journal article Open Access Jan 10, 2022

Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review

Electronics Vol. 11 No. 2 pp. 198 · MDPI AG
View at Publisher Save 10.3390/electronics11020198
Abstract
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0), where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have evolved exponentially on a large scale. The rapid development of IoT devices and networks in various forms generate enormous amounts of data which in turn demand careful authentication and security. Artificial intelligence (AI) is considered one of the most promising methods for addressing cybersecurity threats and providing security. In this study, we present a systematic literature review (SLR) that categorize, map and survey the existing literature on AI methods used to detect cybersecurity attacks in the IoT environment. The scope of this SLR includes an in-depth investigation on most AI trending techniques in cybersecurity and state-of-art solutions. A systematic search was performed on various electronic databases (SCOPUS, Science Direct, IEEE Xplore, Web of Science, ACM, and MDPI). Out of the identified records, 80 studies published between 2016 and 2021 were selected, surveyed and carefully assessed. This review has explored deep learning (DL) and machine learning (ML) techniques used in IoT security, and their effectiveness in detecting attacks. However, several studies have proposed smart intrusion detection systems (IDS) with intelligent architectural frameworks using AI to overcome the existing security and privacy challenges. It is found that support vector machines (SVM) and random forest (RF) are among the most used methods, due to high accuracy detection another reason may be efficient memory. In addition, other methods also provide better performance such as extreme gradient boosting (XGBoost), neural networks (NN) and recurrent neural networks (RNN). This analysis also provides an insight into the AI roadmap to detect threats based on attack categories. Finally, we present recommendations for potential future investigations.
Topics

No keywords indexed for this article. Browse by subject →

References
98
[1]
Singh "Guest Editorial: Energy Management, Protocols, and Security for the Next-Generation Networks and Internet of Things" IEEE Trans. Ind. Inform. (2020) 10.1109/tii.2020.2964591
[2]
Almiani "Deep recurrent neural network for IoT intrusion detection system" Simul. Model. Pract. Theory (2020) 10.1016/j.simpat.2019.102031
[3]
Hong "A wearable-based posture recognition system with AI-assisted approach for healthcare IoT" Futur. Gener. Comput. Syst. (2022) 10.1016/j.future.2021.08.030
[4]
Adil "Emerging IoT Applications in Sustainable Smart Cities for COVID-19: Network Security and Data Preservation Challenges with Future Directions" Sustain. Cities Soc. (2021) 10.1016/j.scs.2021.103311
[5]
Kurte "A Distributed Service Framework for the Internet of Things" IEEE Trans. Ind. Inform. (2020) 10.1109/tii.2019.2948046
[6]
Zeng "MMDA: Multidimensional and multidirectional data aggregation for edge computing-enhanced IoT" J. Syst. Archit. (2020) 10.1016/j.sysarc.2020.101713
[7]
Diro "Distributed attack detection scheme using deep learning approach for Internet of Things" Futur. Gener. Comput. Syst. (2018) 10.1016/j.future.2017.08.043
[8]
Farivar "Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT" IEEE Trans. Ind. Inform. (2020) 10.1109/tii.2019.2956474
[9]
Gupta "Security and Privacy in Smart Farming: Challenges and Opportunities" IEEE Access (2020) 10.1109/access.2020.2975142
[10]
Al-Haija, Q.A., and Zein-Sabatto, S. (2020). An efficient deep-learning-based detection and classification system for cyber-attacks in iot communication networks. Electronics, 9. 10.3390/electronics9122152
[11]
Zhang "Collaborative algorithms that combine AI with IoT towards monitoring and control system" Futur. Gener. Comput. Syst. (2021) 10.1016/j.future.2021.07.008
[12]
Li "Research on AI security enhanced encryption algorithm of autonomous IoT systems" Inf. Sci. (2021) 10.1016/j.ins.2021.06.016
[13]
Karale "The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws" Internet Things (2021) 10.1016/j.iot.2021.100420
[14]
Obaidat, M.A., Obeidat, S., Holst, J., Hayajneh, A.A., and Brown, J. (2020). A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures. Computers, 9. 10.3390/computers9020044
[15]
Li "Privacy preservation for machine learning training and classification based on homomorphic encryption schemes" Inf. Sci. (2020) 10.1016/j.ins.2020.03.041
[16]
Sarica, A.K., and Angin, P. (2020). Explainable security in SDN-based IoT networks. Sensors, 20. 10.3390/s20247326
[17]
Aleem, S., Capretz, L.F., and Ahmed, F. (2015). Security Issues in Data Warehouse. arXiv.
[18]
Wu "Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods" J. Intell. Manuf. (2019) 10.1007/s10845-017-1315-5
[19]
Patil "Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing" Int. J. Inf. Secur. (2020) 10.1007/s10207-019-00447-w
[20]
Dang "A pragmatic elliptic curve cryptography-based extension for energy-efficient device-to-device communications in smart cities" Sustain. Cities Soc. (2020) 10.1016/j.scs.2020.102097
[21]
Moustafa "A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets" Sustain. Cities Soc. (2021) 10.1016/j.scs.2021.102994
[22]
Atul "A machine learning based IoT for providing an intrusion detection system for security" Microprocess. Microsyst. (2021) 10.1016/j.micpro.2020.103741
[23]
Ghosh "Artificial intelligence in Internet of things" CAAI Trans. Intell. Technol. (2018) 10.1049/trit.2018.1008
[24]
Bland "Machine Learning Cyberattack and Defense Strategies" Comput. Secur. (2020) 10.1016/j.cose.2020.101738
[25]
Rathore "Semi-supervised learning based distributed attack detection framework for IoT" Appl. Soft Comput. J. (2018) 10.1016/j.asoc.2018.05.049
[26]
Kasongo "A deep learning method with wrapper based feature extraction for wireless intrusion detection system" Comput. Secur. (2020) 10.1016/j.cose.2020.101752
[27]
Chmiel, M., Korona, M., Kozioł, F., Szczypiorski, K., and Rawski, M. (2021). Discussion on iot security recommendations against the state-of-the-art solutions. Electronics, 10. 10.3390/electronics10151814
[28]
Aldhaheri "Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research" J. Netw. Comput. Appl. (2020) 10.1016/j.jnca.2020.102537
[29]
Quintal "Biometric Signatures for Continuous Authentication" Digit. Object Identifier (2019)
[30]
Lu "An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices" Comput. Secur. (2020) 10.1016/j.cose.2019.101686
[31]
Kim, S., Hwang, C., and Lee, T. (2020). Anomaly based unknown intrusion detection in endpoint environments. Electronics, 9. 10.3390/electronics9061022
[32]
Choo "Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities" IEEE Trans. Ind. Inform. (2020) 10.1109/tii.2020.2966068
[33]
Almusaylim "Proposing a Secure RPL based Internet of Things Routing Protocol: A Review" Ad Hoc Netw. (2020) 10.1016/j.adhoc.2020.102096
[34]
Viejo "Secure monitoring in IoT-based services via fog orchestration" Futur. Gener. Comput. Syst. (2020) 10.1016/j.future.2020.02.025
[35]
Singh "An intrusion detection system using network traffic profiling and online sequential extreme learning machine" Expert Syst. Appl. (2015) 10.1016/j.eswa.2015.07.015
[36]
Krawczyk "Analyzing the oversampling of different classes and types of examples in multi-class imbalanced datasets" Pattern Recognit. (2016) 10.1016/j.patcog.2016.03.012
[37]
Ahmad, Z., Khan, A.S., Nisar, K., Haider, I., Hassan, R., Haque, M.R., Tarmizi, S., and Rodrigues, J.J.P.C. (2021). Anomaly detection using deep neural network for iot architecture. Appl. Sci., 11. 10.3390/app11157050
[38]
Ali, S.S., and Choi, B.J. (2020). State-of-the-art artificial intelligence techniques for distributed smart grids: A review. Electronics, 9. 10.3390/electronics9061030
[39]
Tahsien "Machine learning based solutions for security of Internet of Things (IoT): A survey" J. Netw. Comput. Appl. (2020) 10.1016/j.jnca.2020.102630
[40]
Alsoufi, M.A., Razak, S., Siraj, M.M., Nafea, I., Ghaleb, F.A., Saeed, F., and Nasser, M. (2021). Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review. Appl. Sci., 11. 10.3390/app11188383
[41]
Echeverría, A., Cevallos, C., Ortiz-Garces, I., and Andrade, R.O. (2021). Cybersecurity model based on hardening for secure internet of things implementation. Appl. Sci., 11. 10.3390/app11073260
[42]
Djenna, A., Harous, S., and Saidouni, D.E. (2021). Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure. Appl. Sci., 11. 10.3390/app11104580
[43]
Mahbub "Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics" J. Netw. Comput. Appl. (2020) 10.1016/j.jnca.2020.102761
[44]
Dilek "Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review" Int. J. Artif. Intell. Appl. (2015)
[45]
Greensmith, J. (2015, January 11–15). Securing the internet of things with responsive artificial immune systems. Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, Madrid, Spain. 10.1145/2739480.2754816
[46]
Morel, B. (2011, January 21). Artificial intelligence and key to the future of cybersecurity. Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, Chicago, IL, USA. 10.1145/2046684.2046699
[47]
Mohanta "Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology" Internet Things (2020) 10.1016/j.iot.2020.100227
[48]
Sharma "A systematic literature review on machine learning applications for sustainable agriculture supply chain performance" Comput. Oper. Res. (2020) 10.1016/j.cor.2020.104926
[49]
Saeed, F., Mohammed, F., and Al-Nahari, A. (2021). Anomaly Intrusion Detection Systems in IoT Using Deep Learning Techniques: A Survey BT—Innovative Systems for Intelligent Health Informatics, Springer International Publishing.
[50]
Haji "Attack and Anomaly Detection in IoT Networks using Machine Learning Techniques: A Review" Asian J. Res. Comput. Sci. (2021) 10.9734/ajrcos/2021/v9i230218

Showing 50 of 98 references

Cited By
289
Optoelectronics, Instrumentation an...
Future Internet
Leveraging AI for Network Threat Detection—A Conceptual Overview

Muhammad Ali Paracha, Syed Usman Jamil · 2024

Electronics
Expert Systems with Applications
Artificial Intelligence Review
Journal of Information Security
Internet of Things
Advance Thread Detection using AI &ML in Cyber Security

Diwakar Mainali, Megan Nagarkoti · 2024

International Journal of Innovative...
IEEE Communications Surveys & T...
Related

You May Also Like

Machine Learning Interpretability: A Survey on Methods and Metrics

Diogo V. Carvalho, Eduardo M. Pereira · 2019

1,384 citations

The k-means Algorithm: A Comprehensive Survey and Performance Evaluation

Mohiuddin Ahmed, Raihan Seraj · 2020

1,342 citations

Sentiment Analysis Based on Deep Learning: A Comparative Study

Nhan Cach Dang, María N. Moreno-García · 2020

550 citations