A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
Abstract The Internet of Things (IoT) has been rapidly evolving towards making a greater
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …

Survey of intrusion detection systems: techniques, datasets and challenges

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman - Cybersecurity, 2019 - Springer
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …

Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

Unsupervised machine learning for networking: Techniques, applications and research challenges

M Usama, J Qadir, A Raza, H Arif, KLA Yau… - IEEE …, 2019 - ieeexplore.ieee.org
While machine learning and artificial intelligence have long been applied in networking
research, the bulk of such works has focused on supervised learning. Recently, there has …

Deep abstraction and weighted feature selection for Wi-Fi impersonation detection

ME Aminanto, R Choi, HC Tanuwidjaja… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
The recent advances in mobile technologies have resulted in Internet of Things (IoT)-
enabled devices becoming more pervasive and integrated into our daily lives. The security …

A review on cyber security datasets for machine learning algorithms

O Yavanoglu, M Aydos - … conference on big data (big data), 2017 - ieeexplore.ieee.org
It is an undeniable fact that currently information is a pretty significant presence for all
companies or organizations. Therefore protecting its security is crucial and the security …

Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree

Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …

Anomaly-based intrusion detection in industrial data with SVM and random forests

SDD Anton, S Sinha… - … International conference on …, 2019 - ieeexplore.ieee.org
Attacks on industrial enterprises are increasing in number as well as in effect. Since the
introduction of industrial control systems in the 1970's, industrial networks have been the …

A taxonomy of security issues in Industrial Internet-of-Things: Scoping review for existing solutions, future implications, and research challenges

P Jayalaxmi, R Saha, G Kumar, N Kumar… - IEEE Access, 2021 - ieeexplore.ieee.org
Industrial Internet of Things (IIoTs) are the extensions of the Internet of Things (IoTs) and
have paved the way towards the industry revolution 4.0. IIoT accelerates the industry …

N-pad: Neighboring pixel-based industrial anomaly detection

JK Jang, E Hwang, SH Park - Proceedings of the IEEE/CVF …, 2023 - openaccess.thecvf.com
Identifying defects in the images of industrial products has been an important task to
enhance quality control and reduce maintenance costs. In recent studies, industrial anomaly …