cluster Comput 1–21
Ioulianou P, Vasilakis V, Moscholios I, Logothetis M (2018) A signature-based intrusion detection system for the internet of things. Paper presented at Information and Communication Technology Form, Graz, Austria
Kumar V, Sangwan OP (2012) Signature based intrusion detection system using SNORT. Int J Comput Appl Inf Technol 1:35–41
Eskandari M, Janjua ZH, Vecchio M, Antonelli F (2020) Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE internet of things J 7:6882–6897. https://doi.org/10.1109/JIOT.2020.2970501
Muna AL-H, Moustafa N, Sitnikova E (2018) Identification of malicious activities in industrial internet of things based on deep learning models. J Inf Secur Appl 41:1–11
Ashraf, A. H., Imran, M., Qahtani, A. M., Alsufyani, A., Almutiry, O., Mahmood, A., & Habib, M (2021). Weapons Detection for Security and Video Surveillance Using CNN and YOLO-V5s. CMC 1–15.
Kumar S, Gautam OH (2016) Computational neural network regression model for host based intrusion detection system. Perspect Sci 8:93–95
Moore MR., Bridges RA, Combs FL, Starr MS, Prowell SJ (2017) Modeling inter-signal arrival times for accurate detection of can bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (pp. 1–4)
Olufowobi H, Young C, Zambreno J, Bloom G (2019) Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing. IEEE Trans Vehicular Technol 69:1484–1494
Kumar S, Spafford EH (1996) A pattern matching model for misuse intrusion detection. The COAST Project, Purdue University
Kumar S, Spafford EH (1994) An application of pattern matching in intrusion detection. In: Technical Report 94-013, Dept. of Computer Science, Purdue University
Kumar V, Das AK, Sinha D (2020) Statistical analysis of the UNSW-NB15 dataset for intrusion detection. Computational intelligence in pattern recognition. Springer, Singapore, pp 279–294
Mehmood A, Khanan A, Umar MM, Abdullah S, Ariffin KAZ, Song H (2017) Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6:5688–5694
Rahman MA, Taufiq Asyhari A, Leong LS, Satrya GB, Hai Tao M, Zolkipli MF (2020) Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc 61:102324
Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the Internet of Things. Proc IEEE World Congr Services, Jun 2015:21–28. https://doi.org/10.1109/SERVICES.2015.12
Alsaadi E, Tubaishat A (2015) Internet of things: features, challenges, and vulnerabilities. Int J Adv Comput Sci Inform Technol 4(1):1–13
Sabeel U, Chandra N (2013) Categorized security threats in the wireless sensor networks. Countermeas Security Manag Schem 64:19–28
Hummen R, Hiller J, Wirtz H, Henze M, Shafagh H, Wehrle K (2013) 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proc 6th ACM Conf Secur Privacy Wirel Mobile Netw, pp. 55–66
Vacca JR (2012) Computer and information security handbook. Newnes
Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo KKR (2019) A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Trans Ind Inform 16:5110–5118
Liu C, Yang J, Chen R, Zhang Y, Zeng J (2011) Research on immunity-based intrusion detection technology for the internet of things. Int Conf Natural Comput IEEE 1:212–216
Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-service detection in 6LoWPAN based internet of things. In: 2013 IEEE 9th Int Conf Wirel Mobile Comput, Netw Commun (WiMob), pp. 600–607
Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) An IDS framework for Internet of Things empowered by 6LoWPAN. In Proc 2013 ACM SIGSAC Conf Comput Commun Secur, pp. 1337–1340
Oh D, Kim D, Ro WW (2014) A malicious pattern detection engine for embedded security systems in the internet of things. Sensors 14:24188–24211
Keshk M, Moustafa N, Turnbull SE, B (2018) Privacy-preserving big data analytics for cyber-physical systems. Wirel Netw. https://doi.org/10.1007/s11276-018-01912-5
Debar H (2000) An introduction to intrusion-detection systems. In: Proc Connect 2000
Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (IDPS). NIST Spec Publ 800:94
Amaral JP, Oliveira LM, Rodrigues JJ, Han G, Shu L (2014) Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In: 2014 IEEE Int Conf Commun (ICC), pp. 1796–1801
Raza S, Wallgren L, Voigt T (2013) SVELTE: Real-time intrusion detection in the internet of things. Ad hoc Netw 11:2661–2674
Ahmim A, Derdour M, Ferrag MA (2018) An intrusion detection system based on combining probability predictions of a tree of classifiers. Int J Commun Syst 31:e3547
Setiadi FF, Kesiman MWA, Aryanto KYE (2021) Detection of dos attacks using naive Bayes method based on Internet of Things (IoT). In: J Physics: Conf Series 1810:012013. IOP Publishing
Mukherjee S, Sharma N (2017) Intrusion detection using naive Bayes classifier with feature reduction. Procedia Technol 4:119–128
Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. Procedia Comput Sci 60:708–713
Swarnkar M, Hubballi N (2016) OCPAD: One class naive Bayes classifier for payload-based anomaly detection. Expert Syst with Appl 64:330–339
Kanwal S, Shah JH, Khan MA, Nisa M, Kadry S, Sharif M, Maheswari M (2021) Person re-identification using adversarial haze attack and defense: a deep learning framework. Comput Electric Eng 96:107542
Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497
Majid, A., Khan, M. A., Nam, Y., Tariq, U., Roy, S., Mostafa, R. R., & Sakr, R. H. (2021). COVID19 classification using CT images via ensembles of deep learning models. Computers, Materials and Continua, pp. 319–337.
Mugunthan SR (2020) Decision tree based interference recognition for fog enabled IoT architecture. J Trends Comput Sci Smart Technol (TCSST) 2:15–25
Du W, Zhan Z (2002) Building decision tree classifier on private data. Proc IEEE Int Conf Privacy, Secur Data Min, Aus Comput Soc Inc, Sydney, Aus 14:1–8
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8:1210
Manhas J, Kotwal S (2021) Implementation of intrusion detection system for internet of things using machine learning techniques. Multimedia SECURITY. Springer, Singapore, pp 217–237
Goeschel K (2016) Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis. In: SoutheastCon, IEEE, 1–6
Li W, Yi P, Wu Y, Pan L, Li J (2014) A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J Electric Comput Eng. https://doi.org/10.1155/2014/240217
Farahani G (2021) Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Secur Commun Netw. https://doi.org/10.1155/2021/8814141
Xu H, Przystupa K, Fang C, Marciniak A, Kochan O, Beshley M (2020) A combination strategy of feature selection based on an integrated optimization algorithm and weighted K-nearest neighbor to improve the performance of network intrusion detection. Electronics 9:1206
Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo K-KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7:314–323
Tong S, Koller D (2001) Support vector machine active learning with applications to text classification. J Mach Learn Res 2:45–66
Jing D, Chen H (2019) SVM based network intrusion detection for the UNSW-NB15 dataset. 2019 IEEE 13th Int Conf ASIC (ASICON), pp. 1–4
Rehman, M. U., Ahmed, F., Khan, M. A., Tariq, U., Alfouzan, F. A., Alzahrani, N. M., & Ahmad, J (2021). Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks. CMC pp. 1–15.
Liu Y, Pi D (2017) A novel kernel SVM algorithm with game theory for network intrusion detection. KSII Trans Internet Inf Syst 11:4043
Hu W, Liao Y, Vemuri VR (2003) Robust support vector machines for anomaly detection in computer security. In: ICMLA pp. 168–174
Wagner C, François J, Engel T (2011) Machine learning approach for IP-flow record anomaly detection. Int Conf Res Networking. Springer, Berlin, Heidelberg, pp 28–39
Garg S, Kaur K, Kaddoum G, Gagnon F, Kumar N, Han Z (2019) Sec-IoV: A multi-stage anomaly detection scheme for Internet of vehicles, In: Proc ACM MobiHoc Workshop Pervasive Syst IoT Era, pp. 37–42
Torres JM, Comesaña CI, Garcia-Nieto PJ (2019) Machine learning techniques applied to cybersecurity. Int J Mach Learn Cybernet 10:2823–2836
Ioannou C, Vassiliou V (2019) Classifying security attacks in IoT networks using supervised learning. In: 2019 15th Int Conf Distributed Comput Sensor Syst, IEEE, pp. 652–658
Lin K-C, Chen S, Hung JC (2014) Botnet detection using support vector machines with artificial fish swarm algorithm. J Appl Math. https://doi.org/10.1155/2014/986428
Breiman L (2001) Random forests. Mach Learning 45:5–32
Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2017) Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17:1976
Chen, Y., Tao, J., Zhang, Q., Yang, K., Chen, X., Xiong, J., & Xie, J. (2020). Saliency detection via the improved hierarchical principal component analysis method. Wireless communications and mobile computing, 2020.
Islam N, Farhin F, Sultana I, Kaiser MS, Rahman MS, Mahmud M, Sanwar Hosen ASM, Cho GH (2021) Towards machine learning based intrusion detection in IoT networks. Comput Mater Contin 69:1801–1821
Zhang J, Zulkernine M (2006) A hybrid network intrusion detection technique using random forests, In First Int Conf on Availability, Reliability Secur (ARES '06), IEEE, p. 8
Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer Internet of Things devices. In: 2018 IEEE Secur Privacy Workshops (SPW), pp. 29–35
Meidan Y, Bohadana M, Shabtai A, Ochoa M, Tippenhauer NO, et al. (2017) Detection of unauthorized IoT devices using machine learning techniques. arXiv preprint arXiv, 1709.04647
Woźniak M, Grana M, Corchado E (2014) A survey of multiple classifier systems as hybrid systems. Inf Fusion 16:3–17
Illy P, Kaddoum G, Moreira CM, Kaur K, Garg S (2019) Securing fog-to-things environment using intrusion detection system based on ensemble learning. In: 2019 IEEE Wirel Commun Netw Conf (WCNC), pp. 1–7
Domingos P (2012) A few useful things to know about machine learning. Commun ACM 55:78–87
Zhang H, Liu D, Luo Y, Wang D (2012) Adaptive dynamic programming for control: algorithms and stability. Springer Sci Bus Media
Baba MN, Makhtar M, Fadzli SA, Awang MK (2015) Current issues in ensemble methods and its applications. J Theoretical Appl Technol 81:266
Santana L, Silva L, Canuto AMP, Pintro F, Vale KMO (2010) A comparative analysis of genetic algorithm and ant colony optimization to select attributes for an heterogeneous ensemble of classifiers. In: IEEE Congress Evolutionary Comput, pp. 1–8
Aburomman AA, Reaz MBI (2016) A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl Soft Comput 38:360–372
Gaikwad DP, Thool RC (2015) Intrusion detection system using bagging ensemble method of machine learning. In: 2015 Int Conf Comput Commun Control Automation, IEEE, pp. 291–295
Irshad M, Sharif M, Yasmin M, Rehman A, Khan MA (2021) Discrete light sheet microscopic segmentation of left ventricle using morphological tuning and active contours. Microscopy Res Tech. https://doi.org/10.1002/jemt.23906
Bosman HHWJ, Iacca G, Tejada A, Wörtche HF, Liotta A (2015) Ensembles of incremental learners to detect anomalies in ad hoc sensor networks. Ad Hoc Netw 35:14–36
Hussain N, Khan MA, Kadry S, Tariq U, Mostafa RR, Choi JI, Nam Y (2021) Intelligent deep learning and improved whale optimization algorithm based framework for object recognition. Hum Cent Comput Inf Sci 11:34
Hartigan J, Wong MA (1979) AK-means clustering algorithm. J Royal Stat Soc: Series C Appl Stat 28:100–108
Bhuyan M, Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16:303–336
Kanjanawattana S (2019) A novel outlier detection applied to an adaptive k-means. Int J Mach Learning Comput 9:569–574
Muniyandi AP, Rajeswari R, Rajaram R (2012) Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithms. Procedia Eng 30:174–182
Alharbi S, Rodriguez P, Maharaja R, Iyer P, Subaschandrabose N, Ye Z (2017) Secure the Internet of Things with challenge response authentication in fog computing. In: 2017 IEEE 36th Int Performance Comput Commun Conf (IPCCC), pp. 1–2
Cintuglu MH, Mohammed OA, Akkaya K, Uluagac AS (2016) A survey on smart grid cyber-physical system testbeds. IEEE Commun Surv Tutor 19:446
Sellappan D, Srinivasan R (2020) Association rule-mining-based intrusion detection system with entropy-based feature selection: Intrusion detection system. In Handbook of Research on Intelligent Data Processing and Information Security Systems, IGI Global, pp. 1–24
Markam V, Dubey LSM (2012) A general study of associations rule mining in intrusion detection system. Int J Emerg Technol Adv Eng 2:347–356
Manimurugan S (2021) IoT-fog-cloud model for anomaly detection using improved naïve Bayes and principal component analysis. J Ambient Intell Humanized Comput, pp. 1–10
Zhao S, Li W, Zia T, Zomaya AY (2017) A dimension reduction model and classifier for anomaly-based intrusion detection in Internet of Things. In: 2017 IEEE 15th Intl Conf Dependable, Autonomic Secure Comput, 15th Intl Conf Pervasive Intell Comput, 3rd Intl Conf Big Data Intell Comput Cyber Science and Technol Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 836–843
Hoang DH, Nguyen HD (2019) Detecting anomalous network traffic in IoT networks, In 2019 21st Int Conf Adv Commun Technol (ICACT), pp. 1143–1152
Hussain J, Lalmuanawma S (2016) Feature analysis, evaluation and comparisons of classification algorithms based on noisy intrusion dataset. Procedia Comput Sci 92:188–198
Ashfaq RAR, Wang X, Huang JZ, Abbas H, He Y (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inf Sci 378:484–497
Raman MRG, Somu N, Kirthivasan K, Sriram VSS (2017) A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw 92:89–97
McHugh J (2000) Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans Inf Syst Secur (TISSEC) 3:262–294
Moustafa N, Slay J (2015) UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Commun Inf Syst Conf (MilCIS), pp. 1–6. IEEE
Sharafaldin I, Gharib A, Lashkari AH, Ghorbani AA (2018) Towards a reliable intrusion detection benchmark dataset. Softw Netw 1:177–200
Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31:357–374
Nehinbe JO (2009) A simple method for improving intrusion detections in corporate networks. Int Conf Inf Secur Digital Forensics. Springer, Berlin, Germany, pp 111–122
Sharafaldin I, Lashkari AH, Ghorbani AA (2018) A detailed analysis of the CICIDS2017 data set. Int Conf Inf Syst Security Privacy. Springer, Cham, pp 172–188
Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gen Comput Syst 100:779–796
Pahl M-O, Aubet F-X (2018) DS2OS traffic traces: IoT traffic traces gathered in a the DS2OS IoT environment. https://www.kaggle.com/francoisxa/ds2ostraffictraces.
Pahl M-O, Aubet F-X (2018) All eyes on you: Distributed multi-dimensional IoT microservice anomaly detection. In: 2018 14th Int Conf Netw Service Manag (CNSM), pp. 72–80. IEEE
Masduki BW, Ramli K, Saputra FA, Sugiarto D (2015) Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS). In: 2015 Int Conf Quality Res (QiR), IEEE, pp. 56–64
Bhuyan M, Bhattacharyya DK, Kalita JK (2015) Towards generating real-life datasets for network intrusion detection. Int J Netw Secur 17:683–701
Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSp, pp. 108–116
Hindy H, Brosset D, Bayne E, Seeam A, Tachtatzis C, Atkinson R, Bellekens X (2018) A taxonomy and survey of intrusion detection system design techniques, network threats and datasets.
Singh G, Khare N (2021) A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. Int J Comput Appl pp. 1–11
Kushwah GS, Ranga V (2020) Voting extreme learning machine based distributed denial of service attack detection in cloud computing. J Inform Security Appl 53:102532
Sultan S, Javaid Q, Malik AJ, Al-Turjman F, Attique M (2021) Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks. Environ, Develop Sustain, pp. 1–19
Kanwal S, Iqbal Z, Al-Turjman F, Irtaza A, Khan MA (2021) Multiphase fault tolerance genetic algorithm for VM and task scheduling in datacenter. Inf Process Manag 58:102676
Ansari GJ, Shah JH, Sharif M, Tariq U, Akram T (2021) A non-blind deconvolution semi pipelined approach to understand text in blurry natural images for edge intelligence. Inf Process Manag 58:102675
Sharif A, Li JP, Saleem MA, Manogran G, Kadry S, Basit A, Khan MA (2021) A dynamic clustering technique based on deep reinforcement learning for internet of vehicles. J Intell Manuf 32:757–768
Almadhor A, Rauf HT, Khan MA, Kadry S, Nam Y (2021) A hybrid algorithm (BAPSO) for capacity configuration optimization in a distributed solar PV based microgrid. Energ Rep, ISSN 2352–4847
Saeed R, Rubab S, Asif S, Khan MM, Murtaza S, Kadry S, Nam Y, Khan MA (2021) An automated system to predict popular cybersecurity news using document embeddings. Comput Modeling Eng Sci 127:533–547
Zhang Y-D, Alhusseni M, Kadry S, Wang S-H, Saba T, Iqbal T (2021) A fused heterogeneous deep neural network and robust feature selection framework for human actions recognition. Arabian J Sci Eng pp. 1–16
Ahmed M, Ramzan M, Khan HU, Iqbal S, Choi J-I, Nam Y, Kadry S (2021) Real-time violent action recognition using key frames extraction and deep learning. CMC-Comput Mater Continua 69:2217–2230
Nasir IM, Raza M, Shah JH, Khan MA, Rehman A (2021) Human action recognition Using machine learning in uncontrolled environment. In: 2021 1st Int Conf Artif Intell Data Analyt (CAIDA), IEEE, pp. 182–187
Kiran S, Javed MY, Alhaisoni M, Tariq U, Nam Y, Damaševicius R, Sharif M (2021) Multi-layered deep learning features fusion for human action recognition. CMC-Comput Mater Continua 69:4061–4075
Khan MA, Alhaisoni M, Armghan A, Alenezi F, Tariq U, Nam Y, Akram T (2021) Video analytics framework for human action recognition. CMC-Comput Mater Continua 68:3841–3859
Zhang Y-D, Khan SA, Attique M, Rehman A, Seo S (2020) A resource conscious human action recognition framework using 26-layered deep convolutional neural network. Multimed Tools Appl, pp. 1–23
Javed K, Khan SA, Saba T, Habib U, Khan JA, Abbasi AA (2020) Human action recognition using fusion of multiview and deep features: an application to video surveillance. Multimed Tools Applications, pp. 1–27
Hussain UN, Lali IU, Javed K, Ashraf I, Tariq J, Ali H, Din A (2020) A unified design of ACO and skewness based brain tumor segmentation and classification from MRI scans. J Control Eng Appl Inform 22:43–55
Sharif M, Akram T, Bukhari SAC, Nayak RS (2020) Developed Newton-Raphson based deep features selection framework for skin lesion recognition. Pattern Recognit Lett 129:293–303
Sharif M, Akram T, Damaševičius R, Maskeliūnas R (2021) Skin lesion segmentation and multiclass classification using deep learning features and improved moth flame optimization. Diagnostics 11:811
Khan MA, Khan M, Sharif M, Akram T, de AlbuquerqueVC C (2021) Multi-class skin lesion detection and classification via teledermatology. IEEE J Biomed Health Inform. https://doi.org/10.1109/JBHI.2021.3067789
Zhang Y-D, Sharif M, Akram T (2021) Pixels to classes: intelligent learning framework for multiclass skin lesion localization and classification. Comput Electric Eng 90:106956
Qasim M, Lodhi HMJ, Nazir M, Javed K, Rubab S, Din A, Habib U (2021) Automated design for recognition of blood cells diseases from hematopathology using classical features selection and ELM. Microscopy Res Tech 84:202–216
Tahir ABT, Alhaisoni M, Khan JA, Nam Y, Wang S-H, Javed K (2021) Deep learning and improved particle swarm optimization based multimodal brain tumor classification. CMC-Comput Mater Continua 68:1099–1116
Akram T, Sharif M, Kadry S, Nam Y (2021) Computer decision support system for skin cancer localization and classification. CMC-Comput Mater Continua 68:1041–1064
Mehmood A, Sharif M, Khan SA, Shaheen M, Saba T, Riaz N, Ashraf I (2020) Prosperous human gait recognition: an end-to-end system based on pre-trained CNN features selection. Multimed Tools Appl, pp. 1–21
Hussain N, Sharif M, Khan SA, Albesher AA, Saba T, Armaghan A. (2020) A deep neural network and classical features based scheme for objects recognition: an application for machine inspection. Multimed Tools Appl,pp. 1–23
Acknowledgments
This work was supported by Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE) (P0008703, The Competency Development Program for Industry Specialist) and also the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2021-2018-0-01799) supervised by the IITP (Institute for Information & communications Technology Planning & Evaluation).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s11227-024-05973-6
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rehman, E., Haseeb-ud-Din, M., Malik, A.J. et al. RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. J Supercomput 78, 8890–8924 (2022). https://doi.org/10.1007/s11227-021-04188-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-04188-3