This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Ali H. Wheeb,

Munsifa Firdaus Khan,
- Associate Professor, Department of computer engineering, College of Engineering, University of Baghdad, Baghdad, Iraq
- Assistant Professor, Department of Computer Science and Engineering, Assam Downtown University, Guwahati, Assam, India
Abstract document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_abs_130231’);});Edit Abstract & Keyword
The Internet of Things (IoT) refers to the integration of physical objects with the Internet, allowing for connectivity and monitoring. This idea has garnered immense attention from researchers and users alike, driven by the widespread accessibility of the Internet. It spans a wide range of devices, including smart versions of conventional appliances, innovative tools tailored for Internet-enabled ecosystems, and sensors that leverage connectivity to revolutionize industries such as manufacturing, healthcare, transportation, and everyday living environments. Nevertheless, IoT does have a drawback, though, and that is the absence of strong and reliable security mechanisms. The usage of IoT has a number of potential dangers. These involve the possibility of illegal data accessibility, and other cyberattacks such as ransomware, botnets, denial of service (DoS), and espionage. The main focus outlined below is the application of machine learning (ML) algorithms for detecting network intrusions. When developing intrusion detection systems to identify network abnormalities, ML is a key component. ML algorithms are quite effective in identifying various forms of cyberattacks. The overview of several ML algorithms for detecting intrusions into IoT systems is presented in this research paper. Algorithms such as support vector machines, random forests, and neural networks are essential for identifying anomalies in networks. To create intrusion detection systems, many datasets are available, such as CICIDS-2017, KDD-99, UNSW-NB 15, and TON_IoT. These datasets provide information on various kinds of cyberattacks. Further, challenges and security solutions for IoT Networks are discussed.
Keywords: Internet of Things (IoT), Machine Learning (ML) Algorithms, Security Solution, IDS, attack detection.
[This article belongs to Journal of Artificial Intelligence Research & Advances (joaira)]
Ali H. Wheeb, Munsifa Firdaus Khan. A Survey of Several Machine Learning (Ml) Algorithms for Security Solution In Internet Of Thinks (Iot) Networks. Journal of Artificial Intelligence Research & Advances. 2024; 12(01):-.
Ali H. Wheeb, Munsifa Firdaus Khan. A Survey of Several Machine Learning (Ml) Algorithms for Security Solution In Internet Of Thinks (Iot) Networks. Journal of Artificial Intelligence Research & Advances. 2024; 12(01):-. Available from: https://journals.stmjournals.com/joaira/article=2024/view=0
References
document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_ref_130231’);});Edit
- Hossain MS, Muhammad G. Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring. Computer Networks. 2016 Jun 4;101:192-202.
- Farooq MS, Sohail OO, Abid A, Rasheed S. A survey on the role of iot in agriculture for the implementation of smart livestock environment. IEEE Access. 2022 Jan 13;10:9483-505.
- Rejeb A, Rejeb K, Treiblmaier H, Appolloni A, Alghamdi S, Alhasawi Y, Iranmanesh M. The Internet of Things (IoT) in healthcare: Taking stock and moving forward. Internet of Things. 2023 Jul 1;22:100721.
- Wu Y, Dai HN, Wang H, Xiong Z, Guo S. A survey of intelligent network slicing management for industrial IoT: Integrated approaches for smart transportation, smart energy, and smart factory. IEEE Communications Surveys & Tutorials. 2022 Mar 10;24(2):1175-211.
- Lansky J, Ali S, Mohammadi M, Majeed MK, Karim SH, Rashidi S, Hosseinzadeh M, Rahmani AM. Deep learning-based intrusion detection systems: a systematic review. IEEE Access. 2021 Jul 14;9:101574-99.
- Maghrabi LA. Automated Network Intrusion Detection for Internet of Things Security Enhancements. IEEE Access. 2024 Feb 23.
- RS S. Effective Feature Selection for Hybrid Wireless IoT Network Intrusion Detection Systems Using Machine Learning Techniques. Adhoc & Sensor Wireless Networks. 2021 May 1;49.
- Zhao R, Gui G, Xue Z, Yin J, Ohtsuki T, Adebisi B, Gacanin H. A novel intrusion detection method based on lightweight neural network for internet of things. IEEE Internet of Things Journal. 2021 Oct 11;9(12):9960-72.
- Bagaa M, Taleb T, Bernabe JB, Skarmeta A. A machine learning security framework for iot systems. IEEE Access. 2020 May 21;8:114066-77.
- Ghasemi H, Babaie S. A new intrusion detection system based on SVM–GWO algorithms for Internet of Things. Wireless Networks. 2024 Feb 1:1-3.
- Vijayakumar KP, Pradeep K, Balasundaram A, Prusty MR. Enhanced cyber attack detection process for internet of health things (IoHT) devices using deep neural network. Processes. 2023 Apr 3;11(4):1072.
- Ferrag MA, Maglaras L, Ahmim A, Derdour M, Janicke H. Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks. Future internet. 2020 Mar 2;12(3):44.
- Pramilarani K, Kumari PV. Cost based Random Forest Classifier for Intrusion Detection System in Internet of Things. Applied Soft Computing. 2024 Jan 1;151:111125.
- Almiani M, AbuGhazleh A, Al-Rahayfeh A, Atiewi S, Razaque A. Deep recurrent neural network for IoT intrusion detection system. Simulation Modelling Practice and Theory. 2020 May 1;101:102031.
- Akhther P, Maryposonia A, Prasanth VS. Least Square Support Vector Machine based Intrusion Detection System in IoT. In2023 7th International Conference on Intelligent Computing and Control Systems (ICICCS) 2023 May 17 (pp. 1545-1550). IEEE.
- Mohy-Eddine, A. Guezzaz, S. Benkirane, and M. Azrour, “An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection,” Multimed. Tools Appl., vol. 82, no. 15, pp. 23615–23633, 2023.
- Hnamte V, Balram G. Implementation of Naive Bayes Classifier for Reducing DDoS Attacks in IoT Networks. Journal of Algebraic Statistics. 2022 Jun 4;13(2):2749-57.
- Zeeshan M, Riaz Q, Bilal MA, Shahzad MK, Jabeen H, Haider SA, Rahim A. Protocol-based deep intrusion detection for dos and ddos attacks using unsw-nb15 and bot-iot data-sets. IEEE Access. 2021 Dec 21;10:2269-83.
- Martins I, Resende JS, Sousa PR, Silva S, Antunes L, Gama J. Host-based IDS: A review and open issues of an anomaly detection system in IoT. Future Generation Computer Systems. 2022 Aug 1;133:95-113.
- Lo WW, Layeghy S, Sarhan M, Gallagher M, Portmann M. E-graphsage: A graph neural network based intrusion detection system for iot. InNOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2022 Apr 25 (pp. 1-9). IEEE.
- Azrour M, Mabrouki J, Guezzaz A, Kanwal A. Internet of things security: challenges and key issues. Security and Communication Networks. 2021;2021(1):5533843.
- Gupta BB, Quamara M. An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience. 2020 Nov 10;32(21):e4946.
- Burhan M, Rehman RA, Khan B, Kim BS. IoT elements, layered architectures and security issues: A comprehensive survey. sensors. 2018 Aug 24;18(9):2796.
- Cekerevac Z, Dvorak Z, Prigoda L, Cekerevac P. Internet of things and the man-in-the-middle attacks–security and economic risks. MEST Journal. 2017 Jul;5(2):15-25.
- Ali MH, Jaber MM, Abd SK, Rehman A, Awan MJ, Damaševičius R, Bahaj SA. Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT). Electronics. 2022 Feb 8;11(3):494.
- Salim MM, Rathore S, Park JH. Distributed denial of service attacks and its defenses in IoT: a survey. The Journal of Supercomputing. 2020 Jul;76:5320-63.
- Li S, Da Xu L, Zhao S. 5G Internet of Things: A survey. Journal of Industrial Information Integration. 2018 Jun 1;10:1-9.
- Benkhelifa E, Welsh T, Hamouda W. A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE communications surveys & tutorials. 2018 Jun 7;20(4):3496-509.

Journal of Artificial Intelligence Research & Advances
| Volume | 12 |
| Issue | 01 |
| Received | 14/12/2024 |
| Accepted | 20/12/2024 |
| Published | 30/12/2024 |
