| Literature DB >> 34960414 |
Abebe Diro1, Naveen Chilamkurti2, Van-Doan Nguyen2, Will Heyne3.
Abstract
The Internet of Things (IoT) consists of a massive number of smart devices capable of data collection, storage, processing, and communication. The adoption of the IoT has brought about tremendous innovation opportunities in industries, homes, the environment, and businesses. However, the inherent vulnerabilities of the IoT have sparked concerns for wide adoption and applications. Unlike traditional information technology (I.T.) systems, the IoT environment is challenging to secure due to resource constraints, heterogeneity, and distributed nature of the smart devices. This makes it impossible to apply host-based prevention mechanisms such as anti-malware and anti-virus. These challenges and the nature of IoT applications call for a monitoring system such as anomaly detection both at device and network levels beyond the organisational boundary. This suggests an anomaly detection system is strongly positioned to secure IoT devices better than any other security mechanism. In this paper, we aim to provide an in-depth review of existing works in developing anomaly detection solutions using machine learning for protecting an IoT system. We also indicate that blockchain-based anomaly detection systems can collaboratively learn effective machine learning models to detect anomalies.Entities:
Keywords: anomaly detection; blockchain; cybersecurity; deep learning; machine learning; the Internet of Things
Mesh:
Year: 2021 PMID: 34960414 PMCID: PMC8708212 DOI: 10.3390/s21248320
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Anomaly-Based I.D.S.s according to Anomaly Types and Applications.
| ANOMALY TYPES | ||||
|---|---|---|---|---|
| Points | Contextual | Collective | ||
|
|
| [ | [ | [ |
| [ | [ | |||
| [ | ||||
| [ | ||||
| [ | ||||
| [ | ||||
| [ | ||||
|
| [ | |||
|
| [ | |||
| [ | ||||
| [ | ||||
|
| [ | |||
|
| [ | |||
|
| [ | |||
|
| [ | [ | ||
| [ | ||||
| [ | ||||
|
| [ | |||
Learning Algorithms According to Anomaly Types and Machine Learning Schemes.
| ANOMALY TYPES | ||||
|---|---|---|---|---|
| Points | Contextual | Collective | ||
|
|
| RF [ | RL [ | CNN [ |
| DL [ | LSTM [ | GNN [ | ||
| Multiple [ | ||||
| AE-ANN [ | ||||
| LSTM [ | ||||
| AE-CNN [ | ||||
| Ensemble [ | ||||
|
| AE-CNN [ | Subspace [ | AE [ | |
| AE [ | Self-learning [ | |||
|
| TCN [ | AE-LSTM [ | DNN [ | |
| DBN [ | ||||
Common Datasets for Anomaly Detection in the IoT System (Adapted from [1]).
| Dataset | Published Year | IoT Specific | Dimensions | Normal Instances | Abnormal Instances |
|---|---|---|---|---|---|
| N-BaIoT [ | 2018 | Yes | 115 | 555,932 | 6,545,967 |
| CICIDS 2017 [ | 2017 | No | 80 | 2,273,097 | 557,646 |
| AWID [ | 2015 | No | 155 | 530,785 | 44,858 |
| UNSW-NB15 [ | 2015 | No | 49 | 2,218,761 | 321,283 |
| NLS-KDD [ | 2009 | No | 43 | 77,054 | 71,463 |
| Kyoto [ | 2006 | No | 24 | 50,033,015 | 43,043,255 |
| KDD CUP 1999 [ | 1999 | No | 43 | 1,033,372 | 4,176,086 |