Ali H. Wheeb,
Munsifa Firdaus Khan,
- Associate Professor, Department of Computer Engineering, College of Engineering, University of Baghdad, Baghdad, Iraq
- Assistant Professor, Department of Computer Science and Engineering, Assam Downtown University, Guwahati, Assam, India
Abstract
The Internet of Things (IoT) refers to the integration of physical objects with the Internet, allowing for connectivity and monitoring. This idea has garnered immense attention from researchers and users alike, driven by the widespread accessibility of the Internet. It spans a wide range of devices, including smart versions of conventional appliances, innovative tools tailored for Internet-enabled ecosystems, and sensors that leverage connectivity to revolutionize industries such as manufacturing, healthcare, transportation, and everyday living environments. Nevertheless, IoT does have a drawback, though, and that is the absence of strong and reliable security mechanisms. The usage of IoT has a number of potential dangers. These involve the possibility of illegal data accessibility, and other cyberattacks such as ransomware, botnets, denial of service (DoS), and espionage. The main focus outlined below is the application of machine learning (ML) algorithms for detecting network intrusions. When developing intrusion detection systems to identify network abnormalities, ML is a key component. ML algorithms are quite effective in identifying various forms of cyberattacks. The overview of several ML algorithms for detecting intrusions into IoT systems is presented in this research work. Algorithms such as support vector machines, random forests, and neural networks are essential for identifying anomalies in networks. To create intrusion detection systems, many datasets are available, such as CICIDS-2017, KDD-99, UNSW-NB 15, and TON_IoT. These datasets provide information on various kinds of cyberattacks. Further, challenges and security solutions for IoT Networks are discussed.
Keywords: Internet of things (IoT), machine learning (ML) algorithms, security solution, IDS, attack detection
[This article belongs to Journal of Artificial Intelligence Research & Advances ]
Ali H. Wheeb, Munsifa Firdaus Khan. A Survey of Several Machine Learning (ML) Algorithms for Security Solution in Internet of Things (IoT) Networks. Journal of Artificial Intelligence Research & Advances. 2024; 12(01):1-11.
Ali H. Wheeb, Munsifa Firdaus Khan. A Survey of Several Machine Learning (ML) Algorithms for Security Solution in Internet of Things (IoT) Networks. Journal of Artificial Intelligence Research & Advances. 2024; 12(01):1-11. Available from: https://journals.stmjournals.com/joaira/article=2024/view=191585
References
- Hossain MS, Muhammad G. Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring. Comput Netw. 2016 Jun 4; 101: 192–202.
- Farooq MS, Sohail OO, Abid A, Rasheed S. A survey on the role of iot in agriculture for the implementation of smart livestock environment. IEEE Access. 2022 Jan 13; 10: 9483–505.
- Rejeb A, Rejeb K, Treiblmaier H, Appolloni A, Alghamdi S, Alhasawi Y, Iranmanesh M. The Internet of Things (IoT) in healthcare: Taking stock and moving forward. Internet Things. 2023 Jul 1; 22: 100721.
- Wu Y, Dai HN, Wang H, Xiong Z, Guo S. A survey of intelligent network slicing management for industrial IoT: Integrated approaches for smart transportation, smart energy, and smart factory. IEEE Commun Surv Tutor. 2022 Mar 10; 24(2): 1175–211.
- Burhan M, Rehman RA, Khan B, Kim BS. IoT elements, layered architectures and security issues: A comprehensive survey. Sensors. 2018 Aug 24; 18(9): 2796.
- Cekerevac Z, Dvorak Z, Prigoda L, Cekerevac P. Internet of things and the man-in-the-middle attacks–security and economic risks. MEST J. 2017 Jul; 5(2): 15–25.
- Ali MH, Jaber MM, Abd SK, Rehman A, Awan MJ, Damaševičius R, Bahaj SA. Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT). Electronics. 2022 Feb 8; 11(3): 494.
- Salim MM, Rathore S, Park JH. Distributed denial of service attacks and its defenses in IoT: a survey. J Supercomput. 2020 Jul; 76: 5320–63.
- Li S, Da Xu L, Zhao S. 5G Internet of Things: A survey. J Ind Inf Integration. 2018 Jun 1; 10: 1–9.
- Lansky J, Ali S, Mohammadi M, Majeed MK, Karim SH, Rashidi S, Hosseinzadeh M, Rahmani AM. Deep learning-based intrusion detection systems: a systematic review. IEEE Access. 2021 Jul 14; 9: 101574–99.
- Benkhelifa E, Welsh T, Hamouda W. A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE Commun Surv Tutor. 2018 Jun 7; 20(4): 3496–509.
- Maghrabi LA. Automated Network Intrusion Detection for Internet of Things Security Enhancements. IEEE Access. 2024 Feb 23; 12: 30839–30851.
- Soundariya RS, et al. Effective Feature Selection for Hybrid Wireless IoT Network Intrusion Detection Systems Using Machine Learning Techniques. Ad hoc Sens Wirel Netw. 2021 May 1; 49: 175–206.
- Zhao R, Gui G, Xue Z, Yin J, Ohtsuki T, Adebisi B, Gacanin H. A novel intrusion detection method based on lightweight neural network for internet of things. IEEE Internet Things J. 2021 Oct 11; 9(12): 9960–72.
- Bagaa M, Taleb T, Bernabe JB, Skarmeta A. A machine learning security framework for iot systems. IEEE Access. 2020 May 21; 8: 114066–77.
- Ghasemi H, Babaie S. A new intrusion detection system based on SVM–GWO algorithms for Internet of Things. Wireless Netw. 2024 Feb 1; 30: 2173–2185.
- Vijayakumar KP, Pradeep K, Balasundaram A, Prusty MR. Enhanced cyber attack detection process for internet of health things (IoHT) devices using deep neural network. Processes. 2023 Apr 3; 11(4): 1072.
- Ferrag MA, Maglaras L, Ahmim A, Derdour M, Janicke H. Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks. Future Internet. 2020 Mar 2; 12(3): 44.
- Zeeshan M, Riaz Q, Bilal MA, Shahzad MK, Jabeen H, Haider SA, Rahim A. Protocol-based deep intrusion detection for dos and ddos attacks using unsw-nb15 and bot-iot data-sets. IEEE Access. 2021 Dec 21; 10: 2269–83.
- Pramilarani K, Kumari PV. Cost based Random Forest Classifier for Intrusion Detection System in Internet of Things. Appl Soft Comput. 2024 Jan 1; 151: 111125.
- Almiani M, AbuGhazleh A, Al-Rahayfeh A, Atiewi S, Razaque A. Deep recurrent neural network for IoT intrusion detection system. Simul Model Pract Theory. 2020 May 1; 101: 102031.
- Akhther P, Maryposonia A, Prasanth VS. Least Square Support Vector Machine based Intrusion Detection System in IoT. In 2023 IEEE 7th International Conference on Intelligent Computing and Control Systems (ICICCS). 2023 May 17; 1545–1550.
- Mohy-Eddine M, Guezzaz A, Benkirane S, Azrour M. An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimed Tools Appl. 2023; 82(15): 23615–23633.
- Hnamte V, Balram G. Implementation of Naive Bayes Classifier for Reducing DDoS Attacks in IoT Networks. J Algebraic Statistics. 2022 Jun 4; 13(2): 2749–57.
- Martins I, Resende JS, Sousa PR, Silva S, Antunes L, Gama J. Host-based IDS: A review and open issues of an anomaly detection system in IoT. Future Gener Comput Syst. 2022 Aug 1; 133: 95–113.
- Lo WW, Layeghy S, Sarhan M, Gallagher M, Portmann M. E-graphsage: A graph neural network based intrusion detection system for IOT. In NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium. 2022 Apr 25; 1–9.
- Azrour M, Mabrouki J, Guezzaz A, Kanwal A. Internet of things security: challenges and key issues. Secur Commun Netw. 2021; 2021(1): 5533843.
- Gupta BB, Quamara M. An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurr Comput: Pract Exp. 2020 Nov 10; 32(21): e4946.

Journal of Artificial Intelligence Research & Advances
| Volume | 12 |
| Issue | 01 |
| Received | 14/12/2024 |
| Accepted | 20/12/2024 |
| Published | 30/12/2024 |
Login
PlumX Metrics