A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers

Khawlah M Harahsheh, Chung-Hao Chen

Abstract


The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber thefts. Machine Learning (ML) and Deep Learning (DL) also gained more importance in the last 15 years; they achieved success in the networking security field too. IoT has some similar security requirements such as traditional networks, but with some differences according to its characteristics, some specific security features, and environmental limitations, some differences are made such as low energy resources, limited computational capability, and small memory. These limitations inspire some researchers to search for the perfect and lightweight security ways which strike a balance between performance and security. This survey provides a comprehensive discussion about using machine learning and deep learning in IoT devices within the last five years. It also lists the challenges faced by each model and algorithm. In addition, this survey shows some of the current solutions and other future directions and suggestions. It also focuses on the research that took the IoT environment limitations into consideration.


Full Text:

PDF

References


K. Shaukat, S. Luo, V. Varadharajan, I. A. Hameed and M. Xu, "A Survey on Machine Learning Techniques for Cyber Security in the Last Decade," in IEEE Access, vol. 8, pp. 222310-222354, 2020, doi: 10.1109/ACCESS.2020.3041951.

E. Bout, V. Loscri and A. Gallais, "How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey," in IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 248-279, Firstquarter 2022, doi: 10.1109/COMST.2021.3127267.

Liang, X., & Kim, Y. (2021, January). A survey on security attacks and solutions in the IoT network. In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0853-0859). IEEE.‏

Sengupta, N. (2019, May). Designing security system for IoT. In 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) (pp. 195-199). IEEE.‏

T. T. Nguyen and V. J. Reddi, "Deep Reinforcement Learning for Cyber Security," in IEEE Transactions on Neural Networks and Learning Systems, doi: 10.1109/TNNLS.2021.3121870.

B. A. Salau, A. Rawal and D. B. Rawat, "Recent Advances in Artificial Intelligence for Wireless Internet of Things and Cyber–Physical Systems: A Comprehensive Survey," in IEEE Internet of Things Journal, vol. 9, no. 15, pp. 12916-12930, 1 Aug.1, 2022, doi: 10.1109/JIOT.2022.3170449.

R. Li, Q. Li, J. Zhou and Y. Jiang, "ADRIoT: An Edge-Assisted Anomaly Detection Framework Against IoT-Based Network Attacks," in IEEE Internet of Things Journal, vol. 9, no. 13, pp. 10576-10587, 1 July1, 2022, doi: 10.1109/JIOT.2021.3122148.

L. Xiao, X. Wan, X. Lu, Y. Zhang and D. Wu, "IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?," in IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 41-49, Sept. 2018, doi: 10.1109/MSP.2018.2825478.

O. Abdel Wahab, "Intrusion Detection in the IoT Under Data and Concept Drifts: Online Deep Learning Approach," in IEEE Internet of Things Journal, vol. 9, no. 20, pp. 19706-19716, 15 Oct.15, 2022, doi: 10.1109/JIOT.2022.3167005.

S. M. Kasongo, "An Advanced Intrusion Detection System for IIoT Based on GA and Tree Based Algorithms," in IEEE Access, vol. 9, pp. 113199-113212, 2021, doi: 10.1109/ACCESS.2021.3104113.

A. Sarwar, S. Hasan, W. U. Khan, S. Ahmed and S. N. K. Marwat, "Design of an Advance Intrusion Detection System for IoT Networks," 2022 2nd International Conference on Artificial Intelligence (ICAI), 2022, pp. 46-51, doi: 10.1109/ICAI55435.2022.9773747.

D. Gümüşbaş, T. Yıldırım, A. Genovese and F. Scotti, "A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems," in IEEE Systems Journal, vol. 15, no. 2, pp. 1717-1731, June 2021, doi: 10.1109/JSYST.2020.2992966.

J. Hunter, B. Huber and F. Kandah, "Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded Devices," 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), 2022, pp. 947-948, doi: 10.1109/CCNC49033.2022.9700706.

R. Zhao et al., "A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things," in IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9960-9972, 15 June15, 2022, doi: 10.1109/JIOT.2021.3119055.

F. Hussain, R. Hussain, S. A. Hassan and E. Hossain, "Machine Learning in IoT Security: Current Solutions and Future Challenges," in IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1686-1721, thirdquarter 2020, doi: 10.1109/COMST.2020.2986444.

E. Rodríguez, B. Otero, N. Gutiérrez and R. Canal, "A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks," in IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1920-1955, thirdquarter 2021, doi: 10.1109/COMST.2021.3086296.

M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali and M. Guizani, "A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security," in IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1646-1685, thirdquarter 2020, doi: 10.1109/COMST.2020.2988293.

A. Toshniwal, K. Mahesh and R. Jayashree, "Overview of Anomaly Detection techniques in Machine Learning," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2020, pp. 808-815, doi: 10.1109/I-SMAC49090.2020.9243329.

A. Jamalipour and S. Murali, "A Taxonomy of Machine-Learning-Based Intrusion Detection Systems for the Internet of Things: A Survey," in IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9444-9466, 15 June15, 2022, doi: 10.1109/JIOT.2021.3126811.

L. Basheer and P. Ranjana, "A Comparative Study of Various Intrusion Detections In Smart Cities Using Machine Learning," 2022 International Conference on IoT and Blockchain Technology (ICIBT), 2022, pp. 1-6, doi: 10.1109/ICIBT52874.2022.9807724.

T. Li et al., "Applications of Multi-Agent Reinforcement Learning in Future Internet: A Comprehensive Survey," in IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 1240-1279, Secondquarter 2022, doi: 10.1109/COMST.2022.3160697.

H. Wu, H. Han, X. Wang and S. Sun, "Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey," in IEEE Access, vol. 8, pp. 153826-153848, 2020, doi: 10.1109/ACCESS.2020.3018170.

S. Zaman et al., "Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey," in IEEE Access, vol. 9, pp. 94668-94690, 2021, doi: 10.1109/ACCESS.2021.3089681.

B. Bojarajulu, S. Tanwar and A. Rana, "A Synoptic Review on Feature Selection and Machine Learning models used for Detecting Cyber Attacks in IoT," 2021 6th International Conference on Computing, Communication and Security (ICCCS), 2021, pp. 1-7, doi: 10.1109/ICCCS51487.2021.9776344.

N. Koroniotis, N. Moustafa and E. Sitnikova, "Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions," in IEEE Access, vol. 7, pp. 61764-61785, 2019, doi: 10.1109/ACCESS.2019.2916717.

M. Mamdouh, M. A. I. Elrukhsi and A. Khattab, "Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey," 2018 International Conference on Computer and Applications (ICCA), 2018, pp. 215-218, doi: 10.1109/COMAPP.2018.8460440.

S. Abdelhamid, M. Aref, I. Hegazy and M. Roushdy, "A Survey on Learning-Based Intrusion Detection Systems for IoT Networks," 2021 Tenth International Conference on Intelligent Computing and Information Systems (ICICIS), 2021, pp. 278-288, doi: 10.1109/ICICIS52592.2021.9694226.

A. Uprety and D. B. Rawat, "Reinforcement Learning for IoT Security: A Comprehensive Survey," in IEEE Internet of Things Journal, vol. 8, no. 11, pp. 8693-8706, 1 June1, 2021, doi: 10.1109/JIOT.2020.3040957.

G. Lin, S. Wen, Q. -L. Han, J. Zhang and Y. Xiang, "Software Vulnerability Detection Using Deep Neural Networks: A Survey," in Proceedings of the IEEE, vol. 108, no. 10, pp. 1825-1848, Oct. 2020, doi: 10.1109/JPROC.2020.2993293.

Y. Xin et al., "Machine Learning and Deep Learning Methods for Cybersecurity," in IEEE Access, vol. 6, pp. 35365-35381, 2018, doi: 10.1109/ACCESS.2018.2836950.

I. Idrissi, M. Azizi and O. Moussaoui, "IoT security with Deep Learning-based Intrusion Detection Systems: A systematic literature review," 2020 Fourth International Conference On Intelligent Computing in Data Sciences (ICDS), 2020, pp. 1-10, doi: 10.1109/ICDS50568.2020.9268713.

Kaspersky Security Risk Report. Available at: https://www.kaspersky.com/blog/security_risks_report_financial_impact/ (Accessed: September 12, 2022).

I. Ben Abdel Ouahab, L. Elaachak, Y. A. Alluhaidan and M. Bouhorma, "A new approach to detect next generation of malware based on machine learning," 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 2021, pp. 230-235, doi: 10.1109/3ICT53449.2021.9581625.

Cisco Annual Report. Available at: https://www.cisco.com/c/dam/en_us/about/annual-report/cisco-annual-report-2022.pdf (Accessed: January 10, 2023).

W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf and Y. A. Bangash, "An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security," in IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10250-10276, Oct. 2020, doi: 10.1109/JIOT.2020.2997651.

M. T. Mahmood, S. R. A. Ahmed and M. R. A. Ahmed, "Using Machine Learning To Secure IOT Systems," 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2020, pp. 1-7, doi: 10.1109/ISMSIT50672.2020.9254304.

V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal and B. Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," in IEEE Access, vol. 7, pp. 82721-82743, 2019, doi: 10.1109/ACCESS.2019.2924045.

M. Mainuddin, Z. Duan and Y. Dong, "Network Traffic Characteristics of IoT Devices in Smart Homes," 2021 International Conference on Computer Communications and Networks (ICCCN), 2021, pp. 1-11, doi: 10.1109/ICCCN52240.2021.9522168.

Muhammad Azhar Iqbal; Sajjad Hussain; Huanlai Xing; Muhammad Ali Imran, "Internet of Things (IoT) Fundamentals," in Enabling the Internet of Things: Fundamentals, Design and Applications , IEEE, 2021, pp.1-28, doi: 10.1002/9781119701460.ch1.

Y. Kumar and B. Subba, "A lightweight machine learning based security framework for detecting phishing attacks," 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS), 2021, pp. 184-188, doi: 10.1109/COMSNETS51098.2021.9352828.

F. Li et al., "Online Distributed IoT Security Monitoring With Multidimensional Streaming Big Data," in IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4387-4394, May 2020, doi: 10.1109/JIOT.2019.2962788.

M. Raza et al., "Challenges and Limitations of Internet of Things Enabled Healthcare in COVID-19," in IEEE Internet of Things Magazine, vol. 4, no. 3, pp. 60-65, September 2021, doi: 10.1109/IOTM.0001.2000176.

W. Yang, M. N. Johnstone, L. F. Sikos and S. Wang, "Security and Forensics in the Internet of Things: Research Advances and Challenges," 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), 2020, pp. 12-17, doi: 10.1109/ETSecIoT50046.2020.00007.

N. M. Min, V. Visoottiviseth, S. Teerakanok and N. Yamai, "OWASP IoT Top 10 based Attack Dataset for Machine Learning," 2022 24th International Conference on Advanced Communication Technology (ICACT), 2022, pp. 317-322, doi: 10.23919/ICACT53585.2022.9728969.

Y. Wang et al., "IoT Device Identification Using Supervised Machine Learning," 2022 IEEE International Conference on Consumer Electronics (ICCE), 2022, pp. 1-6, doi: 10.1109/ICCE53296.2022.9730354.

C. D. McDermott, F. Majdani and A. V. Petrovski, "Botnet Detection in the Internet of Things using Deep Learning Approaches," 2018 International Joint Conference on Neural Networks (IJCNN), 2018, pp. 1-8, doi: 10.1109/IJCNN.2018.8489489.

X. Liang and Y. Kim, "A Survey on Security Attacks and Solutions in the IoT Network," 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), 2021, pp. 0853-0859, doi: 10.1109/CCWC51732.2021.9376174.

P. K. Sharma, M.-Y. Chen and J. H. Park, ”A software defined fog node based distributed blockchain cloud architecture for IoT”, IEEE Access, vol. 6, pp. 115-124, 2018.

S. A. Sokolov, T. B. Iliev and I. S. Stoyanov, "Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques," 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2019, pp. 441-446, doi: 10.23919/MIPRO.2019.8756755.

T. U. Chai, H. G. Goh and V. Ponnusamy, "A Study of Security Threat for Internet of Things in Smart Factory," 2021 IEEE International Conference on Computing (ICOCO), 2021, pp. 97-102, doi: 10.1109/ICOCO53166.2021.9673550.

H. Djuitcheu, M. Debes, M. Aumüller and J. Seitz, "Recent review of Distributed Denial of Service Attacks in the Internet of Things," 2022 5th Conference on Cloud and Internet of Things (CIoT), 2022, pp. 32-39, doi: 10.1109/CIoT53061.2022.9766655.

S. Latif, Z. Zou, Z. Idrees and J. Ahmad, "A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network," in IEEE Access, vol. 8, pp. 89337-89350, 2020, doi: 10.1109/ACCESS.2020.2994079.

Z. Chkirbene, S. Eltanbouly, M. Bashendy, N. AlNaimi and A. Erbad, "Hybrid Machine Learning for Network Anomaly Intrusion Detection," 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), 2020, pp. 163-170, doi: 10.1109/ICIoT48696.2020.9089575.

A. Al-Bakaa and B. Al-Musawi, "Improving the Performance of Intrusion Detection System through Finding the Most Effective Features," 2021 International Congress of Advanced Technology and Engineering (ICOTEN), 2021, pp. 1-9, doi: 10.1109/ICOTEN52080.2021.9493564.

F. Pistorius, D. Grimm, F. Erdösi and E. Sax, "Evaluation Matrix for Smart Machine-Learning Algorithm Choice," 2020 1st International Conference on Big Data Analytics and Practices (IBDAP), 2020, pp. 1-6, doi: 10.1109/IBDAP50342.2020.9245610.

K. Sharma and R. Nandal, "A Literature Study On Machine Learning Fusion With IOT," 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 2019, pp. 1440-1445, doi: 10.1109/ICOEI.2019.8862656.

Y. Xin et al., "Machine Learning and Deep Learning Methods for Cybersecurity," in IEEE Access, vol. 6, pp. 35365-35381, 2018, doi: 10.1109/ACCESS.2018.2836950.

E. Elbasi, S. Mathew, A. E. Topcu and W. Abdelbaki, "A Survey on Machine Learning and Internet of Things for COVID-19," 2021 IEEE World AI IoT Congress (AIIoT), 2021, pp. 0115-0120, doi: 10.1109/AIIoT52608.2021.9454241.

F. Liang, W. G. Hatcher, W. Liao, W. Gao and W. Yu, "Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly," in IEEE Access, vol. 7, pp. 158126-158147, 2019, doi: 10.1109/ACCESS.2019.2948912.

S. Malik and R. Chauhan, "Securing the Internet of Things using Machine Learning: A Review," 2020 International Conference on Convergence to Digital World - Quo Vadis (ICCDW), 2020, pp. 1-4, doi: 10.1109/ICCDW45521.2020.9318666.

M. A. Mahmood and A. M. Zeki, "Securing IOT against DDOS attacks using machine learning," 3rd Smart Cities Symposium (SCS 2020), 2020, pp. 471-476, doi: 10.1049/icp.2021.0905.

K. Arulkumaran, M. P. Deisenroth, M. Brundage, and A. A. Bharath, ``Deep reinforcement learning: A brief survey,'' IEEE Signal Process. Mag., vol. 34, no. 6, pp. 2638, Nov. 2017.

J. Moradi, H. Shahinzadeh, H. Nafisi, M. Marzband and G. B. Gharehpetian, "Attributes of Big Data Analytics for Data-Driven Decision Making in Cyber-Physical Power Systems," 2020 14th International Conference on Protection and Automation of Power Systems (IPAPS), 2019, pp. 83-92, doi: 10.1109/IPAPS49326.2019.9069391.

R. Manzano S., N. Goel, M. Zaman, R. Joshi and K. Naik, "Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks," 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), 2022, pp. 0191-0198, doi: 10.1109/CCWC54503.2022.9720857.

Top Search Terms from IEEE Xplore. Available at: https://ieeexplore-ieee-org.proxy.lib.odu.edu/popular/all (Accessed: January 12, 2023).

Y. Wang et al., "A smart campus internet of things framework," 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017, pp. 498-503, doi: 10.1109/UEMCON.2017.8249106.

R. Gandhi and Y. Li, "Comparing Machine Learning and Deep Learning for IoT Botnet Detection," 2021 IEEE International Conference on Smart Computing (SMARTCOMP), 2021, pp. 234-239, doi: 10.1109/SMARTCOMP52413.2021.00053.

L. Holbrook and M. Alamaniotis, "Internet of Things Security Analytics and Solutions with Deep Learning," 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI), 2019, pp. 178-185, doi: 10.1109/ICTAI.2019.00033.

M. Munir, M. A. Chattha, A. Dengel and S. Ahmed, "A Comparative Analysis of Traditional and Deep Learning-Based Anomaly Detection Methods for Streaming Data," 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), 2019, pp. 561-566, doi: 10.1109/ICMLA.2019.00105.

B. Majhi and Prastavana, "An Improved Intrusion Dectection System using BoT-IoT Dataset," 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT), 2022, pp. 488-492, doi: 10.1109/CSNT54456.2022.9787639.

T.Fawcett, „ROC Graphs: Notes and Practical Considerations for Researchers.” Kluwer Academic Publishers, 2004.

Vujović, Z. (2021). Classification model evaluation metrics. International Journal of Advanced Computer Science and Applications, 12(6), 599-606.

B. Urooj, M. A. Shah, C. Maple, M. K. Abbasi and S. Riasat, "Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms," in IEEE Access, vol. 10, pp. 89031-89050, 2022, doi: 10.1109/ACCESS.2022.3149053.

Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12-22.‏

Dataset Source: https://github.com/dung4883/PSI_graphIoTBotnet , Accessed 15 Nov 2021

Nour Moustafa, October 16, 2019, "The Bot-IoT dataset", IEEE Dataport. [Dataset]. Available: https://ieee-dataport.org/documents/bot-iot-dataset . [Accessed: Nov. 17, 2022].

M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani,, 2009, “A Detailed Analysis of the KDD CUP 99 Data Set,” Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA). [Dataset]. Available: https://www.unb.ca/cic/datasets/nsl.html . [Accessed: Nov. 23, 2022].

Nour Moustafa, October 16, 2019, "UNSW_NB15 dataset", IEEE Dataport, [Dataset]. Available: https://research.unsw.edu.au/projects/unsw-nb15-dataset . [Accessed: Nov. 13, 2022].

Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization”, 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, January 2018. ). [Dataset]. Available: https://www.unb.ca/cic/datasets/ids-2017.html . [Accessed: Dec. 2, 2022].

Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, D. Breitenbacher, A. Shabtai, and Y. Elovici 'N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders', IEEE Pervasive Computing, Special Issue - Securing the IoT (July/Sep 2018). ). [Dataset]. Available: https://www.unb.ca/cic/datasets/nsl.html . [Accessed: Dec. 2, 2022].

“Sebastian Garcia, Agustin Parmisano, & Maria Jose Erquiaga. (2020). IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]. Zenodo. [Dataset]. Available: https://www.stratosphereips.org/datasets-iot23. [Accessed: Nov. 26, 2022].

Stephen D. Bay and Dennis F. Kibler and Michael J. Pazzani and Padhraic Smyth. The UCI KDD Archive of Large Data Sets for Data Mining Research and Experimentation. SIGKDD Explorations, 2. 2000. ). [Dataset]. Available: https://archive.ics.uci.edu/ml/datasets/KDD+Cup+1999+Data . [Accessed: Dec. 9, 2022].

Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers & Security, Volume 31, Issue 3, May 2012, Pages 357-374, ISSN 0167-4048, 10.1016/j.cose.2011.12.012. ). [Dataset]. Available: https://www.unb.ca/cic/datasets/ids.html . [Accessed: Dec. 14, 2022].

Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, and Ali A. Ghorbani, "Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy", IEEE 53rd International Carnahan Conference on Security Technology, Chennai, India, 2019. ). [Dataset]. Available: https://www.unb.ca/cic/datasets/ddos-2019.html. [Accessed: Dec. 16, 2022].

Sebastian Garcia, Martin Grill, Jan Stiborek and Alejandro Zunino. "An empirical comparison of botnet detection methods" Computers and Security Journal, Elsevier. 2014. Vol 45, pp 100-123. [Dataset]. Available: https://www.stratosphereips.org/datasets-ctu13 . [Accessed: Dec. 14, 2022].

Nour Moustafa, October 16, 2019, "ToN_IoT datasets", IEEE Dataport. [Dataset]. Available: https://ieee-dataport.org/documents/toniot-datasets . [Accessed: De. 16, 2022].

Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization”, 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, January 2018). [Dataset]. Available: https://www.unb.ca/cic/datasets/ids-2018.html. [Accessed: Nov. 17, 2022].

Seiya Kato, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, "Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices," IFIP/IEEE International Symposium on Integrated Network Management (IM), 2021). [Dataset]. Available: https://sec.ynu.codes/iot/. [Accessed: Dec. 14, 2022].

External Data Source, “VirusShare Dataset.” IMPACT, 2018 ). [Dataset]. Available: http://www.secrepo.com/Datasets%20Description/PE_malware/VirusShare.html . [Accessed: Nov. 22, 2022].

Ds2os Traffic Traces. Available online: https://www.kaggle.com/francoisxa/ds2ostraffictraces (accessed on 22 May 2022). ). [Dataset]. Available: https://www.kaggle.com/datasets/francoisxa/ds2ostraffictraces . [Accessed: Nov. 22, 2022].

Anubis: Analyzing Unknown Binaries. [Dataset]. Available: https://www.unb.ca/cic/datasets/nsl.html . [Accessed: Dec. 16. 2022].

NIST Software Assurance Reference Dataset (SARD). [Dataset]. Available: https://samate.nist.gov/SARD/ . [Accessed: Nov. 17, 2022].

Das Malwerk. Malware Downloading Website. Accessed: Jan. 15, 2021. [Dataset]. Available: https://dasmalwerk.eu/ . [Accessed: Nov. 22, 2022].

M. Shobana and S. Poonkuzhali, "A novel approach to detect IoT malware by system calls using Deep learning techniques," 2020 International Conference on Innovative Trends in Information Technology (ICITIIT), 2020, pp. 1-5, doi: 10.1109/ICITIIT49094.2020.9071531.

A. P. Kuruvila, S. Kundu and K. Basu, "Analyzing the Efficiency of Machine Learning Classifiers in Hardware-Based Malware Detectors," 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2020, pp. 452-457, doi: 10.1109/ISVLSI49217.2020.00-15.

P. R. K. Varma, K. P. Raj and K. V. S. Raju, "Android mobile security by detecting and classification of malware based on permissions using machine learning algorithms," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2017, pp. 294-299, doi: 10.1109/I-SMAC.2017.8058358.

Q. -G. Lin, N. Li, Q. Qi and J. -B. Hu, "Classification of IoT Malware based on Convolutional Neural Network," 2020 International Conference on Service Science (ICSS), 2020, pp. 51-57, doi: 10.1109/ICSS50103.2020.00016.

Y. -T. Lee et al., "Cross Platform IoT-Malware Family Classification Based on Printable Strings," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020, pp. 775-784, doi: 10.1109/TrustCom50675.2020.00106.

K. Singh, S. S. Grover and R. K. Kumar, "Cyber Security Vulnerability Detection Using Natural Language Processing," 2022 IEEE World AI IoT Congress (AIIoT), 2022, pp. 174-178, doi: 10.1109/AIIoT54504.2022.9817336.

Vijayaraj, S. M, R. M, U. Vijayaraj, D. Kamaleshwar and D. Rajalakshmi, "Decision Trees to Detect Malware in a Cloud Computing Environment," 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC), 2022, pp. 299-303, doi: 10.1109/ICESIC53714.2022.9783547.

G. AbdulsalamYa'u, G. K. Job, S. M. Waziri, B. Jaafar, N. A. SabonGari and I. Z. Yakubu, "Deep Learning for Detecting Ransomware in Edge Computing Devices Based On Autoencoder Classifier," 2019 4th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), 2019, pp. 240-243, doi: 10.1109/ICEECCOT46775.2019.9114576.

M. Ficco, "Detecting IoT Malware by Markov Chain Behavioral Models," 2019 IEEE International Conference on Cloud Engineering (IC2E), 2019, pp. 229-234, doi: 10.1109/IC2E.2019.00037.

W. Niu, X. Zhang, X. Du, T. Hu, X. Xie and N. Guizani, "Detecting Malware on X86-Based IoT Devices in Autonomous Driving," in IEEE Wireless Communications, vol. 26, no. 4, pp. 80-87, August 2019, doi: 10.1109/MWC.2019.1800505.

A. Kumar and T. J. Lim, "EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques," 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 2019, pp. 289-294, doi: 10.1109/WF-IoT.2019.8767194.

S. Ali, O. Abusabha, F. Ali, M. Imran and T. ABUHMED, "Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis," in IEEE Transactions on Network and Service Management, 2022, doi: 10.1109/TNSM.2022.3200741.

I. Vaccari, S. Narteni, M. Aiello, M. Mongelli and E. Cambiaso, "Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities," in IEEE Access, vol. 9, pp. 104261-104280, 2021, doi: 10.1109/ACCESS.2021.3099642.

G. Bendiab, S. Shiaeles, A. Alruban and N. Kolokotronis, "IoT Malware Network Traffic Classification using Visual Representation and Deep Learning," 2020 6th IEEE Conference on Network Softwarization (NetSoft), 2020, pp. 444-449, doi: 10.1109/NetSoft48620.2020.9165381.

R. Yumlembam, B. Issac, S. M. Jacob and L. Yang, "IoT-based Android Malware Detection Using Graph Neural Network With Adversarial Defense," in IEEE Internet of Things Journal, 2022, doi: 10.1109/JIOT.2022.3188583.

K. Wehbi, L. Hong, T. Al-salah and A. A. Bhutta, "A Survey on Machine Learning Based Detection on DDoS Attacks for IoT Systems," 2019 SoutheastCon, 2019, pp. 1-6, doi: 10.1109/SoutheastCon42311.2019.9020468.

Roopak, M., Tian, G. Y., & Chambers, J. (2020, January). An intrusion detection system against ddos attacks in iot networks. In 2020 10th annual computing and communication workshop and conference (CCWC) (pp. 0562-0567). IEEE.‏

K. Gurulakshmi and A. Nesarani, "Analysis of IoT Bots Against DDOS Attack Using Machine Learning Algorithm," 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), 2018, pp. 1052-1057, doi: 10.1109/ICOEI.2018.8553896.

I. Cvitić, D. Perakovic, B. B. Gupta and K. -K. R. Choo, "Boosting-Based DDoS Detection in Internet of Things Systems," in IEEE Internet of Things Journal, vol. 9, no. 3, pp. 2109-2123, 1 Feb.1, 2022, doi: 10.1109/JIOT.2021.3090909.

J. N. Bakker, B. Ng and W. K. G. Seah, "Can Machine Learning Techniques Be Effectively Used in Real Networks against DDoS Attacks?," 2018 27th International Conference on Computer Communication and Networks (ICCCN), 2018, pp. 1-6, doi: 10.1109/ICCCN.2018.8487445.

Y. N. Soe, P. I. Santosa and R. Hartanto, "DDoS Attack Detection Based on Simple ANN with SMOTE for IoT Environment," 2019 Fourth International Conference on Informatics and Computing (ICIC), 2019, pp. 1-5, doi: 10.1109/ICIC47613.2019.8985853.

M. Roopak, G. Yun Tian and J. Chambers, "Deep Learning Models for Cyber Security in IoT Networks," 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 2019, pp. 0452-0457, doi: 10.1109/CCWC.2019.8666588.

B. Özçam, H. H. Kilinc and A. H. Zaim, "Detecting TCP Flood DDoS Attack by Anomaly Detection based on Machine Learning Algorithms," 2021 6th International Conference on Computer Science and Engineering (UBMK), 2021, pp. 512-516, doi: 10.1109/UBMK52708.2021.9558989.

O. R. Sanchez, M. Repetto, A. Carrega and R. Bolla, "Evaluating ML-based DDoS Detection with Grid Search Hyperparameter Optimization," 2021 IEEE 7th International Conference on Network Softwarization (NetSoft), 2021, pp. 402-408, doi: 10.1109/NetSoft51509.2021.9492633.

D. Nanthiya, P. Keerthika, S. B. Gopal, S. B. Kayalvizhi, T. Raja and R. S. Priya, "SVM Based DDoS Attack Detection in IoT Using Iot-23 Botnet Dataset," 2021 Innovations in Power and Advanced Computing Technologies (i-PACT), 2021, pp. 1-7, doi: 10.1109/i-PACT52855.2021.9696569.

R. Doshi, N. Apthorpe and N. Feamster, "Machine Learning DDoS Detection for Consumer Internet of Things Devices," 2018 IEEE Security and Privacy Workshops (SPW), 2018, pp. 29-35, doi: 10.1109/SPW.2018.00013.

Y. Jia, F. Zhong, A. Alrawais, B. Gong and X. Cheng, "FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks," in IEEE Internet of Things Journal, vol. 7, no. 10, pp. 9552-9562, Oct. 2020, doi: 10.1109/JIOT.2020.2993782.

Aysa, M. H., Ibrahim, A. A., & Mohammed, A. H. (2020, October). Iot ddos attack detection using machine learning. In 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-7). IEEE.‏

Ilango, H. S., Ma, M., & Su, R. (2021, December). Low Rate DoS Attack Detection in IoT-SDN using Deep Learning. In 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) (pp. 115-120). IEEE.‏

Pwint, P. H., & Shwe, T. (2019, November). Network traffic anomaly detection based on Apache Spark. In 2019 international conference on advanced information technologies (ICAIT) (pp. 222-226). IEEE.‏

Elbasi, E. (2020, December). Reliable abnormal event detection from IoT surveillance systems. In 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (pp. 1-5). IEEE.‏

Alrashdi, I., Alqazzaz, A., Aloufi, E., Alharthi, R., Zohdy, M., & Ming, H. (2019, January). Ad-iot: Anomaly detection of iot cyberattacks in smart city using machine learning. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0305-0310). IEEE.‏

Abbasi, F., Naderan, M., & Alavi, S. E. (2021, May). Anomaly detection in Internet of Things using feature selection and classification based on Logistic Regression and Artificial Neural Network on N-BaIoT dataset. In 2021 5th International Conference on Internet of Things and Applications (IoT) (pp. 1-7). IEEE.‏

Huč, A., & Trček, D. (2021). Anomaly detection in IoT networks: From architectures to machine learning transparency. IEEE Access, 9, 60607-60616.‏

Pathak, A. K., Saguna, S., Mitra, K., & Åhlund, C. (2021, June). Anomaly detection using machine learning to discover sensor tampering in IoT systems. In ICC 2021-IEEE International Conference on Communications (pp. 1-6). IEEE.‏

Rosenthal, G., Kdosha, O. E., Cohen, K., Freund, A., Bartik, A., & Ron, A. (2020). ARBA: Anomaly and reputation based approach for detecting infected IoT devices. IEEE Access, 8, 145751-145767.‏

Hsieh, R. J., Chou, J., & Ho, C. H. (2019, November). Unsupervised online anomaly detection on multivariate sensing time series data for smart manufacturing. In 2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA) (pp. 90-97). IEEE.‏

An, Y., Li, J., Yu, F. R., Chen, J., & Leung, V. C. (2020). A Novel HTTP Anomaly Detection Framework Based on Edge Intelligence for the Internet of Things (IoT). IEEE Wireless Communications, 28(2), 159-165.‏

Abdelmoumin, G., Rawat, D. B., & Rahman, A. (2021). On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the internet of things. IEEE Internet of Things Journal, 9(6), 4280-4290.‏

Ma, J., & Lin, S. (2019, December). Big data enabled anomaly user detection in mobile wireless networks. In 2019 IEEE 5th International Conference on Computer and Communications (ICCC) (pp. 479-484). IEEE.‏

Ayad, A., Zamani, A., Schmeink, A., & Dartmann, G. (2019, October). Design and implementation of a hybrid anomaly detection system for IoT. In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (pp. 1-6). IEEE.‏

An, Y., Yu, F. R., Li, J., Chen, J., & Leung, V. C. (2020). Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT). IEEE Internet of Things Journal, 8(5), 3554-3566.‏

Mothukuri, V., Khare, P., Parizi, R. M., Pouriyeh, S., Dehghantanha, A., & Srivastava, G. (2021). Federated-Learning-Based Anomaly Detection for IoT Security Attacks. IEEE Internet of Things Journal, 9(4), 2545-2554.‏

Sahu, N. K., & Mukherjee, I. (2020, June). Machine learning based anomaly detection for IoT network:(Anomaly detection in IoT network). In 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) (pp. 787-794). IEEE.‏

Gulhare, A. K., Badholia, A., & Sharma, A. (2022, July). Mean-Shift and Local Outlier Factor-Based Ensemble Machine Learning Approach for Anomaly Detection in IoT Devices. In 2022 International Conference on Inventive Computation Technologies (ICICT) (pp. 649-656). IEEE.‏

R. Kale, Z. Lu, K. W. Fok and V. L. L. Thing, "A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection," 2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), 2022, pp. 137-142, doi: 10.1109/BigDataSecurityHPSCIDS54978.2022.00034.

G. Guo, "A Machine Learning Framework for Intrusion Detection System in IoT Networks Using an Ensemble Feature Selection Method," 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2021, pp. 0593-0599, doi: 10.1109/IEMCON53756.2021.9623082.

M. Bagaa, T. Taleb, J. B. Bernabe and A. Skarmeta, "A Machine Learning Security Framework for Iot Systems," in IEEE Access, vol. 8, pp. 114066-114077, 2020, doi: 10.1109/ACCESS.2020.2996214.

S. A. Abdulkareem, C. H. Foh, F. Carrez and K. Moessner, "FI-PCA for IoT Network Intrusion Detection," 2022 International Symposium on Networks, Computers and Communications (ISNCC), 2022, pp. 1-6, doi: 10.1109/ISNCC55209.2022.9851723.

Divakar, S., Priyadarshini, R., Barik, R. K., & Roy, D. S. (2021, January). An Intelligent Intrusion Detection Scheme Powered by Boosting Algorithm. In 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (pp. 205-209). IEEE.‏

N. Chaabouni, M. Mosbah, A. Zemmari and C. Sauvignac, "A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning," NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, pp. 1-7, doi: 10.1109/NOMS47738.2020.9110473.

A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood and A. Anwar, "TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems," in IEEE Access, vol. 8, pp. 165130-165150, 2020, doi: 10.1109/ACCESS.2020.3022862.

J. Liu, D. Yang, M. Lian and M. Li, "Research on Classification of Intrusion Detection in Internet of Things Network Layer Based on Machine Learning," 2021 IEEE International Conference on Intelligence and Safety for Robotics (ISR), 2021, pp. 106-110, doi: 10.1109/ISR50024.2021.9419529.

Ravi, N., & Shalinie, S. M. (2020). Semisupervised-learning-based security to detect and mitigate intrusions in IoT network. IEEE Internet of Things Journal, 7(11), 11041-11052.‏

G. Abdelmoumin, D. B. Rawat and A. Rahman, "On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things," in IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4280-4290, 15 March15, 2022, doi: 10.1109/JIOT.2021.3103829.

Liu, Z., Thapa, N., Shaver, A., Roy, K., Yuan, X., & Khorsandroo, S. (2020, August). Anomaly detection on iot network intrusion using machine learning. In 2020 International conference on artificial intelligence, big data, computing and data communication systems (icABCD) (pp. 1-5). IEEE.‏

M. A. Cheema, H. Khaliq Qureshi, C. Chrysostomou and M. Lestas, "Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things," 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2020, pp. 429-435, doi: 10.1109/DCOSS49796.2020.00074.

R. M and V. Ananthanarayanan, "Machine Learning based Prediction Analysis in Intrusion Detection," 2022 International Conference on Electronics and Renewable Systems (ICEARS), 2022, pp. 1153-1159, doi: 10.1109/ICEARS53579.2022.9752061.

A. Yahyaoui, H. Lakhdhar, T. Abdellatif and R. Attia, "Machine learning based network intrusion detection for data streaming IoT applications," 2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter), 2021, pp. 51-56, doi: 10.1109/SNPDWinter52325.2021.00019.

A. P. Singh, S. Kumar, A. Kumar and M. Usama, "Machine Learning based Intrusion Detection System for Minority Attacks Classification," 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), 2022, pp. 256-261, doi: 10.1109/CISES54857.2022.9844381.

K. Saurabh et al., "LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks," 2022 IEEE World AI IoT Congress (AIIoT), 2022, pp. 753-759, doi: 10.1109/AIIoT54504.2022.9817245.

M. M. Alani, "IoTProtect: A Machine-Learning Based IoT Intrusion Detection System," 2022 6th International Conference on Cryptography, Security and Privacy (CSP), 2022, pp. 61-65, doi: 10.1109/CSP55486.2022.00020.

V. Ponnusamy and B. Sharma, "Investigation on IoT Intrusion Detection in Wireless Environment," 2021 International Conference on Computer & Information Sciences (ICCOINS), 2021, pp. 7-13, doi: 10.1109/ICCOINS49721.2021.9497203.

J. Ashraf, N. Moustafa, A. D. Bukhshi and A. Javed, "Intrusion Detection System for SDN-enabled IoT Networks using Machine Learning Techniques," 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW), 2021, pp. 46-52, doi: 10.1109/EDOCW52865.2021.00031.

C. Liang, B. Shanmugam, S. Azam, M. Jonkman, F. D. Boer and G. Narayansamy, "Intrusion Detection System for Internet of Things based on a Machine Learning approach," 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), 2019, pp. 1-6, doi: 10.1109/ViTECoN.2019.8899448.

R. V. Mendonça et al., "Intrusion Detection System Based on Fast Hierarchical Deep Convolutional Neural Network," in IEEE Access, vol. 9, pp. 61024-61034, 2021, doi: 10.1109/ACCESS.2021.3074664.

B. Susilo and R. F. Sari, "Intrusion Detection in Software Defined Network Using Deep Learning Approach," 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), 2021, pp. 0807-0812, doi: 10.1109/CCWC51732.2021.9375951.

S. Hanif, T. Ilyas and M. Zeeshan, "Intrusion Detection In IoT Using Artificial Neural Networks On UNSW-15 Dataset," 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), 2019, pp. 152-156, doi: 10.1109/HONET.2019.8908122.

J. Jose, D. V. Jose, K. S. Rao and J. Janz, "Impact of Machine Learning Algorithms in Intrusion Detection Systems for Internet of Things," 2021 International Conference on Advances in Computing and Communications (ICACC), 2021, pp. 1-6, doi: 10.1109/ICACC-202152719.2021.9708404.

D. Lightbody, D. -M. Ngo, A. Temko, C. Murphy and E. Popovici, "Host-Based Intrusion Detection System for IoT using Convolutional Neural Networks," 2022 33rd Irish Signals and Systems Conference (ISSC), 2022, pp. 1-7, doi: 10.1109/ISSC55427.2022.9826188.

C. Jiang, J. Kuang and S. Wang, "Home IoT Intrusion Prevention Strategy Based on Edge Computing," 2019 IEEE 2nd International Conference on Electronics and Communication Engineering (ICECE), 2019, pp. 94-98, doi: 10.1109/ICECE48499.2019.9058536.

R. Samdekar, S. M. Ghosh and K. Srinivas, "Efficiency Enhancement of Intrusion Detection in Iot Based on Machine Learning Through Bioinspire," 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021, pp. 383-387, doi: 10.1109/ICICV50876.2021.9388392.

V. Christopher et al., "Minority Resampling Boosted Unsupervised Learning With Hyperdimensional Computing for Threat Detection at the Edge of Internet of Things," in IEEE Access, vol. 9, pp. 126646-126657, 2021, doi: 10.1109/ACCESS.2021.3111053.

A. Makkar, S. Garg, N. Kumar, M. S. Hossain, A. Ghoneim and M. Alrashoud, "An Efficient Spam Detection Technique for IoT Devices Using Machine Learning," in IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 903-912, Feb. 2021, doi: 10.1109/TII.2020.2968927.

I. Kotenko, I. Saenko, A. Kushnerevich and A. Branitskiy, "Attack Detection in IoT Critical Infrastructures: A Machine Learning and Big Data Processing Approach," 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), 2019, pp. 340-347, doi: 10.1109/EMPDP.2019.8671571.

Y. Zhang, C. Dukkipati and L. -C. Cheng, "Clustering Methods for Identification of Attacks in IoT Based Traffic Signal System," 2019 International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC), 2019, pp. 24-28, doi: 10.1109/SDPC.2019.00013.

S. Alevizopoulou, P. Koloveas, C. Tryfonopoulos and P. Raftopoulou, "Social Media Monitoring for IoT Cyber-Threats," 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, pp. 436-441, doi: 10.1109/CSR51186.2021.9527964.

T. V. Khoa et al., "Collaborative Learning Model for Cyberattack Detection Systems in IoT Industry 4.0," 2020 IEEE Wireless Communications and Networking Conference (WCNC), 2020, pp. 1-6, doi: 10.1109/WCNC45663.2020.9120761.

M. M. Rashid, J. Kamruzzaman, T. Imam, S. Kaisar and M. J. Alam, "Cyber Attacks Detection from Smart City Applications Using Artificial Neural Network," 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), 2020, pp. 1-6, doi: 10.1109/CSDE50874.2020.9411606.

Y. Zhou, M. Han, L. Liu, J. S. He and Y. Wang, "Deep learning approach for cyberattack detection," IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2018, pp. 262-267, doi: 10.1109/INFCOMW.2018.8407032.

A. B. M. Sultan, S. Mehmood and H. Zahid, "Man in the Middle Attack Detection for MQTT based IoT devices using different Machine Learning Algorithms," 2022 2nd International Conference on Artificial Intelligence (ICAI), 2022, pp. 118-121, doi: 10.1109/ICAI55435.2022.9773590.

A. Nascita, F. Cerasuolo, D. D. Monda, J. T. A. Garcia, A. Montieri and A. Pescapè, "Machine and Deep Learning Approaches for IoT Attack Classification," IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2022, pp. 1-6, doi: 10.1109/INFOCOMWKSHPS54753.2022.9797971.

Y. K. Saheed and M. O. Arowolo, "Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms," in IEEE Access, vol. 9, pp. 161546-161554, 2021, doi: 10.1109/ACCESS.2021.3128837.

L. T. Hong Van, P. Van Huong, T. Q. Hua, L. Duc Thuan and N. H. Minh, "Feature Generation by K-means for Convolutional Neural Network in Detecting IoT System Attacks," 2021 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT), 2021, pp. 1-5, doi: 10.1109/ICMLANT53170.2021.9690532.

N. Abdalgawad, A. Sajun, Y. Kaddoura, I. A. Zualkernan and F. Aloul, "Generative Deep Learning to Detect Cyberattacks for the IoT-23 Dataset," in IEEE Access, vol. 10, pp. 6430-6441, 2022, doi: 10.1109/ACCESS.2021.3140015.

Susanto, D. Stiawan, M. A. S. Arifin, J. Rejito, M. Y. Idris and R. Budiarto, "A Dimensionality Reduction Approach for Machine Learning Based IoT Botnet Detection," 2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2021, pp. 26-30, doi: 10.23919/EECSI53397.2021.9624299.

M. G. Desai, Y. Shi and K. Suo, "A Hybrid Approach for IoT Botnet Attack Detection," 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2021, pp. 0590-0592, doi: 10.1109/IEMCON53756.2021.9623102.

O. P. Dwyer, A. K. Marnerides, V. Giotsas and T. Mursch, "Profiling IoT-Based Botnet Traffic Using DNS," 2019 IEEE Global Communications Conference (GLOBECOM), 2019, pp. 1-6, doi: 10.1109/GLOBECOM38437.2019.9014300.

H. Gandhi and V. Ribeiro, "Packet Batching for Reducing System Resource Consumption for Botnet Detection using Network Traffic Analysis," 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2022, pp. 1-6, doi: 10.1109/COMSNETS53615.2022.9668511.

S. Sriram, R. Vinayakumar, M. Alazab and S. KP, "Network Flow based IoT Botnet Attack Detection using Deep Learning," IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2020, pp. 189-194, doi: 10.1109/INFOCOMWKSHPS50562.2020.9162668.

T. C. Tran and T. Khanh Dang, "Machine Learning for Multi-Classification of Botnets Attacks," 2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2022, pp. 1-8, doi: 10.1109/IMCOM53663.2022.9721811.

F. Jeelani, D. S. Rai, A. Maithani and S. Gupta, "The Detection of IoT Botnet using Machine Learning on IoT-23 Dataset," 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), 2022, pp. 634-639, doi: 10.1109/ICIPTM54933.2022.9754187.

F. Hussain, S. G. Abbas, U. U. Fayyaz, G. A. Shah, A. Toqeer and A. Ali, "Towards a Universal Features Set for IoT Botnet Attacks Detection," 2020 IEEE 23rd International Multitopic Conference (INMIC), 2020, pp. 1-6, doi: 10.1109/INMIC50486.2020.9318106.

S. Nõmm and H. Bahşi, "Unsupervised Anomaly Based Botnet Detection in IoT Networks," 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), 2018, pp. 1048-1053, doi: 10.1109/ICMLA.2018.00171.

M. Lefoane, I. Ghafir, S. Kabir and I. -U. Awan, "Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks," in IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 921-929, Jan. 2023, doi: 10.1109/TII.2022.3192044.

Aysa, M. H., Ibrahim, A. A., & Mohammed, A. H. (2020, October). Iot ddos attack detection using machine learning. In 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-7). IEEE.‏

N. Hasan, Z. Chen, C. Zhao, Y. Zhu and C. Liu, "IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine," IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2022, pp. 1-6, doi: 10.1109/INFOCOMWKSHPS54753.2022.9798307.

H. -T. Nguyen, Q. -D. Ngo and V. -H. Le, "IoT Botnet Detection Approach Based on PSI graph and DGCNN classifier," 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP), 2018, pp. 118-122, doi: 10.1109/ICICSP.2018.8549713.

S. Joshi and E. Abdelfattah, "Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks," 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2020, pp. 0517-0521, doi: 10.1109/UEMCON51285.2020.9298095.

A. Kumar and T. J. Lim, "EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques," 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 2019, pp. 289-294, doi: 10.1109/WF-IoT.2019.8767194.

A. B. de Neira, A. M. Araujo and M. Nogueira, "Early Botnet Detection for the Internet and the Internet of Things by Autonomous Machine Learning," 2020 16th International Conference on Mobility, Sensing and Networking (MSN), 2020, pp. 516-523, doi: 10.1109/MSN50589.2020.00087.

H. Bahşi, S. Nõmm and F. B. La Torre, "Dimensionality Reduction for Machine Learning Based IoT Botnet Detection," 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), 2018, pp. 1857-1862, doi: 10.1109/ICARCV.2018.8581205.

P. R. K. Pranav, S. Verma, S. Shenoy and S. Saravanan, "Detection of Botnets in IoT Networks using Graph Theory and Machine Learning," 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI), 2022, pp. 590-597, doi: 10.1109/ICOEI53556.2022.9777117.

M. Raghavendra and Z. Chen, "Detecting IoT Botnets on IoT Edge Devices," 2022 IEEE International Conference on Communications Workshops (ICC Workshops), 2022, pp. 373-378, doi: 10.1109/ICCWorkshops53468.2022.9814555.

M. Injadat, A. Moubayed and A. Shami, "Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach," 2020 32nd International Conference on Microelectronics (ICM), 2020, pp. 1-4, doi: 10.1109/ICM50269.2020.9331794.

M. Shafiq, Z. Tian, A. K. Bashir, X. Du and M. Guizani, "CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques," in IEEE Internet of Things Journal, vol. 8, no. 5, pp. 3242-3254, 1 March1, 2021, doi: 10.1109/JIOT.2020.3002255.

H. Qiao, B. Novikov and J. O. Blech, "Concept Drift Analysis by Dynamic Residual Projection for Effectively Detecting Botnet Cyber-Attacks in IoT Scenarios," in IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp. 3692-3701, June 2022, doi: 10.1109/TII.2021.3108464.

C. Long, X. Xiao, W. Wan, J. Zhao, J. Wei and G. Du, "Botnet Detection Based on Flow Summary and Graph Sampling with Machine Learning," 2021 International Conference on Computer Engineering and Application (ICCEA), 2021, pp. 309-317, doi: 10.1109/ICCEA53728.2021.00068.

Alshamkhany, M., Alshamkhany, W., Mansour, M., Khan, M., Dhou, S., & Aloul, F. (2020, November). Botnet attack detection using machine learning. In 2020 14th International Conference on Innovations in Information Technology (IIT) (pp. 203-208). IEEE.‏

K. N. Karaca and A. Çetin, "Botnet Attack Detection Using Convolutional Neural Networks in the IoT Environment," 2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA), 2021, pp. 1-6, doi: 10.1109/INISTA52262.2021.9548445.

F. Abbasi, M. Naderan and S. E. Alavi, "Anomaly detection in Internet of Things using feature selection and classification based on Logistic Regression and Artificial Neural Network on N-BaIoT dataset," 2021 5th International Conference on Internet of Things and Applications (IoT), 2021, pp. 1-7, doi: 10.1109/IoT52625.2021.9469605.

U. Garg, V. Kaushik, A. Panwar and N. Gupta, "Analysis of Machine Learning Algorithms for IoT Botnet," 2021 2nd International Conference for Emerging Technology (INCET), 2021, pp. 1-5, doi: 10.1109/INCET51464.2021.9456246.

T. N. Nguyen, Q. -D. Ngo, H. -T. Nguyen and G. L. Nguyen, "An Advanced Computing Approach for IoT-Botnet Detection in Industrial Internet of Things," in IEEE Transactions on Industrial Informatics, vol. 18, no. 11, pp. 8298-8306, Nov. 2022, doi: 10.1109/TII.2022.3152814.

Q. -D. Ngo, H. -T. Nguyen, V. -D. Nguyen, C. -M. Dinh, A. -T. Phung and Q. -T. Bui, "Adversarial Attack and Defense on Graph-based IoT Botnet Detection Approach," 2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), 2021, pp. 1-6, doi: 10.1109/ICECCE52056.2021.9514255.

“Cyber crime,” FBI. [Online]. Available: https://www.fbi.gov/investigate/cyber#Respond-and%20Report. [Accessed: 04-May-2022].

T. Liggett, ‘‘Evolution of endpoint detection and response platforms,’’ Ph.D. dissertation, School Arts, Utica College, Utica, NY, USA, 2018.

F. Liang, W. G. Hatcher, G. Xu, J. Nguyen, W. Liao, and W. Yu, ‘‘Towards online deep learning-based energy forecasting,’’ in Proc. 28th Int. Conf. Comput. Commun. Netw. (ICCCN), 2019, pp. 1–9.

Y. Cui, W. He, C. Ni, C. Guo, and Z. Liu, ‘‘Energy-efficient resource allocation for cache-assisted mobile edge computing,’’ in Proc. IEEE 42nd Conf. Local Comput. Netw. (LCN), Oct. 2017, pp. 640–648

W. Liao, C. Luo, S. Salinas, and P. Li, ‘‘Efficient secure outsourcing of large-scale convex separable programming for big data,’’ IEEE Trans. Big Data, vol. 5, no. 3, pp. 368–378, Sep. 2019

G. Lin,W. Xiao, J. Zhang, and Y. Xiang, “Deep learning-based vulnerable function detection: A benchmark,” in Proc. Int. Conf. Inf. Commun. Secur. Cham, Switzerland: Springer, 2019, pp. 219–232.

E. Fernandes, A. Rahmati, K. Eykholt, and A. Prakash, “Internet of Things security research: A rehash of old ideas or new intellectual challenges?” IEEE Security Privacy, vol. 15, no. 4, pp. 79–84, Aug. 2017.

Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, ``Edge intelligence: Paving the last mile of articial intelligence with edge computing,'' Proc. IEEE, vol. 107, no. 8, pp. 17381762, Aug. 2019.

J. Sengupta, R.Kubendran, E. Neftci, and A. Andreou, ``High-speed, realtime, spike-based object tracking and path prediction on Google edge TPU,'' in Proc. 2nd IEEE Int. Conf. Artif. Intell. Circuits Syst. (AICAS), Aug. 2020, pp. 134135.

M. A. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, I. Ali, and M. Guizani, ``A survey of machine and deep learning methods for Internet of Things (IoT) security,'' IEEE Commun. Surveys Tuts., early access, Apr. 20, 2020, doi: 10.1109/COMST.2020.2988293.

P. Shukla, “ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things,” in Proc. Intell. Syst. Conf. (IntelliSys), Sep. 2017, pp. 234–240

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,” in Proc. Int. Conf. Inf. Syst. Secur. Privacy, 2018, pp. 108–116.

J. A. Harer et al., “Automated software vulnerability detection with machine learning,” 2018, arXiv:1803.04497. [Online]. Available: http://arxiv.org/abs/1803.04497

R. Russell et al., “Automated vulnerability detection in source code using deep representation learning,” in Proc. 17th IEEE Int. Conf. Mach. Learn. Appl. (ICMLA), Dec. 2018, pp. 757–762.

Z. Li et al., “Vuldeepecker: A deep learning-based system for vulnerability detection,” in Proc. NDSS, 2018, pp. 1–15.

G. Lin et al., “Cross-project transfer representation learning for vulnerable function discovery,” IEEE Trans. Ind. Informat., vol. 14, no. 7, pp. 3289–3297, Jul. 2018.

M. Allamanis, E. T. Barr, P. Devanbu, and C. Sutton, “A survey of machine learning for big code and naturalness,” ACM Comput. Surv., vol. 51, no. 4, p. 81, 2018.

Z. A. El Houda, B. Brik and S. -M. Senouci, "A Novel IoT-Based Explainable Deep Learning Framework for Intrusion Detection Systems," in IEEE Internet of Things Magazine, vol. 5, no. 2, pp. 20-23, June 2022, doi: 10.1109/IOTM.005.2200028.

M. Abrishami et al., "Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study," 2022 32nd Conference of Open Innovations Association (FRUCT), Tampere, Finland, 2022, pp. 3-14, doi: 10.23919/FRUCT56874.2022.9953823.

S. Laazizi, J. Ben Azzouz and A. Jemai, "cybclass: classification approach for cybersecurity in industry 4.0," 2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), Hammamet, Tunisia, 2022, pp. 378-384, doi: 10.1109/SETIT54465.2022.9875643.

K. Singh, S. S. Grover and R. K. Kumar, "Cyber Security Vulnerability Detection Using Natural Language Processing," 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 2022, pp. 174-178, doi: 10.1109/AIIoT54504.2022.9817336.

S. T. Mehedi, A. Anwar, Z. Rahman, K. Ahmed and R. Islam, "Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach," in IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 1006-1017, Jan. 2023, doi: 10.1109/TII.2022.3164770.

Z. Anastasakis et al., "Enhancing Cyber Security in IoT Systems using FL-based IDS with Differential Privacy," 2022 Global Information Infrastructure and Networking Symposium (GIIS), Argostoli, Greece, 2022, pp. 30-34, doi: 10.1109/GIIS56506.2022.9936912.

K. Ibrahimi and H. Benaddi, "Improving the IDS for BoT-IoT Dataset-Based Machine Learning Classifiers," 2022 5th International Conference on Advanced Communication Technologies and Networking (CommNet), Marrakech, Morocco, 2022, pp. 1-6, doi: 10.1109/CommNet56067.2022.9993869.

M. Venkatasubramanian, A. H. Lashkari and S. Hakak, "IoT Malware Analysis using Federated Learning: A Comprehensive Survey," in IEEE Access, doi: 10.1109/ACCESS.2023.3235389.

O. Abdel Wahab, "Intrusion Detection in the IoT Under Data and Concept Drifts: Online Deep Learning Approach," in IEEE Internet of Things Journal, vol. 9, no. 20, pp. 19706-19716, 15 Oct.15, 2022, doi: 10.1109/JIOT.2022.3167005.

N. Karmous, M. O. -E. Aoueileyine, M. Abdelkader and N. Youssef, "IoT Real-Time Attacks Classification Framework Using Machine Learning," 2022 IEEE Ninth International Conference on Communications and Networking (ComNet), Hammamet, Tunisia, 2022, pp. 1-5, doi: 10.1109/ComNet55492.2022.9998441.

A. Ahmed and C. Tjortjis, "Machine Learning based IoT-BotNet Attack Detection Using Real-time Heterogeneous Data," 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), Prague, Czech Republic, 2022, pp. 1-6, doi: 10.1109/ICECET55527.2022.9872817.




DOI: https://doi.org/10.31449/inf.v47i6.4635

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.