A systematic review on Deep Learning approaches for IoT security

[1]  Amir H. Gandomi,et al.  Cost-sensitive stacked auto-encoders for intrusion detection in the Internet of Things , 2021, Internet Things.

[2]  Nagaraj Balakrishnan,et al.  Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things , 2019, Internet Things.

[3]  Mohamed Amine Ferrag,et al.  DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids , 2020, IEEE Transactions on Engineering Management.

[4]  Ali Kashif Bashir,et al.  Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN , 2020, Future Gener. Comput. Syst..

[5]  Dengpan Ye,et al.  SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application , 2020, J. Netw. Comput. Appl..

[6]  Kim-Kwang Raymond Choo,et al.  Detecting Internet of Things attacks using distributed deep learning , 2020, J. Netw. Comput. Appl..

[7]  Luca Veltri,et al.  IoT Attack Detection with Deep Learning Analysis , 2020, 2020 International Joint Conference on Neural Networks (IJCNN).

[8]  Mohan Li,et al.  Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems , 2020, IEEE Internet of Things Journal.

[9]  Zhiyang Li,et al.  Deep-Reinforcement-Learning-Based QoS-Aware Secure Routing for SDN-IoT , 2020, IEEE Internet of Things Journal.

[10]  Jingwei Li,et al.  A Network Attack Detection Method Using SDA and Deep Neural Network Based on Internet of Things , 2020, Int. J. Wirel. Inf. Networks.

[11]  Yu Wang,et al.  DeePGA: A Privacy-Preserving Data Aggregation Game in Crowdsensing via Deep Reinforcement Learning , 2020, IEEE Internet of Things Journal.

[12]  Hongli Zhang,et al.  Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning , 2020, IEEE Access.

[13]  Bingcai Chen,et al.  End-to-end malware detection for android IoT devices using deep learning , 2020, Ad Hoc Networks.

[14]  S. Manimurugan,et al.  Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network , 2020, IEEE Access.

[15]  Nasir Ghani,et al.  On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild , 2020, Comput. Secur..

[16]  Zahra Pooranian,et al.  Adversarial android malware detection for mobile multimedia applications in IoT environments , 2020, Multimedia Tools and Applications.

[17]  Fadi Al-Turjman,et al.  Applications of Artificial Intelligence and Machine learning in smart cities , 2020, Comput. Commun..

[18]  Nor Badrul Anuar,et al.  The rise of traffic classification in IoT networks: A survey , 2020, J. Netw. Comput. Appl..

[19]  Yang Xin,et al.  Robust detection for network intrusion of industrial IoT based on multi-CNN fusion , 2020 .

[20]  Wooyeon Jo,et al.  APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE , 2020, Appl. Soft Comput..

[21]  Ahmad S. Almogren,et al.  Intrusion detection in Edge-of-Things computing , 2020, J. Parallel Distributed Comput..

[22]  Chao Chen,et al.  Cyber Vulnerability Intelligence for Internet of Things Binary , 2020, IEEE Transactions on Industrial Informatics.

[23]  Stratis Ioannidis,et al.  No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments , 2020, IEEE Transactions on Cognitive Communications and Networking.

[24]  Xiaojiang Du,et al.  A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.

[25]  Adam Hahn,et al.  Cyber Physical Security Analytics for Transactive Energy Systems , 2020, IEEE Transactions on Smart Grid.

[26]  Gang Zhou,et al.  IoT botnet detection via power consumption modeling , 2020 .

[27]  Xiaofei Xing,et al.  Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT , 2020, IEEE Transactions on Industrial Informatics.

[28]  Ke Zhang,et al.  Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment , 2020, IEEE Internet of Things Journal.

[29]  Po-Ching Lin,et al.  An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection , 2020, IEEE Access.

[30]  Muhammad Imran,et al.  Deep learning and big data technologies for IoT security , 2020, Comput. Commun..

[31]  Mohamed Amine Ferrag,et al.  Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study , 2020, J. Inf. Secur. Appl..

[32]  Xiaojiang Du,et al.  A deep learning based static taint analysis approach for IoT software vulnerability location , 2020 .

[33]  Refik Samet,et al.  A Comprehensive Review on Malware Detection Approaches , 2020, IEEE Access.

[34]  Riccardo Bonetto,et al.  Smart Grids for Smarter Cities , 2020, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).

[35]  Ming Liu,et al.  Deep Learning Based RF Fingerprint Identification Using Differential Constellation Trace Figure , 2020, IEEE Transactions on Vehicular Technology.

[36]  Ruchi Vishwakarma,et al.  A survey of DDoS attacking techniques and defence mechanisms in the IoT network , 2019, Telecommunication Systems.

[37]  Mauro Conti,et al.  On defending against label flipping attacks on malware detection systems , 2019, Neural Computing and Applications.

[38]  Syed Ali Hassan,et al.  Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.

[39]  Xiaojiang Du,et al.  A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.

[40]  Alessandro Armando,et al.  Automated Security Analysis of IoT Software Updates , 2019, WISTP.

[41]  Hao Wu,et al.  BiN: A Two-Level Learning-Based Bug Search for Cross-Architecture Binary , 2019, IEEE Access.

[42]  V. M. Krundyshev Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks , 2019, Automatic Control and Computer Sciences.

[43]  U. OmKumarC.,et al.  Detecting and confronting flash attacks from IoT botnets , 2019, J. Supercomput..

[44]  Lianbing Deng,et al.  IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning , 2019, Int. J. Inf. Manag..

[45]  Mathias Payer,et al.  FirmFuzz: Automated IoT Firmware Introspection and Analysis , 2019, IoT S&P@CCS.

[46]  Weixian Liao,et al.  Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly , 2019, IEEE Access.

[47]  A. A. Zaidan,et al.  Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions , 2019, Neural Computing and Applications.

[48]  Haipeng Yao,et al.  Hybrid Intrusion Detection System for Edge-Based IIoT Relying on Machine-Learning-Aided Detection , 2019, IEEE Network.

[49]  Hamad Naeem,et al.  Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence , 2019, Wirel. Pers. Commun..

[50]  Riccardo Pecori,et al.  Augmenting Quality of Experience in Distance Learning Using Fog Computing , 2019, IEEE Internet Computing.

[51]  Gloria Hyunjung Kwak,et al.  DeepHealth: Deep Learning for Health Informatics , 2019, ArXiv.

[52]  Xifeng Wang,et al.  Wireless Network Attack Defense Algorithm Using Deep Neural Network in Internet of Things Environment , 2019, Int. J. Wirel. Inf. Networks.

[53]  Muhammad Ahsan Latif,et al.  Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach , 2019, IEEE Access.

[54]  H. Vincent Poor,et al.  PC2A: Predicting Collective Contextual Anomalies via LSTM With Deep Generative Model , 2019, IEEE Internet of Things Journal.

[55]  Pietro Ducange,et al.  Incremental Learning of Fuzzy Decision Trees for Streaming Data Classification , 2019, EUSFLAT Conf..

[56]  Jong Hyuk Park,et al.  Distributed denial of service attacks and its defenses in IoT: a survey , 2019, The Journal of Supercomputing.

[57]  Qingqi Pei,et al.  Privacy-Preserving Compressive Model for Enhanced Deep-Learning-Based Service Provision System in Edge Computing , 2019, IEEE Access.

[58]  Qi Cui,et al.  A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things , 2019, IEEE Access.

[59]  Foutse Khomh,et al.  Enforcing security in Internet of Things frameworks: A Systematic Literature Review , 2019, Internet Things.

[60]  Richeng Jin,et al.  Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT , 2019, IEEE Internet of Things Journal.

[61]  Wen-Zhan Song,et al.  Enhanced Cyber-Physical Security in Internet of Things Through Energy Auditing , 2019, IEEE Internet of Things Journal.

[62]  Zhuobiao Qiao,et al.  Robust Pervasive Detection for Adversarial Samples of Artificial Intelligence in IoT Environments , 2019, IEEE Access.

[63]  Nour Moustafa,et al.  Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions , 2019, IEEE Access.

[64]  Zhenkai Liang,et al.  I Can See Your Brain: Investigating Home-Use Electroencephalography System Security , 2019, IEEE Internet of Things Journal.

[65]  Daniel S. Berman,et al.  A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..

[66]  Ying Zhang,et al.  Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network , 2019, IEEE Access.

[67]  Zhu Han,et al.  Capsule Network Assisted IoT Traffic Classification Mechanism for Smart Cities , 2019, IEEE Internet of Things Journal.

[68]  Xiang-Yang Li,et al.  System Statistics Learning-Based IoT Security: Feasibility and Suitability , 2019, IEEE Internet of Things Journal.

[69]  Arvid Lundervold,et al.  An overview of deep learning in medical imaging focusing on MRI , 2018, Zeitschrift fur medizinische Physik.

[70]  Elena Sitnikova,et al.  Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..

[71]  Debayan Das,et al.  RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.

[72]  Walid Saad,et al.  Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems , 2018, IEEE Transactions on Communications.

[73]  Hong Wen,et al.  Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication , 2019, IEEE Access.

[74]  Haibo Liu,et al.  A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning , 2019, IEEE Access.

[75]  Ali Dehghantanha,et al.  Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.

[76]  Luca Veltri,et al.  MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities , 2018 .

[77]  Ahmed Dawoud,et al.  Deep learning and software-defined networks: Towards secure IoT architecture , 2018, Internet Things.

[78]  Dongming Wang,et al.  Secure mobile crowdsensing based on deep learning , 2018, China Communications.

[79]  John Yearwood,et al.  A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network , 2018, J. Parallel Distributed Comput..

[80]  Luca Veltri,et al.  A Token-based Protocol for Securing MQTT Communications , 2018, 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[81]  Naveen K. Chilamkurti,et al.  Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications , 2018, IEEE Communications Magazine.

[82]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[83]  Michal Choras,et al.  A scalable distributed machine learning approach for attack detection in edge computing environments , 2018, J. Parallel Distributed Comput..

[84]  Ying Wah Teh,et al.  Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: State of the art and research challenges , 2018, Expert Syst. Appl..

[85]  Sukumar Mishra,et al.  Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks , 2018, Journal of Medical Systems.

[86]  Nour Moustafa,et al.  Identification of malicious activities in industrial internet of things based on deep learning models , 2018, J. Inf. Secur. Appl..

[87]  Ali Dehghantanha,et al.  A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..

[88]  Victor I. Chang,et al.  A Proposed Solution and Future Direction for Blockchain-Based Heterogeneous Medicare Data in Cloud Environment , 2018, Journal of Medical Systems.

[89]  Laurence T. Yang,et al.  A survey on deep learning for big data , 2018, Inf. Fusion.

[90]  Jong Hyuk Park,et al.  OpCloudSec: Open cloud software defined wireless network security for the Internet of Things , 2018, Comput. Commun..

[91]  Archan Misra,et al.  Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks , 2018, Computer.

[92]  Hamed Haddadi,et al.  Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning , 2018, Computer.

[93]  Wei Yu,et al.  A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends , 2018, IEEE Access.

[94]  Abdelouahid Derhab,et al.  MalDozer: Automatic framework for android malware detection using deep learning , 2018, Digit. Investig..

[95]  Kwangjo Kim,et al.  Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[96]  Naveen K. Chilamkurti,et al.  Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.

[97]  Mohsen Guizani,et al.  Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[98]  Bishal Thapa,et al.  Machine Learning Approach to RF Transmitter Identification , 2017, IEEE Journal of Radio Frequency Identification.

[99]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[100]  Pietro Ducange,et al.  A glimpse on big data analytics in the framework of marketing strategies , 2017, Soft Computing.

[101]  Seon Ho Oh,et al.  Compact deep learned feature-based face recognition for Visual Internet of Things , 2017, The Journal of Supercomputing.

[102]  Athanasios V. Vasilakos,et al.  The role of big data analytics in Internet of Things , 2017, Comput. Networks.

[103]  Liang Xiao,et al.  Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.

[104]  Massimo Vecchio,et al.  The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices , 2017, IoTBDS.

[105]  Margaret Lech,et al.  Evaluating deep learning architectures for Speech Emotion Recognition , 2017, Neural Networks.

[106]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[107]  Alagan Anpalagan,et al.  Resource allocation and congestion control in clustered M2M communication using Q‐learning , 2017, Trans. Emerg. Telecommun. Technol..

[108]  H. Vincent Poor,et al.  Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[109]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[110]  Daniel Jeswin Nallathambi,et al.  Use of honeypots for mitigating DoS attacks targeted on IoT networks , 2017, 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP).

[111]  Wojciech Zaremba,et al.  Improved Techniques for Training GANs , 2016, NIPS.

[112]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[113]  Siobhán Clarke,et al.  Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.

[114]  Michael I. Jordan,et al.  Machine learning: Trends, perspectives, and prospects , 2015, Science.

[115]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[116]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[117]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[118]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.

[119]  Alessio Merlo,et al.  Measuring and estimating power consumption in Android to support energy-based intrusion detection , 2015, J. Comput. Secur..

[120]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[121]  Dong Yu,et al.  Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..

[122]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[123]  Xue-wen Chen,et al.  Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.

[124]  Alessio Merlo,et al.  Improving energy efficiency in distributed intrusion detection systems , 2013, J. High Speed Networks.

[125]  David D. Cox,et al.  Making a Science of Model Search: Hyperparameter Optimization in Hundreds of Dimensions for Vision Architectures , 2013, ICML.

[126]  Razvan Pascanu,et al.  On the difficulty of training recurrent neural networks , 2012, ICML.

[127]  Riccardo Pecori,et al.  A PKI-free key agreement protocol for P2P VoIP applications , 2012, 2012 IEEE International Conference on Communications (ICC).

[128]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[129]  Geoffrey E. Hinton A Practical Guide to Training Restricted Boltzmann Machines , 2012, Neural Networks: Tricks of the Trade.

[130]  Yu Yang,et al.  Study and application on the architecture and key technologies for IOT , 2011, 2011 International Conference on Multimedia Technology.

[131]  Luca Veltri,et al.  A key agreement protocol for P2P VoIP applications , 2009, SoftCOM 2009 - 17th International Conference on Software, Telecommunications & Computer Networks.

[132]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[133]  Subhash C. Bagui,et al.  Combining Pattern Classifiers: Methods and Algorithms , 2005, Technometrics.

[134]  Barbara Kitchenham,et al.  Procedures for Performing Systematic Reviews , 2004 .

[135]  Robert Tibshirani,et al.  The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.

[136]  M. W Gardner,et al.  Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences , 1998 .