Anomaly Based Intrusion Detection System
Anomaly Based Intrusion Detection System
Anomaly Based Intrusion Detection System
Abstract: The Internet of Things (IoT) concept has emerged to improve people’s lives by providing
a wide range of smart and connected devices and applications in several domains, such as green
IoT-based agriculture, smart farming, smart homes, smart transportation, smart health, smart grid,
smart cities, and smart environment. However, IoT devices are at risk of cyber attacks. The use of
deep learning techniques has been adequately adopted by researchers as a solution in securing the
IoT environment. Deep learning has also successfully been implemented in various fields, proving
Citation: Alsoufi, M.A.; Razak, S.; its superiority in tackling intrusion detection attacks. Due to the limitation of signature-based de-
Siraj, M.M.; Nafea, I.; Ghaleb, F.A.; tection for unknown attacks, the anomaly-based Intrusion Detection System (IDS) gains advantages
Saeed, F.; Nasser, M. to detect zero-day attacks. In this paper, a systematic literature review (SLR) is presented to analyze
Anomaly-Based Intrusion Detection the existing published literature regarding anomaly-based intrusion detection, using deep learning
Systems in IoT Using Deep techniques in securing IoT environments. Data from the published studies were retrieved from five
Learning: A Systematic Literature
databases (IEEE Xplore, Scopus, Web of Science, Science Direct, and MDPI). Out of 2116 identified
Review. Appl. Sci. 2021, 11, 8383.
records, 26 relevant studies were selected to answer the research questions. This review has ex-
https://doi.org/10.3390/app11188383
plored seven deep learning techniques practiced in IoT security, and the results showed their effec-
tiveness in dealing with security challenges in the IoT ecosystem. It is also found that supervised
Academic Editors:
Dimitrios S. Paraforos
deep learning techniques offer better performance, compared to unsupervised and semi-supervised
and Anselme Muzirafuti learning. This analysis provides an insight into how the use of data types and learning methods will
affect the performance of deep learning techniques for further contribution to enhancing a novel
Received: 13 August 2021 model for anomaly intrusion detection and prediction.
Accepted: 7 September 2021
Published: 9 September 2021 Keywords: systematic literature review; anomaly intrusion detection; deep learning; IoT; resource
constraint; IDS
Publisher’s Note: MDPI stays neu-
tral with regard to jurisdictional
claims in published maps and institu-
tional affiliations.
1. Introduction
Internet of Things (IoT) is the research and industrial trend in the arena of Infor-
mation Communications Technology (ICT) that has become accustomed to being part of
Copyright: © 2021 by the authors. Li-
technology advancement in our everyday life [1]. The IoT term refers to a new communi-
censee MDPI, Basel, Switzerland. cation paradigm in which devices have sensors and actuators that can serve as objects or
This article is an open access article ‘things’ to sense their surrounding environment, communicate with one another, and ex-
distributed under the terms and con- change data through the internet [2]. The IoT requires a platform in which all the applica-
ditions of the Creative Commons At- tions, products, and services are associated with, used to capture, communicate, store,
tribution (CC BY) license (http://crea- access, and share/transmit data from the real world [3,4]. Nowadays, there are around 50
tivecommons.org/licenses/by/4.0/). billion IoT devices connected to the internet, and it is expected to grow to an enormous
size over the next few years [5,6]. These huge numbers of devices produce a tremendous
amount of data that can be used by many applications. IoT applications scenarios are
ubiquitous, and this includes, food, agriculture, smart farming, demotics, assisted living,
e-health, and enhanced learning, to mention a few examples of possible IoT applications.
For instance, there will be 15.3 billion IoT devices for smart agriculture by the end of 2025
[7,8]. A huge number of sensors and actuators are needed for real-time monitoring and
environment of many industrial domains to provide actionable insights and make timely
decisions [9]. However, many challenges hinder the full adoption of the IoT in both re-
search and industry. These challenges include, but are not limited to, security and trust,
reliability, scalability, and mobility, among many others [10].
Because IoT devices are connected to the global internet with unmatured and vulner-
able communication protocols and applications, it is exposed to many potential security
threats [3,4]. Adversaries may exploit these vulnerabilities and inject anomalies that trig-
ger the system to make wrong control decisions in IoT-based application, causing a cata-
strophic impact on people’s live, properties, and economics [7,11]. The evolved threats of
cyberattacks pose significant challenges to the IoT ecosystems. Moreover, IoT devices use
different platforms and a combination of network connections protocols such as Ethernet,
Wi-Fi, ZigBee, and wire-based technologies to increase their connectivity, which needs
coordination between different standards and protocols to mitigate security risks. Besides
the diverse technologies used by the IoT industry, the heterogeneity, and the distributed
nature of IoT applications increase the complexity of IoT networks and thus, magnify the
security risk. These shortcomings cause the IoT network to be exposed to many security
issues and cyberattacks. Therefore, an accurate anomaly-detection IDS model is vital for
IoT applications [12].
Many IDS solutions have been proposed to protect IoT devices from being exposed
to cyber criminals [13–15]. These security solutions can be divided into either proactive or
reactive measures. The proactive measures can be effective for protecting the IoT against
external threats. However, due to the connectivity of the IoT to the global internet, the risk
posed by intruders that can circumvent proactive measures is high. Intrusion Detection
Systems (IDSs) work as a second line of defense that can impede many cyberattacks. IDS
solutions have received intensive attention from researchers and industries in the IoT
field, and many IDS solutions have been proposed [16–18]. Based on the detection ap-
proach, IDS solutions can be categorized into three approaches: signature, anomaly, and
hybrid IDS model. In general, the signature-based approach is effective for known attacks,
while the anomaly-based is effective for unknown attacks. However, due to the heteroge-
neity, dynamicity, and complex nature of the IoT network, the signature-based approach
is inefficient and ineffective for IoT because it requires continuous human interventions
and knowledge expertise to extract attack patterns and signatures to update the IDS
model [19,20]. Anomaly-based IDS detection gains advantages in IoT because it detects
zero-day attacks and needs fewer human interventions [20]. The hybrid approach com-
bines both signatures-based and anomaly-based approaches. However, because it is im-
practical to rely on pre-defined attack patterns (signature-based) intrusion detection in
IoT, the utilization of the signature-based IDS is limited in IoT networks [18–20]. To this
end, anomaly intrusion detection systems play a vital role in intrusion detection in IoT
environments.
Most of the existing IDS use conventional machine learning techniques to develop
detection models [21]. Machine learning techniques were widely adopted to construct the
IDS model. However, due to the speed and volume of the IoT-generated data, conven-
tional machine learning techniques that need well-crafted features engineering need in-
tensive research efforts to extract the representative features from big and unstructured
data generated by IoT devices. Thus, conventional machine learning–based solutions still
encounter many challenges. Recently, deep learning techniques (DL) have been widely
adopted for intrusion detection systems. DL expedites the analysis between fast and real
data streams in extracting relevant information to predict the future of the IoT domain.
Appl. Sci. 2021, 11, 8383 3 of 26
DL is known to be more reliable than traditional learning because it can easily extract
information, and hence, provides better accuracy [22]. Due to this, several studies have
been focused on using deep learning techniques to provide new solutions tackling two
different perspectives of both technical and regulatory, such as anomaly and malware de-
tection; however, the results are still unconvincing. Furthermore, most IDS solutions have
been adopted from existing computer networks, wireless sensors networks, and mobile
ad hoc networks. Yet, the unique characteristics of IoT-based networks, such as connec-
tivity to the global internet and lightweight resources, make the IDS proposed for these
networks not suitable to IoT applications [13,14]. There are only a few surveys that have
been found that focus specifically on DL techniques in the IoT domain [23]. To the best of
the authors’ knowledge, there is no review that is dedicated to investigating the effective-
ness of the deep learning-based IDS solutions in the IoT security domain. Therefore, this
paper was conducted to bridge this gap and investigate the most effective and efficient
use of DL approaches in securing the IoT environment. This review provides an in-depth,
focused, and high-quality analysis to orient future research toward finding robust anom-
aly-based IDS using DL techniques.
The paper is organized as follows. The contributions introduced by this study are
briefed in Section 2. Related work is presented in Section 3. The review method, which
includes the review protocol, planning, research questions, is described in Section 4. Sec-
tion 5 presents the search strategies, which include the primary records selection, second-
ary records selection, inclusion criteria, exclusion criteria, quality assessment (QA), data
extraction, and synthesis. Section 6 presents the results, studies selection and quality as-
sessment results, and overview of publication sources. Section 7 presents the outcomes,
which include the answers to the research questions, taxonomy, analysis and discussion,
and the open issues. Section 8 presents the discussion. Section 9 presents the future direc-
tion. Limitations of the study are illustrated in Section 10, and the study is concluded in
Section 11.
2. Contributions
1. This study systemically explores the existing techniques on an anomaly-based intru-
sion detection system that uses the DL techniques in IoT.
2. A general taxonomy is proposed for the different deep learning techniques used for
constructing the anomaly-based IDS in IoT.
3. An analysis of the state-of-art DL-based techniques of anomaly-based intrusion de-
tection systems in IoT, which use DL, is introduced in this survey.
4. This study discusses the challenges and future direction of DL-based anomaly detec-
tion in the IoT domain.
trusion detection system in IoT, which used DL techniques. The finding of our work in-
spired us to propose this work, which is an in-depth systematic literature review follow-
ing the guideline based on proposed work by Kitchenham to provide researchers and de-
velopers in-depth information and obtain details about an up-to-date technique and meth-
odology in anomaly intrusion detection in IoT, using deep learning [25].
Table 1 shows a detailed comparison with the similar reviewed articles in the area.
Consequently, there is an urgent need to conduct a systemic review and appraise the spe-
cific studies in the field of IDS in IoT that used DL techniques. Thus, this systemic review
provides an in-depth and focused analysis on orienting future research toward finding
robust anomaly-based IDS using DL techniques.
Table 1. Comparison with other similar review articles in the area: (✓: Yes, x: No).
4. Review Method
4.1. Development of the Protocol
This review follows the guidelines of performing systematic reviews in the software
engineering domain, according to [25,26] as well as other methods from several works
[19,27,28].
to ensure that there is no bias and to distinguish SLR from any other traditional methods
of the literature review 23. This review protocol defines the review background, search
strategy, development of RQs, extraction of data, criteria for study selection, and data
syntheses. The research questions and background were discussed in previous sections.
The next sections provide insights on different components. All stages of conducting this
systemic review are described in Figure 1.
5. Search Strategy
This SLR used automatic search to explore and retrieve the related scholarly publica-
tions from online databases (IEEE Explorer, Web of Science, Scopus, Science Direct, and
MDPI), using specific keywords that were constructed in response to the research ques-
tions. “Anomaly intrusion detection” AND “Internet of things”, “Anomaly intrusion de-
tection” AND “Deep learning”, “Anomaly intrusion detection system” AND “Internet of
things”, “Anomaly intrusion detection system” AND “Deep learning”, “Anomaly-based”
AND “Internet of things”, “Anomaly-based” AND “Deep learning”. The time frame was
from any time up to 2020, while no filters were applied for countries, type of publications,
or language during the retrieval of primary records from the online databases. The re-
trieval of primary records from the pre-specified online databases involved two inde-
pendent investigators. If discrepancies occurred, a third investigator was consulted. For
manual search, reference lists of published reviews and surveys were looked through,
while the Google Scholar search engine was used to distinguish all studies that were cited
Appl. Sci. 2021, 11, 8383 6 of 26
by the chosen primary studies. The manual search was managed to ensure a comprehen-
sive search of the pertinent studies. Any overlapping and redundancies in these publica-
tions were removed permanently.
6. Results
6.1. Studies Selection and Quality Assessment
A total of 2116 records were extracted from the online database (n = 2106) and extra
sources (n = 10); after the removal of duplicates (n = 765), 1351 records were subject to
primary selection, out of which 714 records were excluded (books, lectures note, confer-
ences and miscellaneous). Accordingly, 637 records were identified as journal articles, out
of which 97 records were excluded (reviews, surveys, and reports). Finally, 540 records
were subjected to inclusion and exclusion criteria, out of which 43 studies were eligible.
However, only 26 studies met the criteria of quality assessment. The 26 studies that fulfill
the assessment criteria were selected to extract the data and synthesis of the systemic lit-
erature review. Table 2 shows the number of retrieved records from online databases ac-
cording to the pre-specified keywords. Figure 2 shows the fellow chart of selection stud-
ies.
Table 2. Number of retrieved records from online databases according to the pre-specified keywords.
IEEE explore “Anomaly intrusion detection system” AND “Internet of things” 96 1263
“Anomaly intrusion detection system” AND “Deep learning” 96
“Anomaly-based” AND “Internet of things” 411
“Anomaly-based” AND “Deep learning” 442
“Anomaly intrusion detection” AND “Internet of things” 6
4
“Anomaly intrusion detection” AND “Deep learning”
1
Science direct 344
“Anomaly intrusion detection system” AND “Deep learning” 1
“Anomaly-based” AND “Internet of things” 188
“Anomaly-based” AND “Deep learning.” 144
“Anomaly intrusion detection” AND “Internet of things” 4
12
“Anomaly intrusion detection” AND “Deep learning”
2
Scopus 138
“Anomaly intrusion detection system” AND “Deep learning” 4
“Anomaly-based” AND “Internet of things” 69
“Anomaly-based” AND “Deep learning” 47
“Anomaly intrusion detection” AND “Internet of things” 3
Web of science 71
“Anomaly intrusion detection” AND “Deep learning” 6
Appl. Sci. 2021, 11, 8383 8 of 26
2
“Anomaly intrusion detection system” AND “Deep learning” 2
“Anomaly-based” AND “Internet of things” 36
“Anomaly-based” AND “Deep learning” 22
“Anomaly intrusion detection” AND “Internet of things” 40
“Anomaly intrusion detection” AND “Deep learning” 39
“Anomaly intrusion detection system” AND “Internet of things” 20
MDPI 290
“Anomaly intrusion detection system” AND “Deep learning” 20
“Anomaly-based” AND “Internet of things” 90
“Anomaly-based” AND “Deep learning” 81
“Anomaly intrusion detection” AND “Internet of things” 2
14
12
10
Number of Studies
0
2017 2018 2019 2020
Years of publications
5
Number of studies
Journals Name
7. Outcomes
7.1. RQ1: What Is the Comprehensive Taxonomy of Anomaly Intrusion Detection in IoT Using
Deep Learning Techniques?
Recently, various studies have explored the application of anomaly detection in IoT
using deep learning. For better insight, taxonomy is shown in Figure 5 to pinpoint all ex-
isting techniques and requirements of anomaly intrusion detection in IoT, using deep
learning techniques. The IDS are commonly categorized as supervised, unsupervised, and
semi-supervised.
Appl. Sci. 2021, 11, 8383 11 of 26
Figure 5. Taxonomy of anomaly intrusion detection in IoT using deep learning techniques. [13–17,30–49]
7.2. RQ2: What Is the performance Of Anomaly Intrusion Detection in IoT Using Deep Learning
Techniques?
Accuracy, precision, recall, false-positive rate (FPR), false-negative rate (FNR), and f-
measure are the most frequently employed model evaluation techniques based on deep
learning [50–54].
As shown in Table 3, the high accuracy is nearly 100%; precision and recall are almost
100% in D-PACK [45]. They used CNN and AE techniques on the Mirai-RGU dataset.
However, this model takes a long time for training and preprocessing, which is resource
consuming. Additionally, it covers only a few types of attacks. Similarly, the study con-
ducted by [37] used CNN and AE techniques on the Yahoo Webscope S5 dataset and
achieved 99.62% accuracy, 98.78% precision, and 97.2% recall. This indicates that the com-
bination of CNN and AE may improve the performance. Nevertheless, the resource-con-
suming aspect, network overhead, and datasets with real IoT traffic should be considered
as well. D. Li et al. [47] proposed a model that achieved an accuracy of 99.78%, precision
of 98.99%, recall of 91.05%, and FAR of 0.22%, using DML techniques by using the
KDDUP99 dataset. However, this model suffers from high resource consumption, and the
dataset does not contain IoT traffics and modern types of attacks. Shi and Sun [16] pro-
posed a model that achieved 99.36% accuracy, the precision of 97.97%, and recall of
Appl. Sci. 2021, 11, 8383 12 of 26
98.86%, using LSTM with RNN techniques. However, they did not report the FAR, as the
model is for a specific type of attack and is resource consuming. We can say that combin-
ing AE with CNN techniques could enhance the accuracy and decrease the FAR, but we
should consider the resource consumption and cover the IoT attacks. Figure 6 shows the
frequency of the performance measures of the studies.
1%
6%
17% 31%
7%
20% 18%
used the self-collection dataset and focused on interval attacks. In the studies
[17,32,37,46,49], there was no report explaining what kinds of attacks they used.
The DL algorithms that were used in the previous studies prove their ability to detect
a wide range of traditional types of attacks patterns, such as the attacks listed above. More-
over, DL algorithms perform better once there are huge amounts of attack data. However,
more studies are needed to show the performance of the DL algorithms to detect the recent
IoT attacks, such as physical attacks, privilege escalation, eavesdropping, brute-force
password attacks, malicious node injection, and firmware hijacking.
MATLAB
SoftMax
Sigmoid
PyTorch
Python
Study
Scikit
Cooja
Keras
Yahoo Webscope S5
CSE-CIC-IDS2018
KDD CUP 1999
UNSW-NB15
CICIDS 2017
Techniques
Gas-Water
NSL-KDD
Synthetic
N-BaIOT
Test-Bed
CTU-13
DS2OS
AWID
MCFP
Kyoto
Study
Mirai
LOF
Lopez et al. [48] AE √
Yang et al. [15] VAE + DNN √ √
Cheng et al. [30] LSTM √
Thamilarasu et al. [14] DBN √
Shi et al. [16] LSTM + RNN √
Munir et al. [17] CNN √
Gurina et al. [41] AE √
Manimurugan et al. [40] DBN √
CCN + VAE +
Malaiya et al. [46] √ √
LSTM
Kim et al. [34] CNN √ √
Jung et al. [35] CNN √
Gurina et al. [42] AE √
Multi-Layer
Diro et al. [13] √
deep learning
Parra et al. [33] CNN + LSTM √
Cheng et al. [49] CNN √
Moustafa et al. [38] DFFNN √ √
Xie et al. [31] LSTM √
Zhao et al. [36] CNN √
Li et al. [32] LSTM √ √ √
Kim et al. [43] AE √
Hwang et al. [45] CNN + AE √
Yin et al. [37] CNN + AE √
Telikani et al. [44] AE √ √
Shone et al. [18] AE √ √
Drosou et al. [39] GNN/RNN √ √
Deng et al. [47] DML √
Appl. Sci. 2021, 11, 8383 17 of 26
Table 7. The analysis of the most used datasets in the surveyed studies.
Total Total
Published IoT No. of
Dataset Features Normal Attacks Description
Year Specific Classic
Records Records
This dataset is an extension of the da-
taset “KDDCUP 99”. The duplicate rec-
ords were removed and lack in modern
large-scale attacks. Moreover, it is not
NSL-KDD 2009 NO 43 4 77,054 71.463
IoT specific. It contains 22 attack types
in the training dataset and 17 attack
types in the test dataset, which are cate-
gorized as 4 attack classes.
This dataset does not contain modern
attack data and modern large-scale at-
KDD CUP 1999 1999 NO 43 4 1,033,372 4,176,086 tacks. Moreover, it contains unbalanced
labels, and this dataset is not specific to
the IoT.
This dataset is based on a synthetic en-
vironment for generating attack activi-
UNSW-NB15 2015 NO 49 9 2,218,761 321,283 ties. It contains approximately one hour
of anonymized traffic traces from a
DDoS attack in 2007.
This dataset is not specific to the IoT. It
contains complex features that are not
CICIDS 2017 2017 NO 80 14 2,273,097 557,646
present in previous datasets. However,
it contains a modern large-scale attack.
This dataset is not specific to the IoT.
CSE-CIC-IDS2018 2018 NO 80 18 N/A N/A However, it contains a modern large-
scale attack.
This dataset contains IoT traffic, but it is
N-BaIOT 2018 YES 115 8 17,936 831,298 unbalanced, due to the normal records
being smaller than malicious records.
This dataset is not specific to the IoT.
AWID 2015 NO 155 4 530,785 44,858 However, it contains modern types of
attacks.
This dataset contains web traffic, which
Yahoo Webscope
2015 NO - - 93,197 1669 includes normal and attacks traffic.
S5/A1
However, it is not specific to the IoT.
This dataset is not specific to the IoT.
Kyoto 2006 NO 24 - 50,033,015 43,043,255 However, it contains modern types of
attacks [57].
7.3. RQ 3: What Are the Challenges Faced in Current Anomaly Intrusion Detection Deep Learn-
ing Techniques in IoT?
7.3.1. Threat Detection
Because IoT supports a wide range of applications that need different resource re-
quirements in terms of processing, storage, and communication, the network becomes
more complex, due to the heterogeneity of the IoT devices that are being connected. This
makes it hard to provide a secure environment in the IoT ecosystem and even harder to
detect security threats. In securing an IoT environment, it is important to acknowledge the
features and criteria necessary for applying security analytics in deep learning algorithms
[54]. However, the existing mechanisms lack the effective and efficient methods that can
perceive the hidden correlation between these features. Nevertheless, the rapid growth of
deep learning algorithms is believed to have the capability of handling the hidden param-
Appl. Sci. 2021, 11, 8383 18 of 26
eters not limited to the IoT application, but also for finding the correlation of data varia-
tion. In addition, a higher detection rate toward detecting zero-day attacks efficiently is
obtainable with deep learning [58].
8. Discussion
We found that the trend goes to AE techniques. The studies [18,41–44,48] used AE
techniques because of the ability of AE to take advantage of the linear and nonlinear di-
mensionality reduction to detect the anomalies. The AE training phase involves the recon-
struction of clean input data from a partially destroyed one as well as the ability of AE to
deal with heterogeneity, unstructured and high dimensional data that generated from IoT
device. However, using techniques such as CNN combined with AE would be preferable
for better classification, depending on the data reduction from the AE phase. Another ob-
served five studies used CNN techniques [17,34–36,49], which can automatically detect
the most important feature and learn the key feature of each class by itself without human
intervention. Moreover, CNN can perform identification and prediction through the
dense network. The CNN considered is a very vast technique, and this may be due to the
ConvNets. Other factors that may affect the efficiency of CNN are filters, kernel size,
stride, and padding. However, using techniques such as AE combined with CNN would
be preferable to reduce the high dimensional data, which generate from IoT devices to
minimize the exchange data between IoT nodes to avoid the energy-consuming and com-
munication overhead.
In addition, we found that three studies used LSTM techniques [30–32] that are useful
for classifying, processing, and predicting time series in long duration. Moreover, they
have a memory that can store previous time step information, and this is how they learn.
They also can deal with noise distributed representation and continuous value. However,
LSTMs are apt for overfitting, and it is not easy to apply the dropout algorithm to restrain
this problem. Combining CNN with AE [37,45] could achieve a promising result in terms
of accuracy, recall, and precision. However, the researcher and developer should consider
the resource consumption, training time, and the type of attacks. Notably, the AE and
CNN are the most common techniques used in the literature. In addition, some studies
used a single technique, and others combined multiple ones to improve the performance
[16,46,47]. However, the FAR needs to be decreased when considering different types of
attacks in the used dataset. Datasets that include a wide range of attacks with simulation
tools are suggested above. In addition, still, some DL techniques have not been examined
yet, which makes the need for more work in the area to achieve robust IDS for resource-
constrained IoT devices. Combining two DL could lead to achieving high detection at-
tacks, but it may lead to resource consumption and a high training time. The datasets used
in the literature are outdated, perhaps due to a lack of substitute datasets. However, these
datasets are outdated and do not contain IoT traffic or modern types of attacks. Some
modern datasets are now available that contain modern types of attacks; UNSW-NB15
[55] and IoT traffic BoT-IoT [56] we suggest for future research. In addition, there is a need
for new datasets that reflect the IoT traffic. Table 8 shows the domain of state-of-the-art
studies, IDS architecture, the technique used, and methodology as well as the advantages
and disadvantages.
Table 8. List of the state-of-the-art studies and the advantages and disadvantages.
IDS Techniques
Study Methodology Advantages Disadvantages
Architecture Used
proposed Model to perform • Lightweight. • Low detection ac-
feature reconstruction and de- • High accuracy in curacy.
Lopez et al. [48] Network-based AE
tect malicious in IoT environ- recover categorical • High training
ment. features. time.
proposed model to perform
• Low detection ac-
monitoring unknown attacks • Lightweight.
VAE + curacy.
Yang et al. [15] Network-based using AE and DNN to learn the • Low resource con-
DNN • High training
complex traffics and imbal- sumption.
time.
anced classes.
Appl. Sci. 2021, 11, 8383 20 of 26
9. Future Direction
Undoubtedly, improving the efficiency of deep learning detection results remains an
open research direction issue. IoT security researchers and developers must always con-
tend for 100% detection with zero false alarms while considering IoT resource constraints.
Moreover, most of the studies are pertinent to the system’s normal behavior. Often, most
of the approaches depend on the training of normal behavior, while the deviation is per-
tinent to scenarios investigated as abnormal behavior. Thus, a better method in terms of
precision and robustness is needed to deal with complex real scenarios. Data complexities
include unexpected noise, redundancy in data, and imbalanced datasets. To extract sig-
nificant knowledge and information, well-designed techniques are required to organize
the datasets. In this scenario, a lightweight system can be exhaustive, due to the high com-
putational task of dealing with complex data. The current technology of cloud computing
can be utilized to obtain a productive result in real time. Most of the work done in recent
years was in the detection of anomalies, as the research community did not foster much
interest in anomaly prediction and prevention. This could contribute to predicting anom-
alies in future work. There is a need to adopt and/or develop new methods that can pre-
vent the systems before attacks occur. Moreover, anomaly detection in multivariable time
Appl. Sci. 2021, 11, 8383 23 of 26
series is still an open research direction. In addition, applying anomaly intrusion detection
systems, using deep learning in smart vehicles, needs to be investigated. There is an im-
perious need for normal and anomaly datasets that are up-to-date and integrated with IoT
applications and services. These datasets could be extremely useful for testing various IDS
types and methods in IoT environments. The capability to implement effective and mean-
ingful IDS comparisons will rely on these datasets.
11. Conclusions
In general, this study presented a systematic review of anomaly IDSs in IoT environ-
ments using deep learning. A comprehensive report was produced, regarding anomaly
intrusion detection in the domain of IoT, using deep learning techniques. Upon comple-
tion of this study, a full adherence of systematic literature protocol and guidelines based
on proposed work by Kitchenham is presented [25]. All the data used were gathered from
primary studies published without applying any filters to differentiate between confer-
ence proceedings and journal articles. This study summarized and organized the current
literature related to anomaly-based intrusion detection in IoT, using deep learning tech-
niques according to the pre-defined keywords and RQs. A total number of 26 studies were
included, according to the stated exclusion, inclusion, and quality criteria. A comprehen-
sive taxonomy was presented based on the results of the study conducted for anomaly
intrusion detection in IoT using deep learning techniques. This study provided an insight
into the attributes and knowledge of existing anomaly intrusion detection in an IoT envi-
ronment, using deep learning techniques. Additionally, the study presented a comparison
in terms of the performance, the dataset used, attacks detection, techniques, and evalua-
tion techniques in each study. Finally, the study discussed challenges faced in anomaly
intrusion detection in IoT using deep learning. This paper can provide researchers with
details about an up-to-date technique and methodology in anomaly intrusion detection in
IoT, using deep leering. The limitations of current anomaly-based intrusion detection sys-
tems in IoT using deep learning techniques indicate the future direction for further im-
provements of the IDS systems, considering the characteristics of IoT.
References
1. Atzori, L.; Iera, A.; Morabito, G. Understanding the Internet of Things: Definition, potentials, and societal role of a fast evolving
paradigm. Ad Hoc Netw. 2017, 56, 122–140, https://doi.org/10.1016/j.adhoc.2016.12.004.
2. Elrawy, M.F.; Awad, A.I.; Hamed, H.F.A. Intrusion detection systems for IoT-based smart environments: A survey. J. Cloud
Comput. 2018, 7, 21.
3. Da Xu, L.; He, W.; Li, S. Internet of things in industries: A survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243.
4. Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies,
Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142, https://doi.org/10.1109/jiot.2017.2683200.
5. Almiani, M.; AbuGhazleh, A.; Al-Rahayfeh, A.; Atiewi, S.; Razaque, A. Deep recurrent neural network for IoT intrusion detec-
tion system. Simul. Model. Pract. Theory 2020, 101, 102031, https://doi.org/10.1016/j.simpat.2019.102031.
6. Moore, S.J.; Nugent, C.D.; Zhang, S.; Cleland, I. IoT reliability: A review leading to 5 key research directions. CCF Trans. Pervasive
Comput. Interact. 2020, 2, 147–163, https://doi.org/10.1007/s42486-020-00037-z.
7. Ferrag, M.A.; Shu, L.; Yang, X.; Derhab, A.; Maglaras, L. Security and Privacy for Green IoT-Based Agriculture: Review, Block-
chain Solutions, and Challenges. IEEE Access 2020, 8, 32031–32053.
8. Farooq, M.S.; Riaz, S.; Abid, A.; Abid, K.; Naeem, M.A. A Survey on the Role of IoT in Agriculture for the Implementation of
Smart Farming. IEEE Access 2019, 7, 156237–156271, https://doi.org/10.1109/access.2019.2949703.
9. Ruan, J.; Wang, Y.; Chan, F.T.S.; Hu, X.; Zhao, M.; Zhu, F.; Shi, B.; Shi, Y.; Lin, F. A Life Cycle Framework of Green IoT-Based
Agriculture and Its Finance, Operation, and Management Issues. IEEE Commun. Mag. 2019, 57, 90–96.
10. Pal, S.; Hitchens, M.; Rabehaja, T.; Mukhopadhyay, S. Security Requirements for the Internet of Things: A Systematic Approach.
Sensors 2020, 20, 5897, https://doi.org/10.3390/s20205897.
11. Ghaleb, F.A.; Maarof, M.A.; Zainal, A.; Rassam, M.; Saeed, F.; Alsaedi, M. Context-aware data-centric misbehaviour detection
scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency be-
tween the cooperative awareness messages. Veh. Commun. 2019, 20, 100186, https://doi.org/10.1016/j.vehcom.2019.100186.
12. Hameed, S.; Khan, F.I.; Hameed, B. Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review.
J. Comput. Netw. Commun. 2019, 2019, 9629381, https://doi.org/10.1155/2019/9629381.
13. Diro, A.A.; Chilamkurti, N. Distributed attack detection scheme using deep learning approach for Internet of Things. Futur.
Gener. Comput. Syst. 2018, 82, 761–768, https://doi.org/10.1016/j.future.2017.08.043.
14. Thamilarasu, G.; Chawla, S. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things. Sensors 2019, 19,
1977, https://doi.org/10.3390/s19091977.
15. Yang, Y.; Zheng, K.; Wu, C.; Yang, Y. Improving the classification effectiveness of intrusion detection by using improved con-
ditional variational autoencoder and deep neural network. Sensors 2019, 19, 2528.
16. Shi, W.-C.; Sun, H.-M. DeepBot: A time-based botnet detection with deep learning. Soft Comput. 2020, 24, 16605–16616,
https://doi.org/10.1007/s00500-020-04963-z.
17. Munir, M.; Siddiqui, S.A.; Dengel, A.; Ahmed, S. DeepAnT: A Deep Learning Approach for Unsupervised Anomaly Detection
in Time Series. IEEE Access 2018, 7, 1991–2005, https://doi.org/10.1109/access.2018.2886457.
18. Shone, N.; Ngoc, T.N.; Phai, V.D.; Shi, Q. A Deep Learning Approach to Network Intrusion Detection. IEEE Trans. Emerg. Top.
Comput. Intell. 2018, 2, 41–50.
19. Hajiheidari, S.; Wakil, K.; Badri, M.; Navimipour, N.J. Intrusion detection systems in the Internet of things: A comprehensive
investigation. Comput. Netw. 2019, 160, 165–191, https://doi.org/10.1016/j.comnet.2019.05.014.
20. Fahim, M.; Sillitti, A. Anomaly Detection, Analysis and Prediction Techniques in IoT Environment: A Systematic Literature
Review. IEEE Access 2019, 7, 81664–81681, https://doi.org/10.1109/access.2019.2921912.
21. da Costa, K.A.; Papa, J.P.; Lisboa, C.O.; Munoz, R.; de Albuquerque, V.H.C. Internet of Things: A survey on machine learning-
based intrusion detection approaches. Comput. Netw. 2019, 151, 147–157.
22. Chalapathy, R.; Chawla, S. Deep learning for anomaly detection: A survey. arXiv, 2019, arXiv:1901.03407.
23. Sharma, B.; Sharma, L.; Lal, C. Anomaly Detection Techniques using Deep Learning in IoT: A Survey. In Proceedings of the
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Dubai, United Arab Emir-
ates, 11–12 December 2019; IEEE: Piscataway, NJ, USA, 2020.
24. Alsoufi, M.A.; Razak, S.; Siraj, M.M.; Ali, A.; Nasser, M.; Abdo, S. Anomaly Intrusion Detection Systems in IoT Using Deep Learning
Techniques: A Survey; Springer International Publishing: Cham, Switzerland, 2021.
25. Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering; EBSE Technical Report;
Keele University: Keele, UK, 2007.
26. Kitchenham, B.; Brereton, P. A systematic review of systematic review process research in software engineering. Inf. Softw.
Technol. 2013, 55, 2049–2075, https://doi.org/10.1016/j.infsof.2013.07.010.
27. Milani, B.A.; Navimipour, N.J. A Systematic Literature Review of the Data Replication Techniques in the Cloud Environments.
Big Data Res. 2017, 10, 1–7, https://doi.org/10.1016/j.bdr.2017.06.003.
28. Safaei, M.; Asadi, S.; Driss, M.; Boulila, W.; Alsaeedi, A.; Chizari, H.; Abdullah, R.; Safaei, M. A systematic literature review on
outlier detection in wireless sensor networks. Symmetry 2020, 12, 328.
29. Nidhra, S.; Yanamadala, M.; Afzal, W.; Torkar, R. Knowledge transfer challenges and mitigation strategies in global software
development—A systematic literature review and industrial validation. Int. J. Inf. Manag. 2013, 33, 333–355,
https://doi.org/10.1016/j.ijinfomgt.2012.11.004.
Appl. Sci. 2021, 11, 8383 25 of 26
30. Xu, R.; Cheng, Y.; Liu, Z.; Xie, Y.; Yang, Y. Improved Long Short-Term Memory based anomaly detection with concept drift
adaptive method for supporting IoT services. Futur. Gener. Comput. Syst. 2020, 112, 228–242, https://doi.org/10.1016/j.fu-
ture.2020.05.035.
31. Nguyen, G.; Dlugolinsky, S.; Tran, V.; Garcia, A.L. Deep Learning for Proactive Network Monitoring and Security Protection.
IEEE Access 2020, 8, 19696–19716, https://doi.org/10.1109/access.2020.2968718.
32. Li, X.; Xu, M.; Vijayakumar, P.; Kumar, N.; Liu, X. Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet
of Things. IEEE Trans. Veh. Technol. 2020, 69, 8820–8831, https://doi.org/10.1109/tvt.2020.2995133.
33. Parra, G.D.L.T.; Rad, P.; Choo, K.-K.R.; Beebe, N. Detecting Internet of Things attacks using distributed deep learning. J. Netw.
Comput. Appl. 2020, 163, 102662, https://doi.org/10.1016/j.jnca.2020.102662.
34. Kim, J.; Kim, J.; Kim, H.; Shim, M.; Choi, E. CNN-Based Network Intrusion Detection against Denial-of-Service Attacks. Elec-
tronics 2020, 9, 916.
35. Jung, W.; Zhao, H.; Sun, M.; Zhou, G. IoT botnet detection via power consumption modeling. Smart Health 2020, 15, 100103,
https://doi.org/10.1016/j.smhl.2019.100103.
36. Li, Y.; Xu, Y.; Liu, Z.; Hou, H.; Zheng, Y.; Xin, Y.; Zhao, Y.; Cui, L. Robust detection for network intrusion of industrial IoT based
on multi-CNN fusion. Measurement 2020, 154, 107450, https://doi.org/10.1016/j.measurement.2019.107450.
37. Yin, C.; Zhang, S.; Wang, J.; Xiong, N.N. Anomaly Detection Based on Convolutional Recurrent Autoencoder for IoT Time
Series. IEEE Trans. Syst. Man Cybern. Syst. 2020, 1–11, https://doi.org/10.1109/tsmc.2020.2968516.
38. Al-Hawawreh, M.; Moustafa, N.; Sitnikova, E. Identification of malicious activities in industrial internet of things based on deep
learning models. J. Inf. Secur. Appl. 2018, 41, 1–11, https://doi.org/10.1016/j.jisa.2018.05.002.
39. Protogerou, A.; Papadopoulos, S.; Drosou, A.; Tzovaras, D.; Refanidis, I. A graph neural network method for distributed anom-
aly detection in IoT. Evol. Syst. 2020, 12, 19–36, https://doi.org/10.1007/s12530-020-09347-0.
40. Manimurugan, S.; Al-Mutairi, S.; Aborokbah, M.M.; Chilamkurti, N.; Ganesan, S.; Patan, R. Effective Attack Detection in Inter-
net of Medical Things Smart Environment Using a Deep Belief Neural Network. IEEE Access 2020, 8, 77396–77404,
https://doi.org/10.1109/access.2020.2986013.
41. Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-BaIoT—Network-Based Detec-
tion of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22.
42. Gurina, A.; Eliseev, V. Anomaly-Based Method for Detecting Multiple Classes of Network Attacks. Information 2019, 10, 84,
https://doi.org/10.3390/info10030084.
43. Kim, S.; Hwang, C.; Lee, T. Anomaly Based Unknown Intrusion Detection in Endpoint Environments. Electronics 2020, 9, 1022,
https://doi.org/10.3390/electronics9061022.
44. Telikani, A.; Gandomi, A.H. Cost-sensitive stacked auto-encoders for intrusion detection in the Internet of Things. Internet
Things 2019, 14, 100122, https://doi.org/10.1016/j.iot.2019.100122.
45. Hwang, R.-H.; Peng, M.-C.; Huang, C.-W.; Lin, P.-C.; Nguyen, V.-L. An Unsupervised Deep Learning Model for Early Network
Traffic Anomaly Detection. IEEE Access 2020, 8, 30387–30399, https://doi.org/10.1109/access.2020.2973023.
46. Malaiya, R.K.; Kwon, D.; Suh, S.C.; Kim, H.; Kim, I.; Kim, J. An Empirical Evaluation of Deep Learning for Network Anomaly
Detection. IEEE Access 2019, 7, 140806–140817, https://doi.org/10.1109/access.2019.2943249.
47. Li, D.; Deng, L.; Lee, M.; Wang, H. IoT data feature extraction and intrusion detection system for smart cities based on deep
migration learning. Int. J. Inf. Manag. 2019, 49, 533–545, https://doi.org/10.1016/j.ijinfomgt.2019.04.006.
48. Lopez-Martin, M.; Carro, B.; Sanchez-Esguevillas, A.; Lloret, J. Conditional Variational Autoencoder for Prediction and Feature
Recovery Applied to Intrusion Detection in IoT. Sensors 2017, 17, 1967, https://doi.org/10.3390/s17091967.
49. Cheng, Y.; Xu, Y.; Zhong, H.; Liu, Y. Leveraging Semi-supervised Hierarchical Stacking Temporal Convolutional Network for
Anomaly Detection in IoT Communication. IEEE Internet Things J. 2020, 8, 144–155.
50. Sokolova, M.; Lapalme, G. A systematic analysis of performance measures for classification tasks. Inf. Process. Manag. 2009, 45,
427–437, https://doi.org/10.1016/j.ipm.2009.03.002.
51. Powers, D.M. Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation. arXiv, 2011,
arXiv:2010.16061.
52. Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine Learning and Deep Learning Methods
for Cybersecurity. IEEE Access 2018, 6, 35365–35381, https://doi.org/10.1109/access.2018.2836950.
53. Marir, N.; Wang, H.; Feng, G.; Li, B.; Jia, M. Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network
and Ensemble SVM Using Spark. IEEE Access 2018, 6, 59657–59671, https://doi.org/10.1109/access.2018.2875045.
54. Amanullah, M.A.; Habeeb, R.A.A.; Nasaruddin, F.H.; Gani, A.; Ahmed, E.; Nainar, A.S.M.; Akim, N.M.; Imran, M. Deep learn-
ing and big data technologies for IoT security. Comput. Commun. 2020, 151, 495–517,
https://doi.org/10.1016/j.comcom.2020.01.016.
55. Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network
data set). In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Aus-
tralia, 10–12 November 2015; IEEE: Piscataway, NJ, USA, 2016.
56. Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the internet of
things for network forensic analytics: Botiot dataset. Future Gener. Comput. Syst. 2019, 100, 779–796.
57. Song, J.; Takakura, H.; Okabe, Y. Description of Kyoto University Benchmark Data. 2006. Available online:
http://www.takakura.com/Kyoto_data/BenchmarkData-Description-v5. pdf (accessed on 15 March 2016).
Appl. Sci. 2021, 11, 8383 26 of 26
58. Tang, T.A.; Mhamdi, L.; McLernon, D.; Zaidi, S.A.R.; Ghogho, M. Deep learning approach for network intrusion detection in
software defined networking. In Proceedings of the 2016 International Conference on Wireless Networks and Mobile Commu-
nications (WINCOM), Fez, Morocco, 26–29 October 2016; IEEE: Piscataway, NJ, USA, 2016.
59. Hossain, M.M.; Fotouhi, M.; Hasan, R. Towards an analysis of security issues, challenges, and open problems in the internet of
things. In Proceedings of the 2015 IEEE World Congress on Services, New York, NY, USA, 27 June–2 July 2015; IEEE: Pisca-
taway, NJ, USA, 2015.
60. Kotenko, I.; Saenko, I.; Branitskiy, A. Framework for Mobile Internet of Things Security Monitoring Based on Big Data Pro-
cessing and Machine Learning. IEEE Access 2018, 6, 72714–72723, https://doi.org/10.1109/access.2018.2881998.
61. Vinayakumar, R.; Alazab, M.; Soman, K.P.; Poornachandran, P.; Al-Nemrat, A.; Venkatraman, S. Deep Learning Approach for
Intelligent Intrusion Detection System. IEEE Access 2019, 7, 41525–41550, https://doi.org/10.1109/access.2019.2895334.
62. Guo, Y.; Liu, Y.; Oerlemans, A.; Lao, S.; Wu, S.; Lew, M.S. Deep learning for visual understanding: A review. Neurocomputing
2016, 187, 27–48, https://doi.org/10.1016/j.neucom.2015.09.116.
63. Kozik, R.; Choraś, M.; Ficco, M.; Palmieri, F. A scalable distributed machine learning approach for attack detection in edge
computing environments. J. Parallel Distrib. Comput. 2018, 119, 18–26, https://doi.org/10.1016/j.jpdc.2018.03.006.
64. Lu, Z.; Wang, N.; Wu, J.; Qiu, M. IoTDeM: An IoT Big Data-oriented MapReduce performance prediction extended model in
multiple edge clouds. J. Parallel Distrib. Comput. 2018, 118, 316–327, https://doi.org/10.1016/j.jpdc.2017.11.001.
65. Zhao, Z.; Kumar, A. Accurate periocular recognition under less constrained environment using semantics-assisted convolu-
tional neural network. IEEE Trans. Inf. Forensics Secur. 2016, 12, 1017–1030.
66. HaddadPajouh, H.; Dehghantanha, A.; Khayami, R.; Choo, K.-K.R. A deep Recurrent Neural Network based approach for In-
ternet of Things malware threat hunting. Futur. Gener. Comput. Syst. 2018, 85, 88–96, https://doi.org/10.1016/j.future.2018.03.007.