Internet of Things (IoT) Security Intelligence - A Comprehensive Overview, Machine Learning Solutions and Research Directions
Internet of Things (IoT) Security Intelligence - A Comprehensive Overview, Machine Learning Solutions and Research Directions
https://doi.org/10.1007/s11036-022-01937-3
Abstract
The Internet of Things (IoT) is one of the most widely used technologies today, and it has a significant effect on our lives in
a variety of ways, including social, commercial, and economic aspects. In terms of automation, productivity, and comfort
for consumers across a wide range of application areas, from education to smart cities, the present and future IoT technolo-
gies hold great promise for improving the overall quality of human life. However, cyber-attacks and threats greatly affect
smart applications in the environment of IoT. The traditional IoT security techniques are insufficient with the recent security
challenges considering the advanced booming of different kinds of attacks and threats. Utilizing artificial intelligence (AI)
expertise, especially machine and deep learning solutions, is the key to delivering a dynamically enhanced and up-to-
date security system for the next-generation IoT system. Throughout this article, we present a comprehensive picture on
IoT security intelligence, which is built on machine and deep learning technologies that extract insights from raw data to
intelligently protect IoT devices against a variety of cyber-attacks. Finally, based on our study, we highlight the associated
research issues and future directions within the scope of our study. Overall, this article aspires to serve as a reference point
and guide, particularly from a technical standpoint, for cybersecurity experts and researchers working in the context of IoT.
Keywords Internet of Things · Cyber-attacks · Anomalies · Machine learning · Deep learning · IoT data analytics ·
Intelligent decision-making · Security intelligence
1 Introduction on, that collect and transmit data. The number of connected
things in IoT systems is increasing day by day. For instance,
The Internet of Things (IoT) is one of the most widely used there will be about 20.4 billion connected things globally in
technologies today and is often described as a connected 2022, compared to 8.4 billion connected things in 2020 [57].
network of heterogeneous components enabling intelli- The IoT has a significant effect on our lives in a variety of
gent systems and services that detect, capture, distribute, ways, including social, commercial, and economic aspects.
and analyze data. Things in the IoT devices refer to smart In terms of growing the digital economy, the IoT sector is
devices, such as sensors, smartwatches, smart refrigerators, projected to grow in revenue from 892 billion in 2018 to 4
smoke detectors, radio frequency identification (RFID), trillion by 2025 [57]. The IoT enables large-scale techno-
heartbeat monitors, accelerometers, smartphones, and so logical advancements and value-added services in a variety
of areas of our lives, including smart homes, smart cities,
transportation, logistics, smart health, retail, agriculture, and
* Iqbal H. Sarker business, as well as smart metering, remote monitoring, and
[email protected]
process automation. In terms of automation, performance,
1
Swinburne University of Technology, Melbourne VIC‑3122, and comfort, current and future IoT applications and services
Australia have tremendous potential for enhancing consumer quality
2
Department of Computer Science and Engineering, of life. However, in the context of IoT, numerous sorts of
Chittagong University of Engineering & Technology, cyber-attacks and threats are viewed as challenging prob-
Chittagong 4349, Bangladesh lems to the expansion of IoT. Therefore, this paper focuses
3
Computer Science Department, Faculty of Computing primarily on IoT security intelligence to effectively protect
and Information Technology, King Abdulaziz University,
Jeddah 21589, Saudi Arabia
13
Vol.:(0123456789)
Mobile Networks and Applications
systems and applications from a variety of cyber-attacks and – We discuss IoT environment, various IoT security chal-
threats in IoT. lenging issues, IoT systems with various layers, and asso-
The most basic need in the IoT network is to protect all ciated security issues in each layer, to highlight the scope
of the systems, apps, and connected devices. IoT networks’ of this study.
massive size introduces new challenges in a variety of areas, – We present different machine learning techniques as well
including device management, data management, comput- as deep learning architectures and techniques, and their
ing, security, and privacy, etc. As the IoT grows, various usage for intelligent security modeling to solve the secu-
security concerns are being raised as potential threats. rity problems, in the environment of IoT.
Without a trusted system, the emerging IoT applications, – Finally, we explore the issues that have been encountered,
such as those mentioned above, will be unable to meet the as well as potential research opportunities and future
needs of people and society and may lose all their potential. directions, to secure and trust IoT networks and systems.
Typically, IoT systems operate on several layers, including
the perception or sensing layer, the networking, and data The remainder of the paper is carried out as follows: The
communication layer, the middleware or support layer, and Section 2 discusses the domain’s history and reviews related
the application layer. These layers are briefly discussed in work. We discuss IoT system architectures with different
Section 3. Each of these layers has a unique set of tasks and layers and the associated security issues in each layer in Sec-
relevant technologies to perform in an IoT application, and tion 3. We present various machine and deep learning-based
each layer brings a new set of issues and security risks. For security solutions in the IoT environment in Section 4. The
example, denial of service (DoS) attacks, spoofing attacks, challenges faced, as well as prospective study opportunities
jamming, eavesdropping, data tampering, a man in the mid- and future directions, are highlighted in Section 5, and the
dle attacks, and malicious, etc. are the most common IoT work is concluded in Section 6.
attacks [137]. Thus, depending on the nature of the security
issues, potential IoT security solutions such as authentica-
tion, access control, threat and risk prediction, malware 2 Background and Related Work
analysis, anomaly or intrusion detection, and prevention,
etc, could be useful. Due to the advanced boom in security In this section, we make a comprehensive literature review
threats and attacks, and complexity in security incidents, the on the IoT environment with various application areas,
conventional techniques for dealing with them are no longer IoT security challenging issues, and recent IoT security
effective. Therefore an intelligent security system based on approaches including machine learning techniques, and
modern technologies that can address these security con- highlight the scope of our study.
cerns is urgently required to protect the next-generation IoT
system. 2.1 The IoT Paradigm
Artificial Intelligence (AI) is one of the most important
technologies for developing intelligent systems, and it is The Internet of Things (IoT) represents a paradigm shift
considered to be a part of the Fourth Industrial Revolution in information technology. The term ‘Internet of Things,’
(4IR) [119, 130] as well. Thus, utilizing AI knowledge, par- which is also abbreviated as IoT, is composed of two key
ticularly, machine and deep learning, we can detect anoma- words: the first is ‘Internet,’ and the second is ‘Things’,
lies or unwanted malicious activities in the IoT, and, as a where the Things are defined as smart devices or objects.
result, offer a dynamic security solution that is constantly The Internet of Things (IoT) is one of the emerging
improved and up to date. Typically, machine or deep learn- smart technologies for the Fourth Industrial Revolution (or
ing models comprise a set of rules, methods, or complex Industry 4.0), which represents the ongoing automation of
transfer functions that extract useful insights or interesting traditional manufacturing and industrial practices [130].
data patterns from the security data [122]. Thus, it is possi- The IoT refers to a network of interconnected, internet-
ble to utilize the resultant security models to train machines connected devices that may collect and send data over a
to predict threats or risks at an early stage, or to identify wireless network without the need for human intervention.
anomalies in IoT to develop an appropriate defensive policy. Several organizations and research groups describe IoT
Based on information gathered so far from the literature on and smart environments in a variety of ways and from a
these technologies and their use in the IoT environment, the variety of perspectives. For instance, Thiesse et al. [141]
contribution of this article is summarized as follows: define the IoT as “consisting of hardware items and digi-
tal information flows based on RFID tags”. The Institute
– This study concentrates on the knowledge of artificial of Electrical and Electronics Engineers (IEEE) defines
intelligence, particularly, machine and deep learning- the IoT as a “collection of items with sensors that form
based IoT security solutions with their effectiveness. a network connected to the Internet” [93]. The European
13
Mobile Networks and Applications
Telecommunications Standards Institute (ETSI) defines devices or objects such as sensors, smartwatches, and
“machine-to-machine (M2M) communications as an auto- smartphones, etc.
mated communications system that makes decisions and
processes data operations without direct human interven- 2.2 IoT‑based Smart Environments
tion” [72]. Cisco (San Francisco), which is well-known as
the worldwide leader in IT, networking, and cybersecurity A smart environment is typically a world, where the sensors
solutions, has summarized the IoE (Internet-of-everything) and computing devices are integrated with everyday objects
concept “as a network that consists of people, data, things, through a connected network to enhance the comfort and
and processes” [36]. efficiency of human life. Ahmed et al. [23] state that “the
The RFID (Radio Frequency Identification) group term ‘smart’ refers to the ability to autonomously obtain and
defines the “IoT as the worldwide network of intercon- apply knowledge, and the term ‘environment’ refers to the
nected objects uniquely addressable based on standard surroundings”. According to Belissent et al. [32], “a smart
communication protocols” [143]. According to Cluster of environment uses information and communications tech-
European research projects on the IoT [133] - “Things are nologies to make the critical infrastructure components and
active participants in business, information and social pro- services of a city’s administration, education, healthcare,
cesses where they are enabled to interact and communicate public safety, real estate, transportation and utilities more
among themselves and with the environment by exchang- aware, interactive and efficient”. Recent developments in IoT
ing data and information sensed about the environment have elevated it to the status of technology for creating smart
while reacting autonomously to the real/physical world environments, such as intelligent cities, intelligent health-
events and influencing it by running processes that trigger care systems, intelligent building management systems, etc.
actions and create services with or without direct human Figures 1, and 2 depicted a graphical depiction of the total
intervention”. Gubbi et al. [50] define “IoT is the inter- number of connected IoT devices and the worldwide IoT
connection of sensing and actuating devices providing the market [137], as well as the potential economic impact and
ability to share information across platforms through a uni- projected market share of dominant IoT applications by 2025
fied framework, developing a common operating picture [24].
for enabling innovative applications”. Atzori et al. [29] The goal of such smart environments is to provide ser-
define IoT in three paradigms such as internet-oriented vices based on data acquired by IoT-enabled sensors using
(middleware), things-oriented (sensors), and semantic- intelligent methods, which has a significant impact on our
oriented (knowledge). lives [124] in various dimensions, such as social, com-
In general, the IoT’s main pillars are as follows: smart mercial, as well as economic. According to the statistics
devices, data, analytics, and connectivity. Thus, the IoT of Navigant Research mentioned in Elrawy et al. [43], the
can be defined as a network of connected heterogeneous global smart city services market is expected to be 225.5
components that can sense, collect, transmit, and analyze billion US dollars by 2026, while 93.5 billion US dollars in
data over a wireless network to enable intelligent deci- 2017. A range of factors, such as usable bandwidth, serv-
sion making and services aimed at improving the qual- ing an increasing number of users and smart objects in IoT
ity of human life, where the Things are defined as smart networks, managing large volumes of data, scalable com-
puting systems, such as cloud computing, etc., need to be
13
Mobile Networks and Applications
considered in the implementation of the IoT paradigm for – Proximity: In short-range communications, ad hoc net-
building smart environments, e.g. smart cities, for the quality works may rely on local devices. Proximity means that
of services of smart environment applications [136]. an IoT-enabled object changes and behaves according to
the current location [34].
– Latency and reliability: The main challenges in indus-
2.3 What Makes IoT Security Challenging? trial IoT networks include low-latency and high-reliabil-
ity wireless communication. Sensitive applications like
Many personal and commercial equipment are becoming surgical devices, assembly line production, and traffic
“smart” as the digital revolution takes hold. On IoT net- monitoring, etc. require high-reliable, and low-latency
works, traditional security and privacy approaches may fail. communication [89].
The dynamic nature of IoT connectivity introduces a new set – Cost, resource, and energy consumption: An IoT device
of security challenges. The following are some examples: is a piece of hardware with a sensor that transmits data
from one place to another over the Internet. The systems
– Heterogeneity: IoT intends to connect a huge number of should be configured to reduce needed resources as well
heterogeneous devices [82] to enable advanced applica- as costs due to a large number of sensors in a complex
tions that can improve human life quality. As a result, IoT system application [82].
devices come in a variety of shapes and sizes, resulting – Security and privacy protection: Consumer and propri-
in a diverse set of hardware and software schemes. etary data must be secured and protected, particularly in
– Volume: In IoT, a large number of devices, i.e., billions sensitive domains, such as healthcare applications [82].
of smart devices [57], are interconnected, which are cou- – Intelligent decision-making : For many IoT applications,
pled with the high volume, velocity, and structure of real- sophisticated decisions should be intelligent, according
world data. to the preferences of the users, and must be made in real-
– Inter-connectivity: The IoT refers to the interconnection time.
between devices, the information they send and receive
to one another, like a conversation. Thus, IoT networks Although most of these issues are shared by many Internet
are accessed with the nature of any time, and anywhere access points, the constraints of IoT devices, as well as the
[82]. dynamic nature and complexity of the environment in which
– Structure and vulnerability: Various types of attacks, they operate, magnify many of these concerns beyond the
such as cookie theft, cross-site scripting, structured query scope of traditional security capabilities.
language injection, session hijacking, and often distrib-
uted denial of service, are vulnerable to IoT devices. On 2.4 Related work and the Scope of this Study
a large, self-organized IoT network, the vulnerability to
distributed denial of service attacks typically grows [57]. Several studies have been done on IoT security. For instance,
– Dynamism: As IoT devices are continually removed the authors in [68] present a survey of IoT security issues,
and added, the nature of the network reconfiguration is where they review and categorize the popular security
dynamic and must be adaptable [82]. issues, such as attacks, threats, concerning the IoT layered
13
Mobile Networks and Applications
architecture, networking, communication, and management. [45]. In [38], the authors use several such NSL-KDD [139],
Another study on IoT security has been presented in [94]. UNSW-NB15 [97], CIC-IDS [9], while analyzing their
The authors in [153] present several research challenges machine learning-based network intrusion detection model
and opportunities related to IoT security, where they have for IoT security.
considered the general security background of IoT. In [56], Unlike the previous studies, this paper focuses on artifi-
an overview of the current status of IoT security research, cial intelligence knowledge, particularly machine and deep
as well as associated tools like IoT modelers and simula- learning-based IoT security solutions. For this, we present
tors, was presented. In [91], the authors provide an overview different machine learning techniques as well as deep learn-
of security concepts, technological and security concerns, ing architectures and techniques, and their usage for intel-
viable solutions, and prospective approaches for safeguard- ligent security modeling to solve the security problems, in
ing the IoT. They give their analysis of the current state the context of IoT.
and issues of IoT security in their survey, which takes into
account three layers of architecture: perception layer, net-
work layer, and application layer. The authors of [57] under- 3 IoT System Architectures and Security
take an IoT security survey that takes into account applica- Issues
tion domains, security threats, and solution architectures.
A taxonomy on IoT vulnerabilities, attack vectors, attacks In this section, we first highlight the attack surface areas of
that exploit such vulnerabilities, and corresponding method- the IoT, and then we summarize the security issues through
ologies, has been presented in [99]. In [26], a study on IoT the overall architecture of an IoT system.
security is presented by the authors, which focuses on the
most recent IoT security threats and vulnerabilities identified 3.1 IoT Attack Surface Areas
via a thorough assessment of current IoT security studies.
In addition to these surveys, many research on machine In the following, we summarize surface areas for IoT attacks,
learning have been conducted. For example, in the paper or areas where threats and vulnerabilities can exist in IoT
[145], the authors explore the threat model for IoT systems systems and applications. These are:
and evaluate IoT security solutions based on machine-learn-
ing methods like supervised learning, unsupervised learning, – Devices: IoT devices are one of the most common ways
and reinforcement learning. They explore methods to data that cyberattacks are initiated. Memory, firmware,
privacy protection that use learning-based IoT authentica- the physical interface, the web interface, and network
tion, access control, secure offloading, and malware detec- resources are all aspects of an IoT system that can be
tion. The authors examine the security requirements, attack vulnerable. Attackers can take advantage of vulnerable
vectors, and other discussions in [61], focused on computer update systems, outdated components, and risky default
learning for the IoT networks. In [25], a survey of computer settings, among other things.
and deep learning techniques for IoT security was presented. – Communication channels: Attacks against IoT compo-
In [154], the impact of IoT new features on protection and nents could originate via the communication channels
privacy considering new threats, existing solutions and that link them to one another. Protocols used in IoT sys-
challenges was addressed. In order to construct data-driven tems could have security vulnerabilities that could com-
security systems employing machine and deep learning tech- promise the whole system. IoT systems are vulnerable to
niques, it’s important to understand the nature of data includ- well-known network attacks, such as denial of service
ing various forms of cyber threats and related features. There (DoS) and spoofing, which may cause significant dam-
are several such datasets exist in the area of cybersecurity. age.
Hence, we have summarized as NSL-KDD [139], UNSW- – Applications and software: Vulnerabilities in the web
NB15 [97], DARPA [85, 147], CAIDA [3, 4], ISOT’10 [13, applications and associated software of IoT devices might
14], ISCX’12 [5, 128], CTU-13 [10], CIC-IDS [9], CIC- cause systems to be compromised. Web apps, for exam-
DDoS2019 [6], MAWI [64], ADFA IDS [146], CERT [48, ple, can be used to steal user credentials or to distribute
84], EnronSpam [12], SpamAssassin [17], LingSpam [15], malicious firmware upgrades.
DGA [1, 2, 11, 151], Malware Genome project [155], Virus
Share [18], VirusTotal [19], Comodo [7], Contagio [8], 3.2 Architectures and Security Issues
DREBIN [74], Microsoft [16], Bot-IoT [71]. The machine
and deep learning based model can be built utilizing these Based on the IoT attack surface areas highlighted above,
datasets, according to the problem domain. For instance, a in this section, we summarize the security issues through
neural network based deep learning model is used to build the overall architecture of an IoT system. Several architec-
an intrusion detection model utilizing NSL-KDD dataset tures for IoT have been proposed by different researchers and
13
Mobile Networks and Applications
research groups. Conventional IoT architecture is considered as the sensing layer. These devices or sensors such as
to have three layers, such as the perception layer, the network mechanical, electrical, electronic, or chemical sensors,
layer, and the application layer [91]. However, the support or are connected with the physical world to capture differ-
middleware layer is considered as an important layer later, ent kinds of information according to the particular IoT
according to the needs for data processing and intelligent applications. WSN, RFID, and other types of sensing and
decision making, which lies between the network layer and identifying systems are the key technologies employed in
the application layer. In several cases, the IoT architectures the perception layers [140]. There are four major cyber-
are based on a network layer and a support layer according to security issues: i) wireless signal strength; ii) sensor node
the needs. Furthermore, the concept of cloud computing for exposure in IoT devices; ii) dynamic nature of IoT topol-
the support layer has been included in some studies of IoT ogy; and iv) communication, computation, storage, and
systems. In this paper, we take into account the most popular memory constraints, exist in this layer [87, 98]. To defend
four-layered IoT architecture, such as the perception layer, the IoT network, this layer employs three popular mecha-
the networking, and data communication layer, middleware nisms as node authentication, lightweight encryption and
layer, and the application layer, shown in Fig. 3, while dis- the access control mechanism [87]. Many attacks and
cussing the security threats and attacks in the domain of IoT crimes target the confidentiality of the perception layer
security. that is common in practice. Examples include node cap-
turing, malicious code, fake data injection, replay attacks,
– Security Issues at Perception or Sensing Layer: The per- side-channel attacks, etc. [57]. For example, a node cap-
ception layer is a hardware layer consisting of physical turing attack can cause a node to stop delivering genuine
devices and sensors in different forms, thus also known data, destroying the entire network and even compro-
13
Mobile Networks and Applications
mising the security of the entire IoT application. False ity of all transmitted data should be checked and main-
data or malicious code injection attacks might produce tained [87]. Although the middleware layer is essential
false results and cause the IoT application to malfunction. for delivering a secure and dependable IoT application, it
Eavesdropping, often known as sniffing or snooping, is a is also vulnerable to attacks such as insider attacks, man-
type of attack that uses unsecured network communica- in-the-middle attacks, SQL injection attacks, signature
tions to acquire data in transit between devices. A replay wrapping attacks, cloud malware injection, cloud flood-
attack is defined as spoofing, changing, or repeating the ing attacks, and so on [57, 73]. Internal attackers inten-
identifying information of smart devices in an IoT net- tionally modify and extract data or information within the
work. A time attack occurs when an attacker steals the network in a malicious inside attack [81]. Through a SQL
encryption key associated with time and other critical injection attack, an attacker can include malicious SQL
data [129]. Aside from direct attacks on the nodes, a vari- queries in a program to obtain sensitive data from any
ety of side-channel attacks may result in sensitive data user and even change database records. A virtualization
being leaked. attack occurs when a virtual machine is harmed and its
– Security Issues at Networking and Data Communica- effects spread to other virtual machines. Cloud malware
tions Layer: The main purpose of this layer is to trans- injection allows an attacker to take control of a cloud,
mit the information collected by the perceptual layer, as inject malicious code, or even implant a virtual machine
described above. At this layer, cutting-edge technologies into a cloud. Cloud flooding attacks, which increase the
such as Wi-Fi, LTE, Bluetooth, 3G/4G, ZigBee, and workload on cloud servers, may have a significant impact
others are used to operate cloud computing platforms, on cloud servers.
Internet gateways, switching, and routing devices, among – Application layer: The application layer is responsible
other things [87]. At this layer, the most important cyber- for controlling the overall management of IoT apps that
security issues are confidentiality, privacy, and compat- interact with users in a personalized way. A personal
ibility. At this layer, attackers have a high probability of computer, smartphone, or any smart object or device
evidencing criminal activity through phishing, distrib- that can utilize IoT services via Internet connectivity can
uted denial-of-service (DDoS/DoS), data transit attacks, serve as the interface. In numerous application domains,
routing attacks, identity authentication, and encryption, such as smart homes, smart cities, industrial, building,
among other methods [51, 57]. For example, this layer and health applications, the application layer is depend-
of IoT is extremely vulnerable to phishing attacks, which ent on the information processed in the middleware layer
aim to steal personal data such as credit card and login [69]. Different applications may have different levels of
information or to infect victims’ devices with malware security needs, depending on the application environment
[57]. Access attack, also known as an advanced persistent and the necessity. As an example, the security method
threat, occurs when an unauthorized individual or adver- used in online banking should be more secure than the
sary gains access to the IoT network because IoT apps are one used in exchanging climate change forecast infor-
constantly receiving and transferring valuable data. The mation. Many security issues must be addressed at the
most prevalent and destructive attacks on a network are application layer, including access control attacks, mali-
denial of service (DoS) and distributed denial of service cious code attacks, sniffing attacks, reprogram attacks,
(DDoS) attacks, which cause network resources to be data breaches, service interruption attacks, application
exhausted and service to be unavailable. Furthermore, vulnerabilities, and software bugs, to name a few exam-
attackers may use routing attacks like sinkhole attacks, ples [57, 75]. In the application layer, malicious data is
wormhole attacks, and others to reroute routing paths transferred and exchanged amongst smart devices at the
during data transmission. application layer. Practitioners and academics have major
– Security Issues at Middleware or Support Layer: It’s a issues in protecting data privacy and security as well as
layer of software that exists between the network and the identifying things. The attacker injects malware into the
application. As a result, this layer is usually in charge system via the use of viruses, worms, Trojan horses, and
of IoT device service management, as well as data pro- spyware to deny service, manipulate data, and/or gain
cessing and intelligent operations on data with decision- access to confidential data [149]. Service interruption
making. It can be seen as a dependable support platform, attacks, often known as DDoS attacks, prevent genuine
similar to the cloud [50], that makes this layer in the consumers from using IoT applications by intentionally
IoT system easier to use. In several cases, the more dis- making servers or networks too busy to respond. Attack-
tributed fog computing technologies have been used to ers may use sniffer programs to monitor network traffic
replace the centralized cloud environment, resulting in in IoT applications to get access to confidential user data.
improved performance and faster response times [35]. An attacker might quickly destroy a system in an unau-
At this level, the authenticity, integrity, and confidential- thorized access attack by restricting access to IoT-related
13
Mobile Networks and Applications
services or destroying existing data [87]. Furthermore, be used to uncover relevant security incident trends in IoT
attackers may attempt to remotely reprogram IoT devices, data, as well as recognize and predict behavior [42]. As a
which might result in the IoT system being hacked. result, in an IoT context, both machine learning and deep
learning can operate in dynamic IoT networks without the
As discussed above, several security threats and attacks requirement for human or user intervention. The potential
might happen in each layer of an IoT system. In addition, role of machine learning and deep learning techniques in
Zero-day attack [27, 33, 126] that is used to refer to the developing a data-driven model for IoT security intelligence
threat posed by an unknown security [95, 127], are consid- is shown in Fig. 4. Several machine learning methods can be
ered as the serious potential security threats. Thus, an in- used to learn from IoT security data, including classification
depth analysis of detecting these cyber-attacks is important, and regression analysis, clustering, rule-based methods, fea-
where the knowledge of artificial intelligence, particularly, ture optimization methods [114], and deep learning methods
machine learning methods as well as deep learning archi- based on artificial neural networks, such as the multi-layer
tectures or techniques can be considered as a good solution perceptron network, convolutional network, recurrent net-
in securing the system from such anomalies in the domain work, etc. [112, 113]. Thus, in the following section, we will
of IoT security. discuss how different machine and deep learning methods
can be applied to security solutions in the context of IoT.
13
Mobile Networks and Applications
value, such as the impact of attacks. Several popular classifi- discovery of hidden patterns and structures in data, allow-
cation techniques, such as k-nearest neighbors [22], support ing for the detection of abnormalities or attacks in IoT. Parti-
vector machines [67], navies Bayes [65], adaptive boost- tion, Hierarchy, Fuzzy Theory, Distribution, Density, Graph
ing [46], and logistic regression [78], decision tree [105], Theory, Grid, Fractal Theory, and other perspectives can be
IntrudTree [115], BehavDT [117], ensemble learning such used to cluster data. [148]. K-means [90], K-medoids [107],
as random forests [37], exist that can categorize security single linkage [131], complete linkage [132], agglomera-
incidents in order to address different IoT security issues, tive clustering, bottom-up BOTS [118], DBSCAN, OPTICS,
including intrusion or attack detection, malware analysis, Gaussian Mixture Model [148], are the popular concepts of
and anomaly or fraud detection in IoT. clustering algorithms. These clustering techniques can be
For instance, the support vector machine classification used to solve various IoT security problems. For instance,
technique is used in profiling abnormal behavior of IoT the k-Means algorithm is used in profiling the abnormal
devices [80], and for detecting android malware for reli- behavior of IoT devices [80]. A dynamic threshold-based
able IoT services [53]. Random forest technique is used to approach can be used to detect the outlier or noisy instances
detect anomalies [39, 103], denial of service attack [41], IoT in data [110]. A fuzzy clustering approach is used in IoT
intrusion detection service [96, 106], smart city anomaly intrusion detection [86]. To analyze system log data for
detection [28] etc. Similarly, a naive Bayes based classifica- cybersecurity applications clustering approaches are use-
tion model is used to detect anomalies [135], and a logistic ful to extract useful insights or knowledge [77]. Thus, by
regression-based method to detect malicious IoT botnets [31, uncovering hidden patterns and structures in IoT security
104]. On the other hand, a regression model is useful for data, the clustering techniques can play a significant role
predicting attacks quantitatively or to predict the impact of through measuring the behavioral similarity or dissimilarity,
an attack, such as worms, viruses, or other malicious soft- to solve various security problems, such as outlier detection,
ware [62]. Similarly, a quantitative security model, e.g., anomaly detection, signature extraction, fraud detection,
phishing in a certain period or network packet parameters, cyber-attack detection, etc. in the domain of IoT.
regression techniques could be useful [122]. Several popular
regression techniques such as Linear, Logistic, Polynomial, 4.3 Rule‑based Techniques
Ridge, Lasso, regression trees, Principal components, Elas-
ticNet, Poisson, Negative binomial, Stepwise, Partial least A rule-based system extracting rules from data, can mimic
squares regression [144] etc. exist that can be used to build human intelligence, which is a system that applies rules to
the quantitative security model according to their work- make an intelligent decision [111]. Thus, rule-based systems
ing principle in machine learning. For instance, the linear can play a significant role in IoT security through learning
regression-based model is used to identify the cyber attack security or policy rules from data [119]. Association rule
origin [76], and multiple regression analysis is used for cor- learning is a prominent method of discovering associations
relating human traits and cybersecurity behavior intentions or rules among a set of available attributes in a security data-
[49]. Similarly, regression regularization methods such as set in the field of machine learning [20]. Several types of
Lasso, Ridge, or ElasticNet, can enhance security attacks association rules have been proposed in the area, such as fre-
analysis to get a better outcome considering the high dimen- quent pattern based [21, 60, 88], tree-based [55], logic-based
sionality of IoT security data [52]. [44], fuzzy-rules [138], belief rule [156] etc. The rule learn-
Thus, we can conclude that the classification techniques ing techniques such as AIS [20], Apriori [21], Apriori-TID
can be used to build the prediction and classification model and Apriori-Hybrid [21], FP-Tree [55], Eclat [152], RARM
[123] utilizing the relevant data in the domain of IoT secu- [40] exist that can be used to solve IoT security problems
rity, while the regression technique is mainly the impact of and intelligent decision making. For instance, an association
the model [62] through determining the predictor strength, rule-mining algorithm-based network intrusion detection has
time-series causes, or the effect of the relations, considering been presented in [125]. Moreover, fuzzy association rules
the security attributes and the outcome. are used to build a rule-based intrusion detection system
[138]. To analyze IoT malware activities, an FP-tree associa-
4.2 Clustering Techniques tion rule-based study has been conducted in [100].
Although a rule-based approach is easy to adopt, it has
In machine learning, clustering is another popular task for high time complexity because of generating a huge num-
analyzing IoT security data, which is considered unsuper- ber of associations or frequent patterns depending on the
vised learning. It can cluster or create groups of a set of support and confidence values, and consequently, make the
data points based on the measurement for similarity and dis- model complex [21, 137]. An effective association model
similarity in the security data generated by IoT devices from could minimize this issue. For instance, in our earlier paper,
diverse sources. Thus, clustering could contribute to the Sarker et al. [121], we present a rule learning approach that
13
Mobile Networks and Applications
effectively discovers the association rules that are non- as input, hidden, and output layers, into a single network
redundant and reliable, and thus could play a significant role [54]. Thus deep learning techniques are also capable to learn
in the domain of IoT security as well. The rules can also be from IoT security data through these layers, and known as
used to build knowledge-based systems or rule-based expert hierarchical learning methods because of their knowledge
systems [120] to solve more complex security problems in capturing nature in deep architecture. Deep learning out-
IoT. Each of these systems consists of a set of policy rules to performs typical machine learning algorithms in a variety
define the scope of what kind of activities should be allowed of situations, especially when learning from huge security
on a network, where each rule is either explicitly allow or datasets. Several IoT-based devices and their applications
deny. Even new zero-day attacks are blocked that utilize or systems produce a large amount of security data in the
rule-driven controls or filters security policy monitoring. IoT environment; consequently, depending on the datasets,
DL approaches may deliver better results. Depending on the
4.4 Security Feature Optimization and Principal characteristics and nature of the security data, different deep
Component Analysis learning architectures such as Multi-layer perceptron (MLP),
convolutional neural networks (CNN), recurrent neural net-
For an effective IoT security system based on the machine works (RNN), deep belief networks (DBN), or hybrid net-
learning approach, security feature engineering and opti- works can be used to build IoT security modeling [113, 147],
mization are considered key issues in IoT cyber threat as discussed below.
landscape. The reason is that the security features and cor-
responding IoT data directly influence the machine learning- – Multilayer perceptron (MLP): A multilayer perceptron
based security models and thus a data dimensionality reduc- (MLP), often known as a feedforward artificial neural
tion technique is important [102]. Feature engineering is the network, is the fundamental building block of deep learn-
general term used to construct and modify security attributes ing algorithms. A typical MLP comprises an input layer,
or variables to effectively develop machine learning-based one or more hidden layers of an output layer, and one or
security models [114]. As today’s IoT security datasets may more output layers. Each node in one layer is linked to
include features that are less relevant or not at all impor- a certain weight in the next layer via a chain of connec-
tant, effectively modeling cyber attacks or abnormalities is tions. The weight values are updated internally by MLP
challenging. A security model with these qualities can lead as the model is being developed via the backpropagation
to several issues, including excessive variance, overfitting, process. Such MLP network is used to build an intrusion
high computing cost and model preparation, and a lack of detection model utilizing NSL-KDD dataset [45], mal-
generalization, all of which can degrade prediction accuracy ware analysis [66], to generate explanation in IoT envi-
[115]. Thus an optimal number of security features selection ronments [47], detecting malicious botnet traffic from IoT
based on their impact or importance [115] could minimize devices [63]. To perform a security threat analysis of the
such issues while building an IoT security model with high IoT, MLP based network is used in [59], where the model
dimensional data sets. Several approaches such as wrapper classifies the network data as normal or as under attack.
methods such as recursive feature elimination, forward fea- – Convolutional neural networks (CNN): The CNN [79]
ture selection; filter methods such as Pearson correlation, improves on the traditional ANN design, which includes
chi-squared test, analysis of variance test; or embedded convolutional layers, pooling layers, and fully connected
methods such as regularization, Lasso, Ridge, or ElasticNet, layers. Each of these levels takes into account optimized
tree-based feature importance [114] can be used. Along with parameters, reducing the complexity. CNN also employs
feature selection, principal component analysis (PCA) [114] a dropout to address the problem of overfitting, which
is utilized to generate new brand components that capture can occur in the MLP network. It is commonly utilized
the majority of the relevant information. While developing a in numerous areas such as natural language processing,
machine learning-based security modeling, these new brand audio analysis, picture processing, and other autocor-
components may help handle large dimensions of IoT secu- related data in recent years because it takes advantage
rity data, such as IoT network traffic anomaly detection [58]. of the two-dimensional (2D) structure of the input data.
CNN may also be used in the area of Internet of Things
4.5 Deep Neural Network Learning‑based (IoT) security. Using a CNN-based deep learning model
Approaches for intrusion detection, such as denial-of-service (DoS)
attacks [134], to detect malware [150], android mal-
Deep learning (DL) is a subset of machine learning that ware detection [92]. Furthermore, an intrusion detection
developed from the Artificial Neural Network (ANN), model based on multi-CNN fusion may be utilized [83].
which offers a computational architecture for learning In the IoT environment, some innovative CNN-based
from data by combining multiple processing levels, such deep learning models with lightweight architecture could
13
Mobile Networks and Applications
reduce computations and provide higher performance for detecting IoT attacks, such as malware detection [150],
with constrained resources. phishing, and Botnet attack detection and mitigation across
– Recurrent neural network (RNN): A recurrent neural multiple IoT devices [101]. Other deep learning models,
network (RNN) is another kind of ANN in which the such as a deep belief network (DBN) based security model,
connections between nodes form a directed graph along may be used to IoT security[30, 108]. In our earlier paper
a temporal sequence. The RNN model, which is derived Sarker et al. [113], we have explored different types of deep
from feedforward neural networks, can process variable- learning techniques with their taxonomy dividing into dis-
length sequences of inputs by using their internal state, criminative for supervised tasks, generative for unsupervised
or memory. It is possible to use the RNN model for IoT tasks, and hybrid techniques that can be used according to
security, as well as natural language processing and voice the data characteristics. In Table 1, we have summarized how
recognition, because of its capacity to effectively handle various machine learning methods including deep learning
sequential data. Internet of Things (IoT) devices produce are used to solve various security issues in the domain of
a significant quantity of sequential data from several IoT. Thus, we can infer that the above-mentioned machine or
sources, such as network traffic flows, time-dependent deep learning techniques, as well as their variants or modi-
data, and so on. When the behavior patterns of the threat fied lightweight approaches, can play a significant role in
are time-dependent, using recurrent connections can help data-driven security analytics in the IoT environment.
neural networks detect security concerns. The reason for
this is that it contains a characteristic called Long Short
Term Memory (LSTM) that allows it to retain prior 5 Research Issues and Directions
inputs, making it a particularly helpful model for time
series prediction. Such an LSTM model-based recurrent Our study on the machine and deep learning-based security
network can be used for several purposes in the domain solutions raises concerns in the area of IoT security. As a
of security, such as intrusion detection [70], to detect and consequence, in this section, we describe and analyze the
classify the malicious apps [142] etc. challenges that have been encountered, as well as possible
research possibilities and future directions for securing IoT
In addition to these deep learning models, hybrid network networks and systems.
models, such as the ensemble of classifiers, LSTM net- The effectiveness and efficiency of a machine learning
work with the combination of CNN, can also be applied or deep learning-based IoT security solution are primarily
13
Mobile Networks and Applications
determined by the nature and features of the data, as well – Because of the huge amount of redundant processing,
as the learning algorithms’ performance. There are a vari- the classical learning techniques outlined in Section 4
ety of machine and deep learning techniques available to may not be directly applicable to IoT devices in various
evaluate data and extract insights, as detailed in Section 4. circumstances. The association rule learning technique
As a result, choosing an appropriate learning algorithm [21], for example, in a rule-based system may extract
for the intended application in IoT security can be chal- redundant generation from IoT security data, making the
lenging. The reason behind this is that based on the data decision-making process complex and ineffective [121].
qualities, the results of different learning algorithms may As a result, a better understanding of the benefits and
vary [114, 123]. If the wrong learning algorithm is chosen, limitations of existing learning methods is required, mak-
unexpected results may occur, resulting in a loss of effort ing the development of new lightweight algorithms or
as well as the model’s efficacy and accuracy. In the same methods for IoT devices a challenging task.
way, unnecessary IoT security data might result in garbage – Compared to older patterns, a recent malicious behav-
processing and inaccurate outcomes. If the IoT data is bad, ioral trend is more likely to be intriguing and signifi-
such as non-representative, poor-quality, irrelevant attrib- cant for forecasting or detecting attacks in IoT security.
utes, or an inadequate quantity for training, machine or As a result, rather than considering conventional data
deep learning security models may become worthless or analysis, the idea of recency analysis, i.e. current pattern-
yield reduced accuracy, or they may even become worth- based extracted insight or knowledge [116], may be more
less. Future research opportunities and directions in the appropriate in a variety of situations. Thus another dif-
topic of IoT security include the following: ficult challenge is to propose new lightweight solutions
for IoT devices that take into consideration current data
– In the world of IoT, gathering security data is not easy. patterns, and eventually to construct a recency-based IoT
The dynamic characteristics of IoT, such as heterogene- security model.
ity, covered briefly in Section 2, allows for the generation
of massive amounts of data at a high frequency from In the above, within the scope of our learning-based study
various domains. Collecting security data in the IoT is in the area of IoT security, we have reviewed and explored
not a straightforward endeavor. For further analysis, it several research directions. Besides, incorporating context-
is critical to gather and manage relevant IoT-generated aware computing in IoT security could be another potential
data for target applications, such as security in smart research direction. In the context of IoT computing, con-
city applications, to facilitate further investigation. As text-awareness typically refers to the capability of a system
a result, while working with IoT-generated data, a more to gather its surrounding information and adapt behaviors
in-depth analysis of data gathering methods is required. accordingly. A wider sense of security contextual knowledge
– Many ambiguous values, missing values, outliers, and [109, 120] can then be used to assess whether a suspicious
erroneous data may be discovered in historical or raw behavior occurs or not, such as temporal, spatial, individu-
IoT security data. The machine learning or deep learn- ality, dependence, activity, or relationship between events
ing methods presented in Section 4 in IoT security have or interactions, etc. An approach might allow an end-user,
a significant impact on data quality and training avail- for example, to browse the network from within the office,
ability, and hence on the IoT security model. As a result, but refuse access if the end-user tries to connect to public
cleaning and preprocessing the various security data Wi-Fi. The design of adaptive security solutions based on
generated in an IoT environment is a challenging task. the principle of context-aware computing may therefore be
To effectively apply learning algorithms in the domain another research problem in the IoT security area.
of IoT security, improvement of current methods or the
development of new data preparation techniques are
expected. 6 Conclusion
– It is critical for an effective IoT security solution to
consider the constraints or capabilities of IoT devices In this paper, we have presented a comprehensive overview
and systems where learning-based security models are of the literature on IoT security intelligence, which covers
utilized, as addressed briefly in Section 4. As a conse- the IoT paradigm, IoT-based smart environments, related
quence, there should be a trade-off between security and security concerns with machine learning solutions. We have
device capabilities in terms of data storage, computing, also reviewed the recent studies for IoT security to make
data processing, and decision-making, and communica- the position of this paper. A thorough study on the IoT sys-
tion resources. Therefore, an in-depth investigation is tem architectures with its layer-wise cyber-attacks that are
required to discover the most appropriate machine or needed to detect and protect the IoT devices and systems.
deep learning methods. As a consequence, we have briefly explored how various
13
Mobile Networks and Applications
types of machine and deep learning approaches might be 12. Enronspam. Available online: https://labs-repos.iit.demokritos.
employed for security solutions in the IoT context. Depend- gr/skel/i-config/downloads/enron-spam/. Accessed 20 Oct 2019
13. The honeynet project. http://w ww.h oneyn et.o rg/chapte rs/
ing on the data characteristics, a successful IoT security france/. Accessed 20 Oct 2019
model should have the appropriate machine or deep learning 14. Isot botnet dataset. https://www.uvic.ca/engineering/ece/isot/
modeling. Before the system can assist in making intelligent datasets/index.php/. Accessed 20 Oct 2019
decisions, an effective learning algorithm must be developed 15. Lingspam. Available online: https://labs-repos.iit.demokr itos.
gr/skel/i-config/downloads/lingspampublic.t ar.gz/. Accessed
using the obtained IoT security knowledge connected with 20 Oct 2019
the target application. 16. Microsoft malware classification (big 2015). Available online:
Finally, we have discussed and addressed the issues that arXiv:1802.10135. Accessed 20 Oct 2019
have arisen, as well as potential research directions and 17. Spamassassin. Available online: http://www.spamassassin.org/
publiccorpus/. Accessed 20 Oct 2019
future approaches that are based on learning techniques. As 18. Virusshare. Available online: http://virusshare.com/. Accessed
a result, the challenges that have been highlighted present 20 Oct 2019
promising research possibilities in the field, which must be 19. Virustotal. Available online: https://virustotal.com/. Accessed
addressed with effective solutions to enhance IoT security 20 Oct 2019
20. Agrawal R, Imieliński T, Swami A (1993) Mining association
over time. Overall, we believe that our study on machine and rules between sets of items in large databases. In: ACM SIG-
deep learning-based security solutions points in the direction MOD record, vol 22. ACM, pp 207–216
of a promising path and can be used as a reference guide for 21. Agrawal R, Srikant R, et al. (1994) Fast algorithms for mining
future IoT security research and implementations by aca- association rules. In: Proc. 20th int. conf. very large data bases,
VLDB, vol 1215. pp 487–499
demic and industry experts. 22. Aha DW, Kibler D, Albert MK (1991) Instance-based learning
algorithms. Machine Learning 6(1):37–66
Acknowledgements This Project was funded by the Deanship of Scien- 23. Ahmed E, Yaqoob I, Gani A, Imran M, Guizani M (2016)
tific Research (DSR), King Abdulaziz University, Jeddah, under Grant Internet-of-things-based smart environments: state of the art,
D-059-611-1443. The authors, therefore, gratefully acknowledge DSR taxonomy, and open research challenges. IEEE Wireless Com-
technical and financial support. munications 23(5):10–16
24. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash
Declarations M (2015) Internet of things: A survey on enabling technolo-
gies, protocols, and applications. IEEE Communications Sur-
veys & Tutorials 17(4):2347–2376
Competing interests The authors declare that they have no competing 25. Al-Garadi MA, Mohamed A, Al-Ali A, Du X, Ali I, Guizani
interests. M (2020) A survey of machine and deep learning methods for
internet of things (IoT) security. IEEE Commun Surv Tutorials
26. Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet
of things security: A survey. Journal of Network and Computer
Applications 88:10–28
References 27. Alazab M, Venkatraman S, Watters P, Alazab M, et al (2010)
Zero-day malware detection based on supervised learning algo-
1. Alexa top sites. Available online: https://aws.amazon.com/alexa- rithms of api call signatures
top-sites/. Accessed 20 Oct 2019 28. Alrashdi I, Alqazzaz A, Aloufi E, Alharthi R, Zohdy M, Ming
2. Bambenek consulting-master feeds. Available online: http://osint. H (2019) Ad-iot: Anomaly detection of iot cyberattacks in
bambenekconsulting.com/feeds/. Accessed 20 Oct 2019 smart city using machine learning. In: 2019 IEEE 9th annual
3. Caida anonymized internet traces 2008 dataset. https://www. computing and communication workshop and conference
caida.org/datapassive/passive-2008-dataset.xml/. Accessed 20 (CCWC). IEEE, pp 0305–0310
Oct 2019 29. Atzori L, Iera A, Morabito G (2010) The internet of things: A
4. Caida ddos attack 2007 dataset. http://www.caida.org/data/ pas- survey. Computer networks 54(15):2787–2805
sive/ddos-20070804-dataset.xml/. Accessed 20 Oct 2019 30. Balakrishnan N, Rajendran A, Pelusi D, Ponnusamy V (2019)
5. Canadian institute of cybersecurity, university of new brun- Deep belief network enhanced intrusion detection system to
swick, iscx dataset. http://www.unb.ca/cic/datasets/index.html/. prevent security breach in the internet of things. Internet of
Accessed 20 Oct 2019 Things:100112
6. Cic-ddos2019 [online]. Available: https://www.unb.ca/cic/data- 31. Bapat R, Mandya A, Liu X, Abraham B, Brown DE, Kang H,
sets/ddos-2019.html/. Accessed 28 March 2020 Veeraraghavan M (2018) Identifying malicious botnet traffic
7. Comodo. Available online: https://www.comodo.com/home/ using logistic regression. In: 2018 systems and information
internet-security/updates/vdp/database.php. Accessed 20 Oct engineering design symposium (SIEDS). IEEE, pp 266–271
2019 32. Bélissent J et al (2010) Getting clever about smart cities: New
8. Contagio. Available online: http://contagiodump.blogspot.com/. opportunities require new business models. Cambridge, Mas-
Accessed 20 Oct 2019 sachusetts, USA 193:244–77
9. Cse-cic-ids2018 [online]. Available: https://www.unb.ca/cic/ 33. Bilge L, Dumitraş T (2012) Before we knew it: an empirical
datasets/ids-2018.html/. Accessed 20 Oct 2019 study of zero-day attacks in the real world. In: Proceedings of
10. The ctu-13 dataset. Available online: https://stratosphereips.org/ the 2012 ACM conference on Computer and communications
category/datasets-ctu13. Accessed 20 Oct 2019 security. ACM, pp 833–844
11. Dgarchive. Available online: https://dgarchive.caad.fkie.fraun
hofer.de/site/. Accessed 20 Oct 2019
13
Mobile Networks and Applications
34. Bolic M, Rostamian M, Djuric PM (2015) Proximity detection 55. Han J, Pei J, Yin Y (2000) Mining frequent patterns without
with rfid: A step toward the internet of things. IEEE Pervasive candidate generation. In: ACM sigmod record, vol 29. ACM, pp
Computing 14(2):70–76 1–12
35. Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog comput- 56. Hassan WH et al (2019) Current research on internet of things
ing: A platform for internet of things and analytics. In: Big (IoT) security: A survey. Computer Networks 148:283–294
data and internet of things: A roadmap for smart environments. 57. Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B
Springer, pp 169–186 (2019) A survey on IoT security: application areas, security
36. Bradley J, Loucks J, Macaulay J, Noronha A (2013) Internet threats, and solution architectures. IEEE Access 7:82721–82743
of everything (ioe) value index. White Paper CISCO and/or its 58. Hoang DH, Nguyen HD (2018) A PCA-based method for IoT
affiliates network traffic anomaly detection. In: 2018 20th international
37. Breiman L (2001) Random forests. Machine Learning conference on advanced communication technology (ICACT).
45(1):5–32 IEEE, pp 381–386
38. Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P 59. Hodo E, Bellekens X, Hamilton A, Dubouilh P-L, Iorkyase E,
(2019) Network intrusion detection for IoT security based on Tachtatzis C, Atkinson R (2016) Threat analysis of iot networks
learning techniques. IEEE Communications Surveys & Tutorials using artificial neural network intrusion detection system. In:
21(3):2671–2701 2016 international symposium on networks, computers and com-
39. Chang Y, Li W, Yang Z (2017) Network intrusion detection based munications (ISNCC). IEEE, pp 1–6
on random forest and support vector machine. In: 2017 IEEE 60. Houtsma M, Swami A (1995) Set-oriented mining for associa-
international conference on computational science and engineer- tion rules in relational databases. In: Proceedings of the eleventh
ing (CSE) and IEEE international conference on embedded and international conference on data engineering, 1995. IEEE, pp
ubiquitous computing (EUC), vol 1. IEEE, pp 635–638 25–33
40. Das A, Ng W-K, Woon Y-K (2001) Rapid association rule min- 61. Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine
ing. In: Proceedings of the tenth international conference on learning in IoT security: current solutions and future challenges.
Information and knowledge management. ACM, pp 474–481 IEEE Commun Surv Tutorials
41. Doshi R, Apthorpe N, Feamster N (2018) Machine learning ddos 62. Jaganathan V, Cherurveettil P, Sivashanmugam PM (2015) Using
detection for consumer internet of things devices. In: 2018 IEEE a prediction model to manage cyber security threats. The Scien-
security and privacy workshops (SPW). IEEE, pp 29–35 tific World Journal, 2015
42. Dua S, Du X (2016) Data mining and machine learning in cyber- 63. Javed Y, Rajabi N (2019) Multi-layer perceptron artificial neural
security. CRC Press, Boca Raton network based IoT botnet traffic classification. In: Proceedings of
43. Elrawy MF, Awad AI, Hamed HFA (2018) Intrusion detection the future technologies conference. Springer, pp 973–984
systems for iot-based smart environments: a survey. Journal of 64. Jing X, Yan Z, Jiang X, Pedrycz W (2019) Network traffic fusion
Cloud Computing 7(1):21 and analysis against ddos flooding attacks with a novel reversible
44. Flach PA, Lachiche N (2001) Confirmation-guided discovery of sketch. Information Fusion 51:100–113
first-order rules with tertius. Machine Learning 42(1–2):61–95 65. John GH, Langley P (1995) Estimating continuous distributions
45. De Almeida Florencio F, Moreno ED, Macedo HT, Salgueiro in bayesian classifiers. In: Proceedings of the Eleventh confer-
RJ, Do Nascimento FB, Santos FA (2018) Intrusion detection via ence on Uncertainty in artificial intelligence. Morgan Kaufmann
mlp neural network using an arduino embedded system. In: 2018 Publishers Inc., pp 338–345
VIII Brazilian symposium on computing systems engineering 66. Karbab EB, Debbabi M, Derhab A, Mouheb D (2018) Maldozer:
(SBESC). IEEE, pp 190–195 Automatic framework for android malware detection using deep
46. Freund Y, Schapire RE, et al (1996) Experiments with a new learning. Digital Investigation 24:S48–S59
boosting algorithm. In: ICML, vol 96. Citeseer, pp 148–156 67. Keerthi SS, Shevade SK, Bhattacharyya C, Murthy KRK (2001)
47. García-Magariño I, Muttukrishnan R, Lloret J (2019) Human- Improvements to platt’s smo algorithm for svm classifier design.
centric AI for trustworthy IoT systems with explainable multi- Neural Computation 13(3):637–649
layer perceptrons. IEEE Access 7:125562–125574 68. Khan MA, Salah K (2018) Iot security: Review, blockchain solu-
48. Glasser J, Lindauer B (2013) Bridging the gap: A pragmatic tions, and open challenges. Future Generation Computer Systems
approach to generating insider threat data. In: 2013 IEEE secu- 82:395–411
rity and privacy workshops. IEEE, pp 98–104 69. Khan R, Khan S, Zaheer R, Khan S (2012) Future internet: The
49. Gratian M, Bandi S, Cukier M, Dykstra J, Ginther A (2018) internet of things architecture, possible applications and key
Correlating human traits and cyber security behavior intentions. challenges. In: 2012 10th international conference on frontiers
Computers & Security 73:345–358 of information technology. IEEE, Islamabad, pp 257–260
50. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of 70. Kim J, Kim J, Thu HLT, Kim H (2016) Long short term memory
things (IoT): A vision, architectural elements, and future direc- recurrent neural network classifier for intrusion detection. In:
tions. Future Generation Computer Systems 29(7):1645–1660 2016 international conference on platform technology and ser-
51. Gupta BB, Tewari A, Jain AK, Agrawal DP (2017) Fighting vice (PlatCon). IEEE, pp 1–5
against phishing attacks: state of the art and future challenges. 71. Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019)
Neural Computing and Applications 28(12):3629–3654 Towards the development of realistic botnet dataset in the inter-
52. Hagos DH, Yazidi A, Kure Ø, Engelstad PE (2017) Enhanc- net of things for network forensic analytics: Bot-iot dataset.
ing security attacks analysis using regularized machine learn- Future Generation Computer Systems 100:779–796
ing techniques. In: 2017 IEEE 31st international conference on 72. Krčo S, Pokrić B, Carrez F (2014) Designing IoT architecture (s):
advanced information networking and applications (AINA). A european perspective. In: 2014 IEEE World forum on internet
IEEE, pp 909–918 of things (WF-IoT). IEEE, pp 79–84
53. Ham H-S, Kim H-H, Kim M-S, Choi M-J (2014) Linear svm- 73. Kügler D (2003) “man in the middle” attacks on bluetooth. In:
based android malware detection for reliable IOT services. J International conference on financial cryptography. Springer, pp
Appl Math:2014 149–161
54. Han J, Pei J, Kamber M (2011) Data mining: concepts and tech- 74. Kumar R, Xiaosong Z, Khan RU, Kumar J, Ahad I (2018)
niques. Elsevier, New York Effective and explainable detection of android malware based
13
Mobile Networks and Applications
on machine learning algorithms. In: Proceedings of the 2018 Deep android malware detection. In: Proceedings of the seventh
international conference on computing and artificial intelligence. ACM on conference on data and application security and privacy.
ACM, pp 35–40 pp 301–308
75. Kumar SA, Vealey T, Srivastava H (2016) Security in internet of 93. Minerva R, Biru A, Rotondi D (2015) Towards a definition of the
things: Challenges, solutions and future directions. In: 2016 49th internet of things (IoT). IEEE Internet Initiative 1(1):1–86
Hawaii international conference on system sciences (HICSS). 94. Minoli D, Occhiogrosso B (2018) Blockchain mechanisms for
IEEE, pp 5772–5781 IoT security. Internet of Things 1:1–13
76. Lalou M, Kheddouci H, Hariri S (2017) Identifying the cyber 95. Moganedi S (2018) Undetectable data breach in iot: Healthcare
attack origin with partial observation: a linear regression based data at risk. In: ECCWS 2018 17th european conference on cyber
approach. In: 2017 IEEE 2nd international workshops on foun- warfare and security V2. Academic Conferences and publishing
dations and applications of self* systems (FAS* W). IEEE, pp limited, p 296
329–333 96. Mohamed T, Otsuka T, Ito T (2018) Towards machine learning
77. Landauer M, Skopik F, Wurzenberger M, Rauber A (2020) Sys- based iot intrusion detection service. In: International conference
tem log clustering approaches for cyber security applications: A on industrial, engineering and other applications of applied intel-
survey. Computers & Security 92:101739 ligent systems. Springer, pp 580–585
78. Le Cessie S, Van Houwelingen JC (1992) Ridge estimators in 97. Moustafa N. Slay J (2015) Unsw-nb15: a comprehensive data set
logistic regression. Journal of the Royal Statistical Society: for network intrusion detection systems (unsw-nb15 network data
Series C (Applied Statistics) 41(1):191–201 set). In: 2015 military communications and information systems
79. LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based conference (MilCIS). IEEE, pp 1–6
learning applied to document recognition. Proceedings of the 98. Muhammad F, Anjum W, Mazhar KS (2015) A critical analysis
IEEE 86(11):2278–2324 on the security concerns of internet of things (IoT). International
80. Lee S-Y, Wi S-R, Seo E, Jung J-K, Chung T-M (2017) Profiot: Journal of Computer Applications 111(7):1–6
Abnormal behavior profiling (abp) of IoT devices based on a 99. Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani
machine learning approach. In: 2017 27th international telecom- N (2019) Demystifying IoT security: an exhaustive survey on
munication networks and applications conference (ITNAC). IoT vulnerabilities and a first empirical look on internet-scale
IEEE, pp 1–6 IoT exploitations. IEEE Communications Surveys & Tutorials
81. Li S, Da Xu L (2017) Securing the internet of things. Syngress 21(3):2702–2733
82. Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. 100. Ozawa S, Ban T, Hashimoto N, Nakazato J, Shimamura J (2020)
Information Systems Frontiers 17(2):243–259 A study of IoT malware activities using association rule learn-
83. Li Y, Xu Y, Liu Z, Hou H, Zheng Y, Xin Y, Zhao Y, Cui L (2020) ing for darknet sensor data. International Journal of Information
Robust detection for network intrusion of industrial IoT based on Security 19(1):83–92
multi-CNN fusion. Measurement 154:107450 101. La Torre Parra GD, Rad P, Choo K-KR, Beebe N (2020) Detect-
84. Lindauer B, Glasser J, Rosen M, Wallnau KC, ExactData L ing internet of things attacks using distributed deep learning. J
(2014) Generating test data for insider threat detectors. JoWUA Netw Comput Appl:102662
5(2):80–94 102. Pour MS, Bou-Harb E, Varma K, Neshenko N, Pados DA, Choo
85. Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall KR, K-KR (2019) Comprehending the IoT cyber threat landscape: A
McClung D, Weber D, Webster SE, Wyschogrod D, Cunningham data dimensionality reduction technique to infer and character-
RK, et al. (2000) Evaluating intrusion detection systems: The ize internet-scale IoT probing campaigns. Digital Investigation
1998 darpa off-line intrusion detection evaluation. In: Proceed- 28:S40–S49
ings DARPA information survivability conference and exposi- 103. Primartha R, Tama BA (2017) Anomaly detection using random
tion. DISCEX’00, vol 2. IEEE, pp 12–26 forest: A performance revisited. In: 2017 International confer-
86. Liu L, Xu B, Zhang X, Wu X (2018) An intrusion detection ence on data and software engineering (ICoDSE). IEEE, pp 1–6
method for internet of things based on suppressed fuzzy cluster- 104. Prokofiev AO, Smirnova YS, Surov VA (2018) A method to
ing. EURASIP Journal on Wireless Communications and Net- detect internet of things botnets. In: 2018 IEEE conference of
working 2018(1):113 russian young researchers in electrical and electronic engineering
87. Lu Y, Da Xu L (2018) Internet of things (IoT) cybersecurity (EIConRus). IEEE, pp 105–108
research: A review of current research topics. IEEE Internet of 105. Quinlan JR (1993) C4.5: Programs for machine learning. Mach
Things Journal 6(2):2103–2115 Learn
88. Liu B, Hsu W, Ma Y (1998) Integrating classification and asso- 106. Resende PAA, Drummond AC (2018) A survey of random forest
ciation rule mining. In: Proceedings of the fourth international based methods for intrusion detection systems. ACM Computing
conference on knowledge discovery and data mining Surveys (CSUR) 51(3):1–36
89. Ma Z, Xiao M, Xiao Y, Pang Z, Poor HV, Vucetic B (2019) High- 107. Rokach L (2010) A survey of clustering algorithms. In: Data min-
reliability and low-latency wireless communication for internet ing and knowledge discovery handbook. Springer, pp 269–298
of things: challenges, fundamentals, and enabling technologies. 108. Saeed A, Ahmadinia A, Javed A, Larijani H (2016) Intelligent
IEEE Internet of Things Journal 6(5):7946–7970 intrusion detection in low-power IoTs. ACM Transactions on
90. MacQueen J (1967) Some methods for classification and analysis Internet Technology (TOIT) 16(4):1–25
of multivariate observations. In: Fifth Berkeley symposium on 109. Sarker IH (2019) Context-aware rule learning from smartphone
mathematical statistics and probability, vol 1 data: survey, challenges and future directions. Journal of Big
91. Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2015) Internet Data 6(1):95
of things (IoT) security: Current status, challenges and prospec- 110. Sarker IH (2019) A machine learning based robust predic-
tive measures. In: 2015 10th international conference for inter- tion model for real-life mobile phone data. Internet of Things
net technology and secured transactions (ICITST). IEEE, pp 5:180–193
336–341 111. Sarker IH (2021) Data science and analytics: An overview from
92. McLaughlin N, Martinez del Rincon J, Kang B, Yerima S, Miller data-driven smart computing, decision-making and applications
P, Sezer S, Safaei Y, Trickel E, Zhao Z, Doupé A, et al (2017) perspective. SN Comput Sci
13
Mobile Networks and Applications
112. Sarker IH (2021) Deep cybersecurity: a comprehensive overview 133. Sundmaeker H, Guillemin P, Friess P, Woelfflé S (2010) Vision
from neural network and deep learning perspective. SN Com- and challenges for realising the internet of things. Cluster of
puter Science 2(3):1–16 European Research Projects on the Internet of Things, European
113. Sarker IH (2021) Deep learning: A comprehensive overview on Commision 3(3):34–36
techniques, taxonomy, applications and research directions. SN 134. Susilo B, Sari RF (2020) Intrusion detection in IoT networks
Comput Sci using deep learning algorithm. Information 11(5):279
114. Sarker IH (2021) Machine learning: Algorithms, real-world 135. Swarnkar M, Hubballi N (2016) Ocpad: One class naive bayes
applications and research directions. SN Computer Science classifier for payload based anomaly detection. Expert Systems
2(3):1–21 with Applications 64:330–339
115. Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) Intrudtree: 136. Taherkordi A, Eliassen F (2016) Scalable modeling of cloud-
A machine learning based cyber security intrusion detection based iot services for smart cities. In: 2016 IEEE international
model. Symmetry 12(5):754 conference on pervasive computing and communication work-
116. Sarker IH, Colman A, Han J (2019) Recencyminer: mining shops (PerCom Workshops). IEEE, pp 1–6
recency-based personalized behavior from contextual smart- 137. Tahsien SM, Karimipour H, Spachos P (2020) Machine learning
phone data. Journal of Big Data 6(1):49 based solutions for security of internet of things (IoT): A survey.
117. Sarker IH, Colman A, Han J, Khan AI, Abushark YB, Salah Journal of Network and Computer Applications 161:102630
K (2020) Behavdt: a behavioral decision tree learning to build 138. Tajbakhsh A, Rahmati M, Mirzaei A (2009) Intrusion detec-
user-centric context-aware predictive model. Mobile Networks tion using fuzzy association rules. Applied Soft Computing
and Applications 25(3):1151–1161 9(2):462–469
118. Sarker IH, Colman A, Kabir MA, Han J (2018) Individualized 139. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed
time-series segmentation for mining mobile phone user behavior. analysis of the KDD cup 99 data set. In: 2009 IEEE symposium
The Computer Journal 61(3):349–368 on computational intelligence for security and defense applica-
119. Sarker IH, Furhad MdH, Nowrozy R (2021) Ai-driven cyberse- tions. IEEE, pp 1–6
curity: an overview, security intelligence modeling and research 140. Tewari A, Gupta BB (2020) Security, privacy and trust of differ-
directions. SN Computer Science 2(3):1–18 ent layers in internet-of-things (IoTs) framework. Future Genera-
120. Sarker IH, Hoque MM, Uddin MdK, Alsanoosy T (2020) Mobile tion Computer Systems 108:909–920
data science and intelligent apps: Concepts, AI-based modeling 141. Thiesse F, Michahelles F (2006) An overview of EPC technology.
and research directions. Mob Netw Appl:1–19 Sensor Review 26(2):101–105
121. Sarker IH, Kayes ASM (2020) Abc-ruleminer: User behavioral 142. Vinayakumar R, Soman KP, Poornachandran P (2017) Deep
rule-based machine learning method for context-aware intelli- android malware detection and classification. In: 2017 Interna-
gent services. Journal of Network and Computer Applications tional conference on advances in computing, communications
168:102762 and informatics (ICACCI). IEEE, pp 1677–1683
122. Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng 143. Welbourne E, Battle L, Cole G, Gould K, Rector K, Raymer S,
A (2020) Cybersecurity data science: an overview from machine Balazinska M, Borriello G (2009) Building the internet of things
learning perspective. Journal of Big Data 7(1):1–29 using rfid: the rfid ecosystem experience. IEEE Internet Comput-
123. Sarker IH, Kayes ASM, Watters P (2019) Effectiveness analysis ing 13(3):48–55
of machine learning classification models for predicting per- 144. Witten IH, Frank E, Trigg LE, Hall MA, Holmes G, Cunningham
sonalized context-aware smartphone usage. Journal of Big Data SJ (1999) Weka: Practical machine learning tools and techniques
6(1):57 with java implementations
124. Schaffers H, Komninos N, Pallot M, Trousse B, Nilsson M, 145. Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) Iot security
Oliveira A (2011) Smart cities and the future internet: Towards techniques based on machine learning: How do IoT devices
cooperation frameworks for open innovation. In: The future inter- use AI to enhance security? IEEE Signal Processing Magazine
net assembly. Springer, Berlin, Heidelberg, pp 431–446 35(5):41–49
125. Sellappan D, Srinivasan R (2020) Association rule-mining-based 146. Xie M, Hu J, Yu X, Chang E (2015) Evaluating host-based
intrusion detection system with entropy-based feature selection: anomaly detection systems: Application of the frequency-based
Intrusion detection system. In: Handbook of research on intel- algorithms to adfa-ld. In: International conference on network
ligent data processing and information security systems. IGI and system security. Springer, pp 542–549
Global, pp 1–24 147. Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H,
126. Sharma V, Lee K, Kwon S, Kim J, Park H, Yim K, Lee S-Y Wang C (2018) Machine learning and deep learning methods for
(2017) A consensus framework for reliability and mitigation of cybersecurity. IEEE Access 6:35365–35381
zero-day attacks in IoT. Secur Commun Netw:2017 148. Xu D, Tian Y (2015) A comprehensive survey of clustering algo-
127. Shaw A (2009) Data breach: from notification to prevention using rithms. Annals of Data Science 2(2):165–193
PCI DSS. Colum JL & Soc Probs 43:517 149. Xu Q, Ren P, Song H, Du Q (2016) Security enhancement for
128. Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward IoT communications exposed to eavesdroppers with uncertain
developing a systematic approach to generate benchmark datasets locations. IEEE Access 4:2840–2853
for intrusion detection. Computers & Security 31(3):357–374 150. Yan J, Qi Y, Rao Q (2018) Detecting malware with an ensem-
129. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Secu- ble method based on deep neural network. Secur Commun
rity, privacy and trust in internet of things: The road ahead. Com- Netw:2018
puter networks 76:146–164 151. Zago M, Pérez MG, Pérez GM (2020) Umudga: A dataset for
130. Ślusarczyk B (2018) Industry 4.0: Are we ready? Pol J Manag profiling algorithmically generated domain names in botnet
Stud:17 detection. Data in Brief:105400
131. Sneath PHA (1957) The application of computers to taxonomy. 152. Zaki MJ (2000) Scalable algorithms for association min-
J Gen Microbiol 17(1) ing. IEEE Transactions on Knowledge and Data Engineering
132. Sorensen T (1948) method of establishing groups of equal ampli- 12(3):372–390
tude in plant sociology based on similarity of species. Biol Skr:5 153. Zhang Z-K, Cho MCY, Wang C-W, Hsu C-W, Chen C-K,
Shieh S (2014) Iot security: ongoing challenges and research
13
Mobile Networks and Applications
opportunities. In: 2014 IEEE 7th international conference on 155. Zhou Y, Jiang X (2012) Dissecting android malware: Characteri-
service-oriented computing and applications. IEEE, pp 230–234 zation and evolution. In: 2012 IEEE symposium on security and
154. Zhou W, Jia Y, Peng A, Zhang Y, Liu P (2018) The effect of IoT privacy. IEEE, pp 95–109
new features on security and privacy: New threats, existing solu- 156. Zhou Z-J, Hu G-Y, Hu C-H, Wen C-L, Chang L-L (2019) A
tions, and challenges yet to be solved. IEEE Internet of Things survey of belief rule-base expert system. IEEE Trans Syst Man
Journal 6(2):1606–1616 Cybern Syst
13