Skip to main content

Internet of Things: A Survey on Fused Machine Learning-Based Intrusion Detection Approaches

  • Conference paper
  • First Online:
Advanced Machine Intelligence and Signal Processing

Abstract

The Internet of Things (IoT) connects billions of interconnected devices that can exchange information with each other with minimal user intervention. The goal of IoT is to become accessible to anyone, anytime, and anywhere. IoT has engaged in multiple fields, including education, health care, businesses, and smart home. Security and privacy issues have been significant obstacles to the widespread adoption of IoT. IoT devices cannot be entirely secure from threats; detecting attacks in real-time is essential for securing devices. In the real-time communication domain and especially in IoT, security and protection are the major issues. The resource-constrained nature of IoT devices makes traditional security techniques difficult. In this paper, the research work carried out in IoT intrusion detection system is presented. The deep learning methods are explored to provide an effective security solution for IoT intrusion detection systems. Then, the advantages and disadvantages of the methodology are discussed. Further, the open issues for future trends are provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tabassum, K., Ibrahim, A., El Rahman, S.A.: Security issues and challenges in IoT. In: 2019 International Conference on Computer and Information Sciences (ICCIS), pp. 1–5. IEEE (2019)

    Google Scholar 

  2. Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25–37 (2017)

    Article  Google Scholar 

  3. Tahsien, S.M., Karimipour, H., Spachos, P.: Machine learning-based solutions for the security of Internet of Things (IoT): a survey. J. Netw. Comput. Appl., 102630 (2020)

    Google Scholar 

  4. Hussain, F., Hussain, R., Hassan, S.A., Hossain, E.: Machine learning in IoT security: current solutions and future challenges. IEEE Commun. Surv. Tutorials 22(3), 1686–1721 (2020)

    Article  Google Scholar 

  5. Hajiheidari, S., Wakil, K., Badri, M., Navimipour, N.J.: Intrusion detection systems in the Internet of things: a comprehensive investigation. Comput. Netw. 160, 165–191 (2019)

    Article  Google Scholar 

  6. Li, H., Ota, K., Dong, M.: Learning IoT in edge: deep learning for the Internet of Things with edge computing. IEEE Netw. 32(1), 96–101 (2018)

    Article  Google Scholar 

  7. Fadlullah, Z.M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., Mizutani, K.: State-of-the-art deep learning: evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Commun. Surv. Tutorials 19(4), 2432–2455 (2017)

    Article  Google Scholar 

  8. Vinayakumar, R., Soman, K.P., Poornachandran, P.: Applying convolutional neural network for network intrusion detection. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1222–1228. IEEE (2017)

    Google Scholar 

  9. Chowdhury, M.M.U., Hammond, F., Konowicz, G., Xin, C., Wu, H., Li, J.: A few-shot deep learning approach for improved intrusion detection. In: IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017, pp. 456–462 (2017)

    Google Scholar 

  10. Lin, W.H., Lin, H.C., Wang, P., Wu, B.H., Tsai, J.Y.: Using convolutional neural networks to network intrusion detection for cyber threats. In: IEEE International Conference on Applied System Invention (ICASI), 2018, pp. 1107–1110. IEEE (2018)

    Google Scholar 

  11. Naseer, S., Saleem, Y., Khalid, S., Bashir, M.K., Han, J., Iqbal, M.M., Han, K.: Enhanced network anomaly detection based on deep neural networks. IEEE Access (2018)

    Google Scholar 

  12. Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089 (2018)

  13. Al-Qatf, M., Lasheng, Y., Al-Habib, M., Al-Sabahi, K.: Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6, 52843–52856. IEEE (2018)

    Google Scholar 

  14. Farahnakian, F., Heikkonen, J.: A deep auto-encoder based approach for intrusion detection system. In: International Conference on Advanced Communication Technology (ICACT), 2018, pp. 178–183. IEEE (2018)

    Google Scholar 

  15. Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 1, 41–50 (2017)

    Article  Google Scholar 

  16. Torres, P., Catania, C., Garcia, S., Garino, C.G.: An analysis of recurrent neural networks for botnet detection behavior. In 2016 IEEE Biennial Congress of Argentina (ARGENCON), pp. 1–6. IEEE (2016)

    Google Scholar 

  17. Almiani, M., AbuGhazleh, A., Al-Rahayfeh, A., Atiewi, S., Razaque, A.: Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 101, 102031 (2020)

    Google Scholar 

  18. Jiang, F., Fu, Y., Gupta, B.B., Liang, Y., Rho, S., Lou, F., Tian, Z.: Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans. Sustain. Comput. (2018)

    Google Scholar 

  19. Mayuranathan, M., Murugan, M., Dhanakoti, V.: Best features-based intrusion detection system by RBM model for detecting DDoS in cloud environment. J. Ambient Intell. Humanized Comput., 1–11 (2019)

    Google Scholar 

  20. Wang, C.R., Xu, R.F., Lee, S.J., Lee, C.H.: Network intrusion detection using equality constrained-optimization-based extreme learning machines. Knowl.-Based Syst. (2018)

    Google Scholar 

  21. Mohammadi, M., Al-Fuqaha, A., Sorour, S., Guizani, M.: Deep learning for IoT big data and streaming analytics: a survey. IEEE Commun. Surv. Tutorial 20, 2923–2960 (2018)

    Article  Google Scholar 

  22. Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in vehicle network security. PLoS ONE 11(6), 1–17 (2019)

    Google Scholar 

  23. Dinh, P.V., Ngoc, T.N., Shone, N., MacDermott, Á., Shi, Q.: Deep learning combined with de-noising data for network intrusion detection. In: Proceeding of 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems. IES, 2017, pp. 55–60 (2017)

    Google Scholar 

  24. Lin, Z., Shi, Y., Xue, Z.: Idsgan: Generative adversarial networks for attack generation against intrusion detection. arXiv preprint arXiv:1809.02077 (2018)

  25. Li, D., Chen, D., Goh, J., Ng, S.K.: Anomaly detection with generative adversarial networks for multivariate time series. arXiv preprint arXiv:1809.04758 (2018)

  26. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Bengio, Y.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 27 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Lokesh Yadav or Deepak Singh Tomar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, P., Yadav, L., Tomar, D.S. (2022). Internet of Things: A Survey on Fused Machine Learning-Based Intrusion Detection Approaches. In: Gupta, D., Sambyo, K., Prasad, M., Agarwal, S. (eds) Advanced Machine Intelligence and Signal Processing. Lecture Notes in Electrical Engineering, vol 858. Springer, Singapore. https://doi.org/10.1007/978-981-19-0840-8_11

Download citation

Publish with us

Policies and ethics