scholarly journals MADS Based on DL Techniques on the Internet of Things (IoT): Survey

Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2598
Author(s):  
Hussah Talal ◽  
Rachid Zagrouba

Technologically speaking, humanity lives in an age of evolution, prosperity, and great development, as a new generation of the Internet has emerged; it is the Internet of Things (IoT) which controls all aspects of lives, from the different devices of the home to the large industries. Despite the tremendous benefits offered by IoT, still there are some challenges regarding privacy and information security. The traditional techniques used in Malware Anomaly Detection Systems (MADS) could not give us as robust protection as we need in IoT environments. Therefore, it needed to be replaced with Deep Learning (DL) techniques to improve the MADS and provide the intelligence solutions to protect against malware, attacks, and intrusions, in order to preserve the privacy of users and increase their confidence in and dependence on IoT systems. This research presents a comprehensive study on security solutions in IoT applications, Intrusion Detection Systems (IDS), Malware Detection Systems (MDS), and the role of artificial intelligent (AI) in improving security in IoT.

2020 ◽  
Author(s):  
Navod Neranjan Thilakarathne ◽  
Mohan Krishna Kagita ◽  
Thippa Reddy Gadekallu

2020 ◽  
Vol 10 (4) ◽  
pp. 145-159
Author(s):  
Navod Neranjan Thilakarathne ◽  
Mohan Krishna Kagita ◽  
Dr. Thippa Reddy Gadekallu

2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Poria Pirozmand ◽  
Mohsen Angoraj Ghafary ◽  
Safieh Siadat ◽  
Jiankang Ren

The Internet of Things is an emerging technology that integrates the Internet and physical smart objects. This technology currently is used in many areas of human life, including education, agriculture, medicine, military and industrial processes, and trade. Integrating real-world objects with the Internet can pose security threats to many of our day-to-day activities. Intrusion detection systems (IDS) can be used in this technology as one of the security methods. In intrusion detection systems, early and correct detection (with high accuracy) of intrusions is considered very important. In this research, game theory is used to develop the performance of intrusion detection systems. In the proposed method, the attacker infiltration mode and the behavior of the intrusion detection system as a two-player and nonparticipatory dynamic game are completely analyzed and Nash equilibrium solution is used to create specific subgames. During the simulation performed using MATLAB software, various parameters were examined using the definitions of game theory and Nash equilibrium to extract the parameters that had the most accurate detection results. The results obtained from the simulation of the proposed method showed that the use of intrusion detection systems in the Internet of Things based on cloud-fog can be very effective in identifying attacks with the least amount of errors in this network.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Ansam Khraisat ◽  
Ammar Alazab

AbstractThe Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation strategy, and deployment strategy. This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS. We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT. It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure. These purposes help IoT security researchers by uniting, contrasting, and compiling scattered research efforts. Consequently, we provide a unique IoT IDS taxonomy, which sheds light on IoT IDS techniques, their advantages and disadvantages, IoT attacks that exploit IoT communication systems, corresponding advanced IDS and detection capabilities to detect IoT attacks.


2019 ◽  
Vol 2 (1) ◽  
Author(s):  
Bambang Widagdo ◽  
Mochamad Rofik

The economic diversification concept gives hope for a country with rich natural resources to strengthen its economic basis. Thus industrial revolution era of 4.0 provides great opportunity to fasten the process. A study by McKensey in 2011 proved that the internet in the developing country contributes around 3.4% towards its GDP which means that the internet has become a new hope for the economy in the future. Indonesia is one of the countries that is attempting to maximize the role of the Internet of Things (IoT) for its economic growth.� The attempt has made the retail and tourism industries as the two main sectors to experience the significant effect of IoT. In the process of optimizing the IoT to support the economic growth, Indonesia faces several issues especially in the term of the internet network quality and its distribution, the inclusive access of financial access and the infrastructure


Sign in / Sign up

Export Citation Format

Share Document