...
首页> 外文期刊>Cybersecurity >A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
【24h】

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

机译:物联网中入侵检测系统的关键评论:技术,部署策略,验证策略,攻击,公共数据集和挑战

获取原文
           

摘要

The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation strategy, and deployment strategy. This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS. We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT. It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure. These purposes help IoT security researchers by uniting, contrasting, and compiling scattered research efforts. Consequently, we provide a unique IoT IDS taxonomy, which sheds light on IoT IDS techniques, their advantages and disadvantages, IoT attacks that exploit IoT communication systems, corresponding advanced IDS and detection capabilities to detect IoT attacks.
机译:事物互联网(物联网)一直在迅速发展,以对大型工业系统产生更大的影响。不幸的是,这引起了网络犯罪分子的注意力,使IoT成为恶意活动的目标,将门打开到最终节点的可能攻击。为此,在文献中提出了许多物联网入侵检测系统(IDS),以解决IOT生态系统的攻击,这可以基于检测技术,验证策略和部署策略来广泛分类。此调查论文对当代物联网ID的全面审查以及通常适用于构建ID的技术,部署策略,验证策略和数据集的概述。我们还审查现有的IOT ID如何检测到IOT上的侵入性攻击和安全通信。它还提出了物联网攻击的分类,并讨论了未来的研究挑战,以反击此类物联网攻击,使IOT更加安全。这些目的通过联合,对比和编制分散的研究工作来帮助IoT安全研究人员。因此,我们提供了一个独特的物联网IDS分类,其阐明了IOT ID技术,其优势和缺点,IOT攻击,即利用物联网通信系统,相应的高级ID和检测能力来检测IOT攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号