Anomaly intrusion detection systems in IoT using deep learning techniques: a survey

Security has a major role to play in the utilization and operations of the internet of things (IoT). Several studies have explored anomaly intrusion detection and its utilization in a variety of applications. Building an effective anomaly intrusion detection system requires researchers and developer...

Full description

Saved in:
Bibliographic Details
Main Authors: Alsoufi, Muaadh. A., Razak, Shukor, Md. Siraj, Maheyzah, Ali, Abdulalem, Nasser, Maged, Abdo, Salah
Format: Book Section
Published: Springer Science and Business Media Deutschland GmbH 2021
Subjects:
Online Access:http://eprints.utm.my/id/eprint/96385/
http://dx.doi.org/10.1007/978-3-030-70713-2_60
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Description
Summary:Security has a major role to play in the utilization and operations of the internet of things (IoT). Several studies have explored anomaly intrusion detection and its utilization in a variety of applications. Building an effective anomaly intrusion detection system requires researchers and developers to comprehend the complex structure from noisy data, identify the dynamic anomaly patterns, and detect anomalies while lacking sufficient labels. Consequently, improving the performance of anomaly detection requires the use of advanced deep learning techniques instead of traditional shallow learning approaches. The large number of devices connected to IoT which massively generate a large amount of data require large computation as well. This study presents a survey on anomaly intrusion detection using deep learning approaches with emphasis on resource-constrained devices used in real-world problems in the realm of IoT. The findings from the reviewed studies showed that deep learning is superior to detect anomaly in terms of high detection accuracy and false alarm rate. However, it is highly recommended to conduct further studies using deep learning techniques for robust IDS.