A Review on IoT Cyber-Attacks Detection Challenges‎ and Solutions

Authors

  • Marwa Jawad Kathem College of Engineering, Al-Iraqia University, Saba’a Abkar Complex, Baghdad, Iraq
  • Tayseer Salman Atia College of Engineering, Al-Iraqia University, Saba’a Abkar Complex, Baghdad, Iraq

DOI:

https://doi.org/10.58564/IJSER.2.3.2023.84

Keywords:

IoT security, Fog/edge computing, machine learning, deep learning, cyber-attacks

Abstract

 The Internet of Things (IoT) has recast the way we interact with technology and the world around us. The IoT is almost everywhere in our daily lives, and this huge growth in using the IoT increases the need for implementing a high level of security framework for this technology. This study presents an analysis of some of the recent IoT cyber-attack detection systems to provide an evaluation of these systems and useful future research directions in this field. This analysis is introduced along with an overview of the IoT's security challenges and solutions and the types of security attacks in the IoT environment. Although the most recent approaches to cyber-attack detection have high percentages of attack detection accuracy, these classical DL models that were learned with local datasets need more enhancement to maintain privacy and data storage when involved in networks of cooperative nodes in IoTs. Furthermore, current techniques still lack the ability to provide a generalization for new attacks, cover the binary and multiclass classifications of cyber-attacks, and develop feature selection algorithms to reduce dataset dimension.‎

 

Author Biographies

Marwa Jawad Kathem, College of Engineering, Al-Iraqia University, Saba’a Abkar Complex, Baghdad, Iraq

Email: marwajk86@gmail.com

https://orcid.org/0009-0000-3719-429X

Tayseer Salman Atia, College of Engineering, Al-Iraqia University, Saba’a Abkar Complex, Baghdad, Iraq

Email: tayseer.Salman@aliraqia.edu.iq

https://orcid.org/0000-0002-1552-569X

References

R. P. Singh, M. Javaid, A. Haleem, and R. Suman, “Internet of things (IoT) applications to fight ‎against COVID-19 pandemic,” Diabetes & Metabolic Syndrome: Clinical Research ‎& Reviews, vol. 14, no. 4, pp. 521–524, 2020. doi:10.1016/j.dsx.2020.04.041.‎

N. Hossein Motlagh, M. Mohammadrezaei, J. Hunt, and B. Zakeri, “Internet of things (IoT) and ‎the Energy Sector,” Energies, vol. 13, no. 2, p. 494, 2020. doi:10.3390/en13020494.‎

F. Alshehri and G. Muhammad, "A Comprehensive Survey of the Internet of Things (IoT) and ‎AI-Based Smart Healthcare," in IEEE Access, vol. 9, pp. 3660-3678, 2021, doi: ‎‎10.1109/ACCESS.2020.3047960.‎

L. Kakkar, D. Gupta, S. Saxena, and S. Tanwar, “IoT architectures and its security: A Review,” ‎Lecture Notes in Networks and Systems, pp. 87–94, 2021. doi:10.1007/978-981-15-9689-‎‎6_10.‎

W. Kassab and K. A. Darabkh, “A–Z survey of internet of things: Architectures, protocols, ‎applications, recent advances, future directions and recommendations,” Journal of ‎Network and Computer Applications, vol. 163, p. 102663, 2020. ‎doi:10.1016/j.jnca.2020.102663.‎

H. HaddadPajouh, A. Dehghantanha, R. M. Parizi, M. Aledhari, and H. Karimipour, “A survey ‎on internet of things security: Requirements, challenges, and solutions,” Internet of ‎Things, vol. 14, p. 100129, 2021. doi:10.1016/j.iot.2019.100129.‎

M. A. Khan and K. Salah, “IoT security: Review, Blockchain Solutions, and open challenges,” ‎Future Generation Computer Systems, vol. 82, pp. 395–411, 2018. ‎doi:10.1016/j.future.2017.11.022.‎

G. Peralta et al., “Fog computing based efficient IoT scheme for the industry 4.0,” 2017 IEEE ‎International Workshop of Electronics, Control, Measurement, Signals and their ‎Application to Mechatronics (ECMSM), 2017. doi:10.1109/ecmsm.2017.7945879.‎

E. Guardo, Alessandro Di Stefano, Aurelio La Corte, M. Sapienza, and Marialisa Scatá, “A Fog ‎Computing-based IoT Framework for Precision Agriculture,” vol. 19, no. 5, pp. 1401–‎‎1411, Sep. 2018, doi: https://doi.org/10.3966/160792642018091905012.‎

S. M. Tahsien, H. Karimipour, and P. Spachos, “Machine learning based solutions for security ‎of internet of things (IoT): A survey,” Journal of Network and Computer Applications, ‎vol. 161, p. 102630, 2020. doi:10.1016/j.jnca.2020.102630.‎

I. H. Sarker, “Machine learning: Algorithms, real-world applications and Research Directions,” ‎SN Computer Science, vol. 2, no. 3, 2021. doi:10.1007/s42979-021-00592-x.‎

J. Sengupta, S. Ruj, and S. Das Bit, “A comprehensive survey on attacks, security issues and ‎blockchain solutions for IoT and Iiot,” Journal of Network and Computer Applications, ‎vol. 149, p. 102481, 2020. doi:10.1016/j.jnca.2019.102481.

Y. -W. Chen, J. -P. Sheu, Y. -C. Kuo and N. Van Cuong, "Design and Implementation of IoT ‎DDoS Attacks Detection System based on Machine Learning," 2020 European Conference ‎on Networks and Communications (EuCNC), Dubrovnik, Croatia, 2020, pp. 122-127, doi: ‎‎10.1109/EuCNC48522.2020.9200909.‎

Y. Jia, F. Zhong, A. Alrawais, B. Gong and X. Cheng, "FlowGuard: An Intelligent Edge ‎Defense Mechanism Against IoT DDoS Attacks," in IEEE Internet of Things Journal, vol. ‎‎7, no. 10, pp. 9552-9562, Oct. 2020, doi: 10.1109/JIoT.2020.2993782.‎

M. S. Elsayed, N. -A. Le-Khac, S. Dev and A. D. Jurcut, "DDoSNet: A Deep-Learning Model ‎for Detecting Network Attacks," 2020 IEEE 21st International Symposium on "A World ‎of Wireless, Mobile and Multimedia Networks" (WoWMoM), Cork, Ireland, 2020, pp. ‎‎391-396, doi: 10.1109/WoWMoM49955.2020.00072.‎

G. Bendiab, S. Shiaeles, A. Alruban and N. Kolokotronis, "IoT Malware Network Traffic ‎Classification using Visual Representation and Deep Learning," 2020 6th IEEE ‎Conference on Network Softwarization (NetSoft), Ghent, Belgium, 2020, pp. 444-449, ‎doi: 10.1109/NetSoft48620.2020.9165381.‎

J. Bhayo, S. Hameed and S. A. Shah, "An Efficient Counter-Based DDoS Attack Detection ‎Framework Leveraging Software Defined IoT (SD-IoT)," in IEEE Access, vol. 8, pp. ‎‎221612-221631, 2020, doi: 10.1109/ACCESS.2020.3043082.‎

M. H. Aysa, A. A. Ibrahim, and A. H. Mohammed, “IoT Ddos attack detection using machine ‎learning,” 2020 4th International Symposium on Multidisciplinary Studies and Innovative ‎Technologies (ISMSIT), 2020. doi:10.1109/ismsit50672.2020.9254703.‎

F. Hussain, S. G. Abbas, M. Husnain, U. U. Fayyaz, F. Shahzad and G. A. Shah, "IoT DoS and ‎DDoS Attack Detection using ResNet," 2020 IEEE 23rd International Multitopic ‎Conference (INMIC), Bahawalpur, Pakistan, 2020, pp. 1-6, doi: ‎‎10.1109/INMIC50486.2020.9318216.‎

G. C. Amaizu, C. I. Nwakanma, S. Bhardwaj, J. M. Lee, and D. S. Kim, “Composite and ‎efficient ddos attack detection framework for B5G Networks,” Computer Networks, vol. ‎‎188, p. 107871, 2021. doi:10.1016/j.comnet.2021.107871.‎

A. Gaurav, B. B. Gupta, C. -H. Hsu, S. Yamaguchi and K. T. Chui, "Fog Layer-based DDoS ‎attack Detection Approach for Internet-of-Things (IoTs) devices," 2021 IEEE ‎International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 2021, ‎pp. 1-5, doi: 10.1109/ICCE50685.2021.9427648.‎

D. K. Sharma et al., “Anomaly detection framework to prevent ddos attack in fog empowered ‎IoT Networks,” Ad Hoc Networks, vol. 121, p. 102603, 2021. ‎doi:10.1016/j.adhoc.2021.102603.‎

K. Saurabh, T. Kumar, U. Singh, O. P. Vyas and R. Khondoker, "NFDLM: A Lightweight ‎Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains," ‎‎2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 2022, pp. 736-742, doi: ‎‎10.1109/AIIoT54504.2022.9817297.‎

P. Gahelot, P. K. Sarangi, and L. Rani, “Intelligent detection of ddos attack in IOT Network,” Mobile Radio Communications and 5G Networks, pp. 173–184, 2023. doi:10.1007/978-981-19-7982-8_15.

A. F. Otoom, W. Eleisah, and E. E. Abdallah, “Deep learning for accurate detection of brute force attacks on IOT Networks,” Procedia Computer Science, vol. 220, pp. 291–298, 2023. doi:10.1016/j.procs.2023.03.038.

M. W. Nadeem, H. G. Goh, Y. Aun and V. Ponnusamy, "Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques," in IEEE Access, vol. 11, pp. 49153-49171, 2023, doi: 10.1109/ACCESS.2023.3277397. ‎

Downloads

Published

2023-09-01

How to Cite

Jawad Kathem, M., & Salman Atia, T. (2023). A Review on IoT Cyber-Attacks Detection Challenges‎ and Solutions. Al-Iraqia Journal for Scientific Engineering Research, 2(3), 22–31. https://doi.org/10.58564/IJSER.2.3.2023.84

Issue

Section

Articles