A Survey on Recent Approaches in Intrusion Detection System in IoTs

Internet of Things (IoTs) are Internet-connected devices that integrate physical objects and internet in diverse areas of life like industries, home automation, hospitals and environment monitoring. Although IoTs ease daily activities benefiting human operations, they bring serious security challenges worth concerning. IoTs have become potentially vulnerable targets for cybercriminals, so companies are investing billions of dollars to find an appropriate mechanism to detect these kinds of malicious activities in IoT networks. Nowadays intelligent techniques using Machine Learning (ML) and Artificial Intelligence (AI) are being adopted to prevent or detect novel attacks with best accuracy. This survey classifies and categorizes the recent Intrusion Detection approaches for IoT networks, with more focus on hybrid and intelligent techniques. Moreover, it provides a comprehensive review on IoT layers, communication protocols and their security issues which confirm that IDS is required in both layered and protocol approaches. Finally, this survey discusses the limitations and advantages of each approach to identify future directions of potential IDS implementation.

[1]  Galen C. Hunt,et al.  The Seven Properties of Highly Secure Devices , 2017 .

[2]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[3]  Chris Maurer,et al.  Teaching Case: Security Breach at Target , 2018, J. Inf. Syst. Educ..

[4]  Hon Sun Chiu,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[5]  Utz Roedig,et al.  Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.

[6]  Deokho Kim,et al.  A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things , 2014, Sensors.

[7]  Salim Hariri,et al.  IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[8]  David E. Culler,et al.  Ownership is theft: experiences building an embedded OS in rust , 2015, PLOS@SOSP.

[9]  Mohammed Anbar,et al.  Internet of Things (IoT) communication protocols: Review , 2017, 2017 8th International Conference on Information Technology (ICIT).

[10]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[11]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[12]  Hong Linh Truong,et al.  MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[13]  Tsung-Han Lee,et al.  A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN , 2013, EMC/HumanCom.

[14]  Srinivasan Seshan,et al.  Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.

[15]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[16]  Mumbai,et al.  Internet of Things (IoT): A Literature Review , 2015 .

[17]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[18]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[19]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[20]  Dennis Sylvester,et al.  A2: Analog Malicious Hardware , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[21]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[22]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[23]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[24]  Amit P. Sheth,et al.  Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.

[25]  Earlence Fernandes,et al.  Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[26]  Charalampos Doukas,et al.  Building Internet of Things with the Arduino , 2012 .

[27]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[28]  Bin Sun,et al.  Trust management mechanism for Internet of Things , 2014 .

[29]  Utz Roedig,et al.  Demo abstract: Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[30]  P. Victer Paul,et al.  The Internet of Things — A comprehensive survey , 2017, 2017 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC).

[31]  Abdullatif Shikfa,et al.  Cybersecurity Issues in Implanted Medical Devices , 2018, 2018 International Conference on Computer and Applications (ICCA).

[32]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[33]  Virtual Bridged,et al.  IEEE Standards for Local and Metropolitan Area Networks: Specification for 802.3 Full Duplex Operation , 1997, IEEE Std 802.3x-1997 and IEEE Std 802.3y-1997 (Supplement to ISO/IEC 8802-3: 1996/ANSI/IEEE Std 802.3, 1996 Edition).

[34]  Takehisa Yairi,et al.  Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction , 2014, MLSDA'14.

[35]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[36]  Asmaa Shaker Ashoor Importance of Intrusion Detection System ( IDS ) , 2010 .

[37]  Geethapriya Thamilarasu,et al.  Security as a service: real-time intrusion detection in internet of things , 2018 .

[38]  Mahadev Satyanarayanan,et al.  Privacy Mediators: Helping IoT Cross the Chasm , 2016, HotMobile.

[39]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[40]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[41]  Georgios Kambourakis,et al.  Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.

[42]  Parvez Faruki,et al.  Network Intrusion Detection for IoT Security Based on Learning Techniques , 2019, IEEE Communications Surveys & Tutorials.

[43]  Choong Seon Hong,et al.  Attack Model and Detection Scheme for Botnet on 6LoWPAN , 2009, APNOMS.

[44]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[45]  Nei Kato,et al.  State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.

[46]  اسماء شاكر عاشور الزبيدي Importance of Intrusion Detection System (IDS) , 2015 .

[47]  Antonio Iera,et al.  A systemic and cognitive approach for IoT security , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[48]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[49]  Yu Chen,et al.  Ultra-lightweight deep packet anomaly detection for Internet of Things devices , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).

[50]  Jonathan Loo,et al.  A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..

[51]  Jong Hyuk Park,et al.  Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..

[52]  Gu Li-ze,et al.  Trust management mechanism for Internet of Things , 2014, China Communications.