A Review on IoT Cyber-Attacks Detection Challenges and Solutions
DOI:
https://doi.org/10.58564/IJSER.2.3.2023.84Keywords:
IoT security, Fog/edge computing, machine learning, deep learning, cyber-attacksAbstract
The Internet of Things (IoT) has recast the way we interact with technology and the world around us. The IoT is almost everywhere in our daily lives, and this huge growth in using the IoT increases the need for implementing a high level of security framework for this technology. This study presents an analysis of some of the recent IoT cyber-attack detection systems to provide an evaluation of these systems and useful future research directions in this field. This analysis is introduced along with an overview of the IoT's security challenges and solutions and the types of security attacks in the IoT environment. Although the most recent approaches to cyber-attack detection have high percentages of attack detection accuracy, these classical DL models that were learned with local datasets need more enhancement to maintain privacy and data storage when involved in networks of cooperative nodes in IoTs. Furthermore, current techniques still lack the ability to provide a generalization for new attacks, cover the binary and multiclass classifications of cyber-attacks, and develop feature selection algorithms to reduce dataset dimension.
References
R. P. Singh, M. Javaid, A. Haleem, and R. Suman, “Internet of things (IoT) applications to fight against COVID-19 pandemic,” Diabetes & Metabolic Syndrome: Clinical Research & Reviews, vol. 14, no. 4, pp. 521–524, 2020. doi:10.1016/j.dsx.2020.04.041.
N. Hossein Motlagh, M. Mohammadrezaei, J. Hunt, and B. Zakeri, “Internet of things (IoT) and the Energy Sector,” Energies, vol. 13, no. 2, p. 494, 2020. doi:10.3390/en13020494.
F. Alshehri and G. Muhammad, "A Comprehensive Survey of the Internet of Things (IoT) and AI-Based Smart Healthcare," in IEEE Access, vol. 9, pp. 3660-3678, 2021, doi: 10.1109/ACCESS.2020.3047960.
L. Kakkar, D. Gupta, S. Saxena, and S. Tanwar, “IoT architectures and its security: A Review,” Lecture Notes in Networks and Systems, pp. 87–94, 2021. doi:10.1007/978-981-15-9689-6_10.
W. Kassab and K. A. Darabkh, “A–Z survey of internet of things: Architectures, protocols, applications, recent advances, future directions and recommendations,” Journal of Network and Computer Applications, vol. 163, p. 102663, 2020. doi:10.1016/j.jnca.2020.102663.
H. HaddadPajouh, A. Dehghantanha, R. M. Parizi, M. Aledhari, and H. Karimipour, “A survey on internet of things security: Requirements, challenges, and solutions,” Internet of Things, vol. 14, p. 100129, 2021. doi:10.1016/j.iot.2019.100129.
M. A. Khan and K. Salah, “IoT security: Review, Blockchain Solutions, and open challenges,” Future Generation Computer Systems, vol. 82, pp. 395–411, 2018. doi:10.1016/j.future.2017.11.022.
G. Peralta et al., “Fog computing based efficient IoT scheme for the industry 4.0,” 2017 IEEE International Workshop of Electronics, Control, Measurement, Signals and their Application to Mechatronics (ECMSM), 2017. doi:10.1109/ecmsm.2017.7945879.
E. Guardo, Alessandro Di Stefano, Aurelio La Corte, M. Sapienza, and Marialisa Scatá, “A Fog Computing-based IoT Framework for Precision Agriculture,” vol. 19, no. 5, pp. 1401–1411, Sep. 2018, doi: https://doi.org/10.3966/160792642018091905012.
S. M. Tahsien, H. Karimipour, and P. Spachos, “Machine learning based solutions for security of internet of things (IoT): A survey,” Journal of Network and Computer Applications, vol. 161, p. 102630, 2020. doi:10.1016/j.jnca.2020.102630.
I. H. Sarker, “Machine learning: Algorithms, real-world applications and Research Directions,” SN Computer Science, vol. 2, no. 3, 2021. doi:10.1007/s42979-021-00592-x.
J. Sengupta, S. Ruj, and S. Das Bit, “A comprehensive survey on attacks, security issues and blockchain solutions for IoT and Iiot,” Journal of Network and Computer Applications, vol. 149, p. 102481, 2020. doi:10.1016/j.jnca.2019.102481.
Y. -W. Chen, J. -P. Sheu, Y. -C. Kuo and N. Van Cuong, "Design and Implementation of IoT DDoS Attacks Detection System based on Machine Learning," 2020 European Conference on Networks and Communications (EuCNC), Dubrovnik, Croatia, 2020, pp. 122-127, doi: 10.1109/EuCNC48522.2020.9200909.
Y. Jia, F. Zhong, A. Alrawais, B. Gong and X. Cheng, "FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks," in IEEE Internet of Things Journal, vol. 7, no. 10, pp. 9552-9562, Oct. 2020, doi: 10.1109/JIoT.2020.2993782.
M. S. Elsayed, N. -A. Le-Khac, S. Dev and A. D. Jurcut, "DDoSNet: A Deep-Learning Model for Detecting Network Attacks," 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), Cork, Ireland, 2020, pp. 391-396, doi: 10.1109/WoWMoM49955.2020.00072.
G. Bendiab, S. Shiaeles, A. Alruban and N. Kolokotronis, "IoT Malware Network Traffic Classification using Visual Representation and Deep Learning," 2020 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium, 2020, pp. 444-449, doi: 10.1109/NetSoft48620.2020.9165381.
J. Bhayo, S. Hameed and S. A. Shah, "An Efficient Counter-Based DDoS Attack Detection Framework Leveraging Software Defined IoT (SD-IoT)," in IEEE Access, vol. 8, pp. 221612-221631, 2020, doi: 10.1109/ACCESS.2020.3043082.
M. H. Aysa, A. A. Ibrahim, and A. H. Mohammed, “IoT Ddos attack detection using machine learning,” 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2020. doi:10.1109/ismsit50672.2020.9254703.
F. Hussain, S. G. Abbas, M. Husnain, U. U. Fayyaz, F. Shahzad and G. A. Shah, "IoT DoS and DDoS Attack Detection using ResNet," 2020 IEEE 23rd International Multitopic Conference (INMIC), Bahawalpur, Pakistan, 2020, pp. 1-6, doi: 10.1109/INMIC50486.2020.9318216.
G. C. Amaizu, C. I. Nwakanma, S. Bhardwaj, J. M. Lee, and D. S. Kim, “Composite and efficient ddos attack detection framework for B5G Networks,” Computer Networks, vol. 188, p. 107871, 2021. doi:10.1016/j.comnet.2021.107871.
A. Gaurav, B. B. Gupta, C. -H. Hsu, S. Yamaguchi and K. T. Chui, "Fog Layer-based DDoS attack Detection Approach for Internet-of-Things (IoTs) devices," 2021 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 2021, pp. 1-5, doi: 10.1109/ICCE50685.2021.9427648.
D. K. Sharma et al., “Anomaly detection framework to prevent ddos attack in fog empowered IoT Networks,” Ad Hoc Networks, vol. 121, p. 102603, 2021. doi:10.1016/j.adhoc.2021.102603.
K. Saurabh, T. Kumar, U. Singh, O. P. Vyas and R. Khondoker, "NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains," 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 2022, pp. 736-742, doi: 10.1109/AIIoT54504.2022.9817297.
P. Gahelot, P. K. Sarangi, and L. Rani, “Intelligent detection of ddos attack in IOT Network,” Mobile Radio Communications and 5G Networks, pp. 173–184, 2023. doi:10.1007/978-981-19-7982-8_15.
A. F. Otoom, W. Eleisah, and E. E. Abdallah, “Deep learning for accurate detection of brute force attacks on IOT Networks,” Procedia Computer Science, vol. 220, pp. 291–298, 2023. doi:10.1016/j.procs.2023.03.038.
M. W. Nadeem, H. G. Goh, Y. Aun and V. Ponnusamy, "Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques," in IEEE Access, vol. 11, pp. 49153-49171, 2023, doi: 10.1109/ACCESS.2023.3277397.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Marwa Jawad Kathem, Tayseer Salman Atia
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.