Loading...
Please wait, while we are loading the content...
Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects
| Content Provider | MDPI |
|---|---|
| Author | Inayat, Usman Zia, Muhammad Fahad Mahmood, Sajid Khalid, Haris M. Benbouzid, Mohamed |
| Copyright Year | 2022 |
| Description | Internet of Things (IoT) is a developing technology that provides the simplicity and benefits of exchanging data with other devices using the cloud or wireless networks. However, the changes and developments in the IoT environment are making IoT systems susceptible to cyber attacks which could possibly lead to malicious intrusions. The impacts of these intrusions could lead to physical and economical damages. This article primarily focuses on the IoT system/framework, the IoT, learning-based methods, and the difficulties faced by the IoT devices or systems after the occurrence of an attack. Learning-based methods are reviewed using different types of cyber attacks, such as denial-of-service (DoS), distributed denial-of-service (DDoS), probing, user-to-root (U2R), remote-to-local (R2L), botnet attack, spoofing, and man-in-the-middle (MITM) attacks. For learning-based methods, both machine and deep learning methods are presented and analyzed in relation to the detection of cyber attacks in IoT systems. A comprehensive list of publications to date in the literature is integrated to present a complete picture of various developments in this area. Finally, future research directions are also provided in the paper. |
| Starting Page | 1502 |
| e-ISSN | 20799292 |
| DOI | 10.3390/electronics11091502 |
| Journal | Electronics |
| Issue Number | 9 |
| Volume Number | 11 |
| Language | English |
| Publisher | MDPI |
| Publisher Date | 2022-05-07 |
| Access Restriction | Open |
| Subject Keyword | Electronics Information and Library Science Cyber Attacks Cyber-physical Systems Deep Learning Denial-of-service (dos) Detection Methods Internet of Things (iot) Machine Learning Man-in-the-middle Security |
| Content Type | Text |
| Resource Type | Article |