Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

Deep reinforcement learning for anomaly detection: A systematic review

K Arshad, RF Ali, A Muneer, IA Aziz, S Naseer… - IEEE …, 2022 - ieeexplore.ieee.org
Anomaly detection has been used to detect and analyze anomalous elements from data for
years. Various techniques have been developed to detect anomalies. However, the most …

Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework

M Al Razib, D Javeed, MT Khan, R Alkanhel… - IEEE …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is an instantly exacerbated communication technology that is
manifesting miraculous effectuation to revolutionize conventional means of network …

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

S Cherbal, A Zier, S Hebal, L Louail… - The Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …

A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models

OBJ Rabie, S Selvarajan, T Hasanin, AM Alshareef… - Scientific Reports, 2024 - nature.com
Abstract The Internet of Things (IoT) is extensively used in modern-day life, such as in smart
homes, intelligent transportation, etc. However, the present security measures cannot fully …

Crsf: An intrusion detection framework for industrial internet of things based on pretrained cnn2d-rnn and svm

S Li, G Chai, Y Wang, G Zhou, Z Li, D Yu, R Gao - IEEE Access, 2023 - ieeexplore.ieee.org
The traditional support vector machine (SVM) requires manual feature extraction to improve
classification performance and relies on the expressive power of manually extracted …

[HTML][HTML] Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection …

MA Shyaa, NF Ibrahim, Z Zainol, R Abdullah… - … Applications of Artificial …, 2024 - Elsevier
Abstract Intrusion Detection Systems (IDS) have become pivotal in safeguarding information
systems against evolving threats. Concurrently, Concept Drift presents a significant …

A distributed SDN-based intrusion detection system for IoT using optimized forests

K Luo - Plos one, 2023 - journals.plos.org
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion
detection in this network also increases, and the need for new and architecture-specific …

[HTML][HTML] Security analysis of cyber physical system using digital forensic incident response

P Binnar, S Bhirud, F Kazi - Cyber Security and Applications, 2024 - Elsevier
There is a great demand for an efficient security tool which can secure IIoT systems from
potential adversarial attacks. However, it is challenging to design a suitable security model …

A blockchain-based intrusion detection system using viterbi algorithm and indirect trust for iiot systems

G Rathee, CA Kerrache, MA Ferrag - Journal of Sensor and Actuator …, 2022 - mdpi.com
The industrial internet of things (IIoT) is considered a new paradigm in the era of wireless
communication for performing automatic communication in the network. However, automatic …