Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects

U Inayat, MF Zia, S Mahmood, HM Khalid… - Electronics, 2022 - mdpi.com
Internet of Things (IoT) is a developing technology that provides the simplicity and benefits of
exchanging data with other devices using the cloud or wireless networks. However, the …

A survey of machine and deep learning methods for internet of things (IoT) security

MA Al-Garadi, A Mohamed, AK Al-Ali… - … surveys & tutorials, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) integrates billions of smart devices that can communicate with
one another with minimal human intervention. IoT is one of the fastest developing fields in …

Machine learning for resource management in cellular and IoT networks: Potentials, current solutions, and open challenges

F Hussain, SA Hassan, R Hussain… - … surveys & tutorials, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) refers to a massively heterogeneous network formed through smart
devices connected to the Internet. In the wake of disruptive IoT with a huge amount and …

Performance analysis of machine learning algorithms in intrusion detection system: A review

T Saranya, S Sridevi, C Deisy, TD Chung… - Procedia Computer …, 2020 - Elsevier
The rapid growth of technologies not only formulates life easier but also exposes a lot of
security issues. With the advancement of the Internet over years, the number of attacks over …

Role of machine learning and deep learning in securing 5G-driven industrial IoT applications

P Sharma, S Jain, S Gupta, V Chamola - Ad Hoc Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) connects millions of computing devices and has set a
stage for future technology where industrial use cases like smart cities and smart houses will …

Machine learning in network anomaly detection: A survey

S Wang, JF Balarezo, S Kandeepan… - IEEE …, 2021 - ieeexplore.ieee.org
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …

Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation

BA Tama, S Lim - Computer Science Review, 2021 - Elsevier
Intrusion detection systems (IDSs) are intrinsically linked to a comprehensive solution of
cyberattacks prevention instruments. To achieve a higher detection rate, the ability to design …

A regularized cross-layer ladder network for intrusion detection in industrial internet of things

J Long, W Liang, KC Li, Y Wei… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
As part of Big Data trends, the ubiquitous use of the Internet of Things (IoT) in the industrial
environment has generated a significant amount of network traffic. In this type of IoT …

Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm

S Subbiah, KSM Anbananthen… - Journal of …, 2022 - ieeexplore.ieee.org
Attacks in wireless sensor networks (WSNs) aim to prevent or eradicate the network's ability
to perform its anticipated functions. Intrusion detection is a defense used in wireless sensor …

Intrusion detection systems for intra-vehicle networks: A review

OY Al-Jarrah, C Maple, M Dianati, D Oxtoby… - Ieee …, 2019 - ieeexplore.ieee.org
A modern vehicle is a complex system of sensors, electronic control units, and actuators
connected through different types of intra-vehicle networks to control and monitor the state of …