In an ever-evolving global landscape, concerns regarding network security continue to grow. Integrating information technologies into daily life has made safeguarding computer security imperative. The rise of internet connectivity and innovations like the Internet of Things (IoT) have introduced new challenges in breaching computer systems. Organizations are dedicating resources to research methods for enhancing cyber-attack discovery, opting for intelligent approaches to achieve the highest accuracy rates. The combination of IoT and ML is changing how services and applications work. In the classical ML approaches, data are collected and centrally processed. Nevertheless, this approach is challenging to implement in modern IoT networks because they deal with a significant amount of data, and privacy is often an issue. In contrast, federated learning (FL) has been reported as a possible approach to address such limitations. FL enables ML methods to perform collaborative training through model parameter sharing rather than client data. This study comprehensively reviews cutting-edge literature on enhancing computer network security with ML in the FL environment and IoT. This work further explores various methods and applications in intrusion detection (ID) mechanisms within computer networks through a contemporary and thorough examination.
Keywords
Machine Learning, Internet of Things, Detection System, Federated Learning, Intelligent Techniques, Network Security.
M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and J. Lloret, “Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT,” Sensors, vol. 17, no. 9, p. 1967, Aug. 2017, doi: 10.3390/s17091967.
R. K. Gunupudi, M. Nimmala, N. Gugulothu, and S. R. Gali, “CLAPP: A self constructing feature clustering approach for anomaly detection,” Future Generation Computer Systems, vol. 74, pp. 417–429, Sep. 2017, doi: 10.1016/j.future.2016.12.040.
D. Pasini, S. M. Ventura, S. Rinaldi, P. Bellagente, A. Flammini, and A. L. C. Ciribini, “Exploiting Internet of Things and building information modeling framework for management of cognitive buildings,” 2016 IEEE International Smart Cities Conference (ISC2), pp. 1–6, Sep. 2016, doi: 10.1109/isc2.2016.7580817.
O. E. L. Castro, X. Deng, and J. H. Park, "Comprehensive Survey on AI-Based Technologies for Enhancing IoT Privacy and Security: Trends, Challenges, and Solutions," Human-Centric Computing and Information Sciences, vol. 13, 2023.
H. Wu, H. Han, X. Wang, and S. Sun, “Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey,” IEEE Access, vol. 8, pp. 153826–153848, 2020, doi: 10.1109/access.2020.3018170.
Y. Zhang, Q. Yang, D. An, D. Li, and Z. Wu, “Multistep Multiagent Reinforcement Learning for Optimal Energy Schedule Strategy of Charging Stations in Smart Grid,” IEEE Transactions on Cybernetics, vol. 53, no. 7, pp. 4292–4305, Jul. 2023, doi: 10.1109/tcyb.2022.3165074.
F. E. Heba, A. Darwish, A. E. Hassanien, and A. Abraham, “Principle components analysis and Support Vector Machine based Intrusion Detection System,” 2010 10th International Conference on Intelligent Systems Design and Applications, pp. 363–367, Nov. 2010, doi: 10.1109/isda.2010.5687239.
K. A. P. Costa, L. A. M. Pereira, R. Y. M. Nakamura, C. R. Pereira, J. P. Papa, and A. Xavier Falcão, “A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks,” Information Sciences, vol. 294, pp. 95–108, Feb. 2015, doi: 10.1016/j.ins.2014.09.025.
S. GÖRMÜŞ, H. AYDIN, and G. ULUTAŞ, “Nesnelerin interneti teknolojisi için güvenlik: Var olan mekanizmalar, protokoller ve yaşanılan zorlukların araştırılması,” Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, vol. 33, no. 4, pp. 1247–1272, Dec. 2018, doi: 10.17341/gazimmfd.416406.
“Trust and Trust Models for the IoT,” Security and Privacy in Internet of Things (IoTs), pp. 257–288, Apr. 2016, doi: 10.1201/b19516-18.
B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, “A survey of intrusion detection in Internet of Things,” Journal of Network and Computer Applications, vol. 84, pp. 25–37, Apr. 2017, doi: 10.1016/j.jnca.2017.02.009.
L. Yang, C. Ding, M. Wu, and K. Wang, “Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance,” Computer Networks, vol. 129, pp. 410–428, Dec. 2017, doi: 10.1016/j.comnet.2017.05.027.
R. Neisse, G. Steri, I. N. Fovino, and G. Baldini, “SecKit: A Model-based Security Toolkit for the Internet of Things,” Computers & Security, vol. 54, pp. 60–76, Oct. 2015, doi: 10.1016/j.cose.2015.06.002.
D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure routing for internet of things: A survey,” Journal of Network and Computer Applications, vol. 66, pp. 198–213, May 2016, doi: 10.1016/j.jnca.2016.03.006.
M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Future Generation Computer Systems, vol. 78, pp. 544–546, Jan. 2018, doi: 10.1016/j.future.2017.07.060.
A. Ramos, M. Lazar, R. H. Filho, and J. J. P. C. Rodrigues, “Model-Based Quantitative Network Security Metrics: A Survey,” IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2704–2734, 2017, doi: 10.1109/comst.2017.2745505.
V. Adat and B. B. Gupta, “Security in Internet of Things: issues, challenges, taxonomy, and architecture,” Telecommunication Systems, vol. 67, no. 3, pp. 423–441, Jun. 2017, doi: 10.1007/s11235-017-0345-9.
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network Anomaly Detection: Methods, Systems and Tools,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303–336, 2014, doi: 10.1109/surv.2013.052213.00046.
H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the Internet of Things: A Review,” 2012 International Conference on Computer Science and Electronics Engineering, pp. 648–651, Mar. 2012, doi: 10.1109/iccsee.2012.373.
F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, “Machine Learning in IoT Security: Current Solutions and Future Challenges,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1686–1721, 2020, doi: 10.1109/comst.2020.2986444.
K. Istiaque Ahmed, M. Tahir, M. Hadi Habaebi, S. Lun Lau, and A. Ahad, “Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction,” Sensors, vol. 21, no. 15, p. 5122, Jul. 2021, doi: 10.3390/s21155122.
A. K et al., “Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT,” Sensors, vol. 21, no. 23, p. 7793, Nov. 2021, doi: 10.3390/s21237793.
S. I. Popoola, R. Ande, B. Adebisi, G. Gui, M. Hammoudeh, and O. Jogunola, “Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices,” IEEE Internet of Things Journal, vol. 9, no. 5, pp. 3930–3944, Mar. 2022, doi: 10.1109/jiot.2021.3100755.
M. E. Karsligil, A. G. Yavuz, M. A. Guvensan, K. Hanifi, and H. Bank, “Network intrusion detection using machine learning anomaly detection algorithms,” 2017 25th Signal Processing and Communications Applications Conference (SIU), pp. 1–4, May 2017, doi: 10.1109/siu.2017.7960616.
Acknowledgements
Author(s) thanks to Dr. Wathiq Laftah Al-Yaseen for this research completion and support.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Qusay Abdullah Abed
Computer Systems Department, Kerbala Technical Institute, Al-Furat Al-Awsat Technical University, Kerbala, Iraq.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Qusay Abdullah Abed and Wathiq Laftah Al-Yaseen, “Intrusion Detection Systems for IoT Based on Machine Learning Under the Learning Environment”, Journal of Machine and Computing. doi: 10.53759/7669/jmc202505018.