=Paper=
{{Paper
|id=Vol-3616/paper5
|storemode=property
|title=An Overview of Machine and Deep Learning-Based Intrusion Detection Systems in the Internet of Things
|pdfUrl=https://ceur-ws.org/Vol-3616/paper5.pdf
|volume=Vol-3616
|authors=Oumeima Boubertakh,Ramdane Maamri,Ali Sahnoun
|dblpUrl=https://dblp.org/rec/conf/rif/BoubertakhMS23
}}
==An Overview of Machine and Deep Learning-Based Intrusion Detection Systems in the Internet of Things==
An overview of machine and deep learning-based intrusion detection systems in the Internet of Things Oumeima Boubertakh1 , Ramdane Maamri1 and Ali Sahnoun1 1 LIRE Laboratory, University of Constantine 2 Abdelhamid Mehri Abstract The Internet of Things (IoT) is one of the hottest topics in the industrial and academic fields in recent years, and it is regarded as the next revolution of the internet. IoT security and privacy issues have proven to be critical targets.Since IoT devices have less memory, processing power, and power consumption, traditional security mechanisms are ineffective.Thus, A security mechanism called an Intrusion Detection System (IDS) has an important role in securing IoT nodes and networks.Machine learning and deep learning techniques have been proposed for automatic intrusion detection and abnormal behavior identification of networks.Hence, in this filed, the types of IDS, the recent research, and contributions to IDS in IoT networks are discussed in this paper. Keywords Internet of Things, Intrusion Detection Systems, Machine Learning, Deep Learning 1. Introduction The Internet of Things (IoT) is one of the most rapidly evolving technological trends in recent years.According to [1] the number of IoT devices will reach 75 billion by 2025.Moreover,IoT is a new technology that collects data from the physical world and then transmits it over the internet to be exchanged, processed, and stored. By using actuators and smart appliances, the collected data is used to extract information and act on the physical world[2] Moreover,IoT has noticeably increased human day activities such as the delivery of efficient healthcare services and the development of smart cities,homes and intelligent transportation systems[3].Because of the resource limitations of the IoT, and the explosion in the number of unsecured IoT devices connected to the global network, IoT devices are more vulnerable and can be easily exploited by an attacker. Hence, the demands of IoT security is paramount.According to the literature, many works provide security in the IoT by utilizing cryptography based security mechanisms such as symmetric key cryptosystems and public key cryptosystems. Furthermore, cryptographic security mechanisms are primarily used to detect external attacks such as eavesdropping and message alteration.When the encryption methods hold the valid key and are compromised by the attack,they are unable to detect the vulnerable nodes. Attackers can easily obtain security details from compromised nodes and launch a series of internal intrusions[4]. As a result, the IDS serves as a tool to provide an additional level of security to the IoT. RIF’23: The 12th Seminary of Computer Science Research at Feminine, March 09, 2023, Constantine, Algeria $ oumeima.boubertakh@univ-constantine2.dz (O. Boubertakh); ramdane.maamri@univ-constantine2.dz (R. Maamri); ali.sahnoun.@univ-constantine2.dz (A. Sahnoun) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings Machine Learning (ML)and Deep Learning(DL) techniques have recently been developed and applied for intrusion detection and identification of abnormal behaviors in networks and their prevention. The remainder of the paper is structured as follows: In Section 2, we present IoT security challenges that face the implementation of security policies, while in Section 3, IoT security goals are discussed. In Section 4, we offered a classification of IDS destined for the IoT. While in Section in Section 5, a discussion of ML and DL for IDs is presented. Section 6 discusses metrics for evaluating the effectiveness of intrusion detection systems (IDSs). Section 7 presents the relevant work on various existing IDSs using ML and DL techniques. Section 8, a discussion of IDS-related works, is presented. The final section provides a conclusion and some future work directions. 2. IoT security challenges IoT is an evolutionary technology that has gained enormous traction in science and engineering applications for solving problems without the intervention of human-machine physical contact. The advancement of internet technologies has enabled the possibility of wider and stronger network connectivity between the objects. Every object in IoT is identified as a node and is connected to each other in a network, allowing information sharing such as receiving and sending[5]. Because these devices operate in an Internet-connected environment, they are susceptible to various vulnerabilities and attacks[2]. As a result, IoT security must be addressed; however, there are numerous challenges in the IoT domain that complicate the development of security solutions, including the following: • All "things" will be able to communicate with each other. As a result, there are numerous access points that can be used to exploit existing vulnerabilities[6]. • IoT devices typically have limited resources such as low processing power, limited energy, and limited memory. as a result, complex security algorithms may not be supported. [6]. Furthermore, the majority of devices lack the necessary hardware and software to support TCP/IP and security protocols[7]. • IoT devices are easily damaged, stolen, and compromised because they are everywhere[7]. • Heterogeneity of devices and network technologies: The IoT employs a wide range of sensors, devices, and network technologies, which can lead to a variety of security issues. It also makes the development of strong security policies more difficult[7]. • Lack of standardization: There are no unique standards that all IoT device builders use. Each vendor has his or her own set of standards, protocols, and technologies[7]. 3. Why IoT protection is necessary Security principles are essential in IoT for achieving reliable communications between devices, software, and people.Raising concerns that IoT is rapidly evolving without paying attention to the regulatory changes and significant security challenges that may be required. The most important concern in adopting IoT technology is security. This section will focus on the three IoT security goals known as the CIA triad (confidentiality, integrity, and availability).Show Figure1. 1. Confidentiality: It is a security feature that means only the sender and receiver can read the information as it travels through the network[7]. 2. Integrity: It must be ensured that the data or message was not altered or destroyed during its exchange, transmission, storage, and processing[8]. 3. Availability: The process of ensuring availability is defined as making the required service (or a device) available anywhere and at any time for the intended users.[9]. Figure 1: CIA TRIAD[10] 4. Intrusion Detection System Taxonomy for IoT Reference[11],defines an IoT intrusion as a disallowed operation or activity that endangers the IoT environment,In other words,any attack that compromises the confidentiality, integrity, or availability of information is classed as an intrusion. Intrusion detection is the process of monitoring and analyzing network traffic in order to detect malicious attacks (also known as intrusions) and respond to them with signs of intrusion[12]. The purpose of IDS is to identify different types of harmful network traffic and computer activities that a regular firewall might miss.The firewall can only detect attacks from outside the network,while IDSs are widely used to identify known and unknown network attacks from internal and external attackers[13],they serve as the last line of defense and are capa- ble of determining the legitimacy of actions taken as well as acting pro-actively in attack situations[14].This is critical for obtaining high levels of security against acts that jeopardize IoT systems’ availability, integrity, or secrecy. According to [3], IDS in the IoT are classified into three types: those based on the intrusion detection mechanism, those based on network structure, and those developed by focusing on attack types.Show Figure2. Figure 2: Taxonomy of IDS for IoT[3] 4.1. IDS-based mechanism IDS-based mechanism is further classified into four groups,anomaly detection, signature detec- tion, specifcation and hybrid IDS 1. IDS Based on Anomaly Detection:This technique compared the behaviour of the devices with their normal behaviour. To detect the intrusion, a threshold value is used to determine whether a device’s deviation exceeds the threshold . Such a device will be categorized as a suspect device and will be monitored over time. If a device’s abnormal behaviour persists, it will be classified as malicious and isolated from communication with other devices[3]. 2. IDS Based on Signature: This kind of IDS necessitates a database where all possible known attack patterns are stored and is extremely effective against known attacks. Moreover, it requires periodic updates because the system’s efficiency is dependent on attack signatures stored in the database[3, 4]. 3. Specification-Based IDS: These IDSs include a rule-set and some thresholds that go with it,Moreover, experts define these rules regarding the normal and abnormal activities of network nodes and protocols.whenever there is a deviation from the specified THs and rules. It is regarded as an attack. similar to anomaly-based IDS.in specification based-IDS the rules and thresholds are set by the human experts, but in anomaly-based IDS, the system should be trained[4]. 4. Hybrid IDS: Hybrid IDSs are created by combining one or more of the previously men- tioned IDS types. These IDSs are designed to improve performance by minimizing drawbacks and maximizing benefits. The detection accuracy and performance of the hybrid IDS are improved by combining the benefits of such IDSs[4]. 4.2. IDS based on network structure The IDS detection based on network structure is further classifed into centralised IDS , distributed IDS , and hybrid IDS 1. Centralized IDS (CIDS): In this strategy, IDS are installed on a centralized router or a dedicated server, where they analyze the data available in network traffic and control all of the network’s devices to detect intrusions[3]. 2. Distributed IDS (DIDS): In this method, IDSs are installed on sensing nodes in IoT devices. Thus, each node in the IoT network is responsible for monitoring and identifying the behaviour of IoT device nodes in order to detect intrusions. Moreover, the resource- constrained properties of the IoT in this strategy should be examined and optimized[3][4]. 3. Hybrid IDS (HIDS): A hybrid IDS is a combination of CIDS and DIDS. The IDS is placed on both centralized servers and sensing devices in the IoT environment[3]. 4.3. IDSs focusing on attack types IDSs developed by focusing on attack types is classified further into IDS for detecting denial of service attacks, reply attacks, Sybil attacks, wormhole attacks, false data injection attacks, and jamming attacks[3]. 5. Machine Learning and Deep Learning for IDSs ML, and particularly its subfield, DL, has made remarkable progress. These two fields’ techniques can now analyze and learn from massive amounts of real-world data in a variety of formats[15]. Moreover, these methods have been used to solve complex problems in a variety of fields, including the security research domain[16]. Furthermore, they have been widely adopted by researchers as a solution for securing the IoT environment and showing their superiority in dealing with intrusion detection attacks[17]. In general, ML is split into three subdomains: supervised, unsupervised, and reinforcement learning. Supervised learning necessitates labeled data for training. It determines the link between the data and its class, while unsupervised learning is used when labeled data is unavailable. Reinforcement learning is a feedback-based technique. Several machine learning methods have been proposed for accurate intrusion detection. Support Vector Machine (SVM), Decision Tree (DT), Naive Bayes (NB), Logistic Regression (LR), k-Nearest Neighbour (kNN), Random Forest (RF), and Artificial Neural Networks (ANN) are the most commonly used methods. In 2006, Deep Learning methods appeared and have since emerged as a popular research subject. The term "deep" refers to many hidden layers in the neural network. It is an ANN subcategory with more hidden layers than traditional neural networks, which goes up to 150. DL deals with algorithms that learn from examples the same as in ML. As the size of the data increases, so does the performance of the ML and DL algorithms. DL algorithms require a large amount of data to find network patterns, whereas ML algorithms require less data[16]. DL methods are categorized into supervised learning and unsupervised learning. Convolu- tional Neural Network (CNN) and Recurrent Neural Network (RNN) comes under the category of supervised learning, and Auto-Encoder(AE)and Deep Belief Network (DBN) comes under the category of unsupervised learning. Multiple DL methods for accurate intrusion detection have been proposed. The most common methods are as follows: CNN, Long short-Term Memory (LSTM),Deep Neural Network(DNN). 6. Evaluation metrics of IDSs Generally, metrics such as recall, false positive, false negative, precision, f-measure, and accuracy are used to evaluate and compare the performance of developed IDS models[18].TABLE 1 summarizes the four possible outcomes of a detection. Table 1 Confusion Matrix Predicted Normal Attack Normal True Negative False Positive Actual Attack False Negative True Positive • True Positive (TP) - Attack data correctly classified as an attack. • False Positive (FP) - Normal data incorrectly classified as an attack. • True Negative (TN) - Normal data correctly classified as normal. • False Negative (FN) - Attack data incorrectly classified as normal. Accuracy is the number of correct classifications out of all samples. 𝑇𝑃 + 𝑇𝑁 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = (1) 𝑇𝑃 + 𝑇𝑁 + 𝐹𝑃 + 𝐹𝑁 The recall determines the number of correct classifications that are penalized by missing records. 𝑇𝑃 𝑅𝑒𝑐𝑎𝑙𝑙 = (2) 𝑇𝑃 + 𝐹𝑁 The false alarm calculates the percentage of benign events that are incorrectly classified as malicious. 𝐹𝑃 𝐹 𝑅𝑃 = (3) 𝐹𝑃 + 𝑇𝑁 The precision is calculated by dividing the number of correct classifications by the number of incorrect classifications. 𝑇𝑃 𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 = (4) 𝐹𝑃 + 𝑇𝑃 The F-Measure is a derived effectiveness measurement that calculates the harmonic mean of precision and recall. 𝑝𝑟𝑒𝑐𝑒𝑠𝑖𝑜𝑛 * 𝑟𝑒𝑐𝑎𝑙𝑙 𝐹 − 𝑀 𝑒𝑎𝑠𝑢𝑟𝑒 = 2 * (5) 𝑝𝑟𝑒𝑐𝑒𝑠𝑖𝑜𝑛 + 𝑟𝑒𝑐𝑎𝑙𝑙 7. IDS Related Works Numerous IDSs have been presented by researchers in recent years to detect potential attacks in IoT networks. One of the most important methods used in the development of IDS is artificial intelligence-based modeling. Therefore, this section analyzes some previous works in this field. This work[18],proposes a network intrusion detection system (NIDS) by using a non-symmetric deep auto-encoder for unsupervised feature learning and the SVM classification algorithm to identify network traffic as known attacks or normal data. The authors validated the proposed NIDS’s effectiveness on the KDD Cup’99 dataset, achieving high accuracy and low false alarms. In [19],the authors used the ReliefF algorithm to select features from the Windows 10 dataset. and applied deep learning and machine learning techniques to classify the data as normal or attack data. The algorithms applied are KNN, SVM, neural networks, and LSTM, and their results were 98.93%, 98.22%, and 97.97%, respectively. The authors in[20], presented an improved IDS using Gradient Boosting (GB) and DT through the open-source Catboost framework in the feature engineering step. The proposed model has been evaluated on the NSL-KDD, IoT-23, BoT-IoT, and Edge-IIoT datasets and obtained good scores for the performance metrics of accuracy, recall, and precision. In[21],the authors provided a deep feature extraction (DFE) NIDS based on a CNN, with a focus on low-processing-power devices.The efficacy of the proposed model has been evaluated using three datasets: UNSW-NB15, CICIDS2017, and KDDCup99,and their results were 100% ,99.915%,98.98%,respectively.The model was tested for both binary and multi-class classifications. In[22], a hybrid intrusion detection model for wireless IoT networks using a CNN with a DT classifier has been presented.The DT algorithm is used as a classifier in the IoT network to classify deep features and detect attacks. The benchmark NSL-KDD dataset is used to validate the performance of the proposed intrusion detection model. This model achieved a high degree of accuracy. In this study [23], a deep-convolutional neural network (DCNN)-based IDS for malicious activity identification in IoT networks was proposed and evaluated on the IoTID20 dataset. The performance of the proposed model was tested for binary, multi-class categories, and multi-class subcategory classifications. In [24], the stacked autoencoder method was used in the study to reduce dimensionality, and the Gaussian Mixture Model-based Wasserstein Generative Adversarial Network (GMM-based WGAN) algorithm was used to deal with the imbalanced classes in the NSL-KDD and UNSW- NB15 datasets. The Convolutional Neural Network-Long Short Term Memory (CNN-LSTM) module was tested on the given datasets and obtained remarkable accuracy. In this study[25], a hybrid approach using a set of machine learning algorithms and a set of deep learning models has been proposed for the detection of DDoS attacks in IoT networks. The datasets used for the experimentation are BOT-IoT and the TONIoT network dataset. The model obtained a significant rate of accuracy. In this study [26], a CNN-based approach for anomaly-based IDS has been proposed to improve the IoT network’s performance and security. The datasets used for the experimentation were NID and BOT-IoT, which achieved 99.51% and 95.55% accuracy, respectively. In [27], an intelligent IDS capable of detecting abnormal behavior on insecure IoT networks is developed by combining feature dimensionality reduction Principal Component Analysis(PCA) and machine learning methods (XgBoost, Cat Boost, KNN, SVM, and Quadratic Discriminant Analysis (QDA)).The proposed model’s effectiveness was validated using the UNSW-NB15 dataset. The model was 99.9% accurate. In [28],the authors present Realguard, a DNN-based NIDS that operates directly on local gateways to accurately detect a wide range of cyber attacks in network traffic. The authors validated the effectiveness of the proposed NIDS on the CICIDS2017 dataset. The model was tested for both binary and multi-class classifications, and achived high detection accuracy. In [12], an ensemble-based intrusion detection model (logistic regression, NB, and DT) has been proposed for feature selection with a voting classifier, and the effectiveness of the proposed model has been evaluated using the CICIDS2017 dataset. The model was tested for both binary and multi-class classifications and achieved a significant improvement in accuracy. This work [29], proposes a framework system to detect intrusions in the IoT environment. The authors applied three DL models to classify the intrusion: a CNN, LSTM, and a hybrid convolution neural network with the CNN-LSTM model. The IoTID20 dataset has been used for the evaluation of these DL models.The studies discussed in this section are summarized comparatively in TABLE 8. 8. Discussion The development of IDS based on various ML and DL approaches has been the main focus of research studies to address security and privacy challenges in IoT networks. Researchers have developed their proposed solutions with those techniques. From a dataset point of view, UNSW-NB15, BOT-IOT, CICIIDS2017, and NSL-KDD datasets are the most frequently used by the researchers. The proposed approaches give different performances depending on the selected datasets and the input characteristics.However, The same learning approaches and techniques do not always yield the same outcomes for a wide range of possible attack classes. For example, using the CICIIDS2017 dataset, the authors in [28] found a performance accuracy of 99.93%,while using the same dataset, the authors in [21] found a 98.98% accuracy, and both papers used DL techniques for intrusion detection.The BOT-IOT dataset achieved 100% performance accuracy in [20] and 88% accuracy in [25].Both of these papers used machine learning in their solutions.Whereas the UNSW-NB15 dataset achieved significant performance accuracy of 100%, in[21] using a deep learning technique and 99.9% performance accuracy in [27]using machine learning techniques. The NSL-KDD datasets achieved 99.81% performance accuracy in [20] using machine learning techniques and 86.59% performance accuracy in [24] using a deep learning techniques. Binary classification is the task of classifying the elements of a set into two groups (each called a class); in the case of an IDS, these two classes are "normal" or "attack".Furthermore, multiclass classification is the problem of classifying instances into one or three or more classes. In this field (IDS), the classes represent the normal and attack categories, which vary from one dataset to another. These classes include Denial-of-Service (DoS), MIArai, and MITM ARP Spoofing,Reconnaissance Attacks.Moreover, for multiclass-subcategory classification, each category of attack cited above has various more-specific subcategories of attack methods. A DoS attack, for example, can also be a distributed DoS (DDoS) attack, a smurf attack, a TCP SYN attack, or a DoS-Synflooding attack. The intrusion detection process is a classification problem, so the researchers used ML and DL methods to classify intrusions from normal data. The accuracy results mentioned in the table are very acceptable, and as a result, the majority, if not all, of these ML or DL solutions produce effective results and perform satisfactorily.The TABLE 8 below was discussed in this section. 9. Conclusion With the development of attacks that threaten the security of the IoT and the limitations of the IoT in terms of storage and processing, traditional intrusion detection techniques have not become effective, and the development of solutions commensurate with this situation has become inevitable, particularly new solutions enhanced by artificial intelligence, in order to be able to suppress these attacks. The two most popular fields of artificial intelligence (AI), namely DL models and ML al- gorithms for binary and multiple classifications, are used in the design of a large number of IDSs. In this article, we began by discussing the IoT concept and the challenges facing its security, as well as one of the security solutions, IDS. In addition, we conducted a comparison of ML and DL approaches for IDSs for the IoT. We first analyzed numerous articles and compared ML and DL techniques, datasets, classification granularity, and performance indicators. We extracted the pros and cons of each study. As a result, we found that CNN, SVM, LSTM, and DT are the most commonly used for attack detection.. In the future, we plan to propose a new approach to IDS for securing the IoT using ML, DL, or a hybrid of the two techniques. taking into account the actual challenges of related systems and ensuring better performance. References [1] G. D. Maayan, The iot rundown for 2020: Stats, risks, and solutions, urlhttps://securitytoday.com/articles/2020/01/13/the-iot-rundown-for-2020.aspx, 2020. [2] C. Benali, R. Maamri, A hybrid architecture based on blockchain to ensure security, privacy, and trust in iot, International Journal of Organizational and Collective Intelligence (IJOCI) 12 (2022) 1–23. [3] S. Santhosh Kumar, M. Selvi, A. Kannan, et al., A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things, Computational Intelligence and Neuroscience 2023 (2023). [4] A. A. Anitha, L. Arockiam, A review on intrusion detection systems to secure iot networks, International Journal of Computer Networks and Applications 9 (2022) 38–50. [5] N. M. Kumar, P. K. Mallick, The internet of things: Insights into the building blocks, component interactions, and architecture layers, Procedia computer science 132 (2018) 109–117. [6] J. Pacheco, D. Ibarra, A. Vijay, S. Hariri, Iot security framework for smart water system, in: 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), IEEE, 2017, pp. 1285–1292. [7] B. Cherif, Z. Sahnoun, M. Ramdane, B. Nardjes, Internet of things: Security between chal- lenges and attacks, in: Machine Learning for Networking: Second IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3–5, 2019, Revised Selected Papers 2, Springer, 2020, pp. 444–460. [8] E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, B. Stiller, Landscape of iot security, Computer Science Review 44 (2022) 100467. [9] P. Nayak, G. Swapna, Security issues in iot applications using certificateless aggregate signcryption schemes: An overview, Internet of Things (2022) 100641. [10] Cia triad definition. examples of confidentiality, integrity, and availability, urlhttps://www.wallarm.com/what/cia-triad-definition, 2022. [11] A. Khraisat, A. Alazab, A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges, Cybersecurity 4 (2021) 1–27. [12] A. Abbas, M. A. Khan, S. Latif, M. Ajaz, A. A. Shah, J. Ahmad, A new ensemble-based intru- sion detection system for internet of things, Arabian Journal for Science and Engineering (2021) 1–15. [13] M. Ozkan-Okay, R. Samet, Ö. Aslan, D. Gupta, A comprehensive systematic literature review on intrusion detection systems, IEEE Access 9 (2021) 157727–157760. [14] C. A. de Souza, C. B. Westphall, R. B. Machado, L. Loffi, C. M. Westphall, G. A. Geronimo, Intrusion detection and prevention in fog based iot environments: A systematic literature review, Computer Networks (2022) 109154. [15] G. Nguyen, S. Dlugolinsky, M. Bobák, V. Tran, Á. López García, I. Heredia, P. Malík, L. Hluchỳ, Machine learning and deep learning frameworks and libraries for large-scale data mining: a survey, Artificial Intelligence Review 52 (2019) 77–124. [16] G. Kocher, G. Kumar, Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges, Soft Computing 25 (2021) 9731–9763. [17] M. A. Alsoufi, S. Razak, M. M. Siraj, I. Nafea, F. A. Ghaleb, F. Saeed, M. Nasser, Anomaly- based intrusion detection systems in iot using deep learning: A systematic literature review, Applied sciences 11 (2021) 8383. [18] M. Imran, N. Haider, M. Shoaib, I. Razzak, et al., An intelligent and efficient network intrusion detection system using deep learning, Computers and Electrical Engineering 99 (2022) 107764. [19] R. H. Mohamed, F. A. Mosa, R. A. Sadek, Efficient intrusion detection system for iot environment, International Journal of Advanced Computer Science and Applications 13 (2022). [20] M. Douiba, S. Benkirane, A. Guezzaz, M. Azrour, An improved anomaly detection model for iot security using decision tree and gradient boosting, The Journal of Supercomputing (2022) 1–20. [21] A. Basati, M. M. Faghih, Dfe: Efficient iot network intrusion detection using deep feature extraction, Neural Computing and Applications 34 (2022) 15175–15195. [22] J. Simon, N. Kapileswar, P. K. Polasi, M. A. Elaveini, Hybrid intrusion detection system for wireless iot networks using deep learning algorithm, Computers and Electrical Engineering 102 (2022) 108190. [23] S. Ullah, J. Ahmad, M. A. Khan, E. H. Alkhammash, M. Hadjouni, Y. Y. Ghadi, F. Saeed, N. Pitropakis, A new intrusion detection system for the internet of things via deep convolutional neural network and feature engineering, Sensors 22 (2022) 3607. [24] J. Cui, L. Zong, J. Xie, M. Tang, A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data, Applied Intelligence (2022) 1–17. [25] S. A. Khanday, H. Fatima, N. Rakesh, Implementation of intrusion detection model for ddos attacks in lightweight iot networks, Expert Systems with Applications 215 (2023) 119330. [26] T. Saba, A. Rehman, T. Sadad, H. Kolivand, S. A. Bahaj, Anomaly-based intrusion detec- tion system for iot networks through deep learning model, Computers and Electrical Engineering 99 (2022) 107810. [27] Y. K. Saheed, A. I. Abiodun, S. Misra, M. K. Holone, R. Colomo-Palacios, A machine learning- based intrusion detection for detecting internet of things network attacks, Alexandria Engineering Journal 61 (2022) 9395–9409. [28] X.-H. Nguyen, X.-D. Nguyen, H.-H. Huynh, K.-H. Le, Realguard: A lightweight network intrusion detection system for iot gateways, Sensors 22 (2022) 432. [29] H. Alkahtani, T. H. Aldhyani, Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms, Complexity 2021 (2021) 1–18. Table 2 A comparison of existing work related to intrusion detection Classification Study Year Techniques Used Dataset Accuracy Pros Cons Granularity -Applied only on -High detection accuracy. one dataset. -reduces computational -There was no simulation in [18] 2022 SAE+SVM KDD Cup’99 99.65%, Multiclass and time costs. the study. -low false alarm -Performance is lower 1.92%. with two classes. -The experimentation on ReliefF one dataset. Medium neural network 98.39% -No multiclass or multiclass- [19] 2022 Weighted KNN ToN-IoT-Windows 98.22% Binary -High detection accuracy. subcategory classification. Fine Gaussian SVM 97.97% -There was no simulation in LSTM the study. NSL-KDD 99.81% -Low cost in time. Gradient Boosting IoT-23 99.98% Binary -High detection accuracy. -Not applied for multiclass- [20] 2022 Decision Tree BoT-IoT 100% Multiclass -The study is supported by subcategory. Edge-IIoT 100% simulation. -Not applied for multiclass- UNSW-NB15 100% -High detection Binary subcategory classification. [21] 2022 DFE based CNN KDD Cup99 99.915% accuracy. Multiclass -There was no simulation CICIDS2017 98.98% -Processing power is limited. in the study. -Applied only on -High accuracy CNN one dataset [22] 2022 NSL-KDD 99.49% Multiclass -The study is supported by Decision Tree -Not applied for binary simulation. classification -low accuracy for Binary -High detection multiclass subcategory CNN 99.84% Multiclass [23] 2022 IoTID20 accuracy for binary and classification. DNN 98.12% Multiclass- multiclass classification. -There was no simulation subcategory in the study. -Applied just for multiclass SAE NSL-KDD 86.59% classification. [24] 2022 Multiclass -Remarkable accuracy. (CNN-LSTM) UNSW-NB15 87.70% -There was no simulation in the study. Linear SVM- -Applied just for Naive Bayes BoT-IoT -Significant detection rate binary classification. [25] 2023 Logistic Regression 88-99% Binary TON-IoT for DDoS attack. -There was no simulation ANN in the study. LSTM -Only for multiclass classification. BoT-IoT 95.55% -High detection [26] 2022 CNN Multiclass -Few types of attacks. NID 99.51% accuracy. -There was no simulation in the study. -Evaluated on one dataset. XGBooST, -High detection -Only for multiclass [27] 2022 CatBooST, UNSW-NB15 99.9% Multiclass accuracy. classification. KNN, SVM, QDA -There was no simulation in the study. -Low resource consumption. -Detect cyber attacks -Vulnerable to adversarial attacks. Binary in real time. [28] 2022 DNN CICIIDS2017 99.93% -The experimentation on Multiclass -High detection accuracy. one dataset. -Operates on resources- constraint gateways. -significant detection Decision Tree, -Evaluated only on accuracy Naive Bayes 88.92% Binary one dataset. [12] 2021 CICIIDS2017 -low computational Logistic Rregression 88.96% Multiclass -There was no simulation power, resources Voting classifier in the study. and low false alarm. CNN -New real dataset generated -Only for bianry [29] 2021 LSTM IoTID20 98.4% Binary from the IoT environment. classification. CNN-LSTM -Detect real-world attacks. -Applied on one dataset.