Review on machine learning and deep learning algorithms for IoT security

Document Type : Research Paper


Department of Computer Science, University of Kufa, Najaf, Iraq


With its rapid expansion in more sectors, for instance, wearables, smart sensors, plus house devices, the Internet of Things (IoT) is drifted to have a significant influence on many parts of our life. IoT devices stand out for their connectivity, ubiquity, and low processing power. By 2025, there will likely be 30.9 billion devices adjoined to the Internet, since the count of IoT devices in use worldwide is growing quickly. This eruption about IoT devices, which in analogy to desktop PCs, can be quickly increased, has caused an increase in occurrences of IoT-based cyber intrusions. It is necessary to create new methods for identifying attacks launched from hacked IoT devices in order to address this challenge. The best detective control solution against attacks caused by IoT devices, in this context, uses machine and deep learning approaches. This paper attempts some analysis of technologies, threats arising from IoT devices, and intrusion detection system overview as they associate with IoT systems. The investigation of several machine learning plus deep learning concepts appropriate for identifying IoT devices linked with cyberattacks is also included in this paper.


[1] Global IoT and non-IoT connections 2010-2025, iot-number-of-connected-devices-worldwide/, Accessed Jan. 12, 2023.
[2] Social engineering attacks on the internet of things - IEEE internet of things, newsletter/september-2016/social-engineering-attacks-on-the-internet-of-things.html, 2016, Accessed Jan. 13, 2023.
[3] S. Ali, M.A. Khan, J. Ahmad, A.W. Malik, and A. ur Rehman, Detection and prevention of black hole attacks in IOT & WSN, Third Int. Conf. Fog Mobile Edge Comput.(FMEC), IEEE, 2018, pp. 217–226.
[4] M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, Deep recurrent neural network for iot intrusion detection system, Simul. Model. Pract. Theory 101 (2020), 102031.
[5] H. Alyasiri, J.A. Clark, A. Malik, and R. de Fr´ein, Grammatical evolution for detecting cyberattacks in internet of things environments, Int. Conf. Comput. Commun. Networks (ICCCN), IEEE, 2021, pp. 1–6.
[6] M.E. Aminanto and K. Kim, Detecting active attacks in wi-fi network by semi-supervised deep learning, Conf. Inf. Secur. Cryptography, 2017.
[7] L. Atzori, A. Iera, and G. Morabito, The internet of things: A survey, Comput. Networks 54 (2010), no. 15, 2787–2805.
[8] A. Azmoodeh, A. Dehghantanha, M. Conti, and Kim-Kwang R. Choo, Detecting crypto-ransomware in iot networks based on energy consumption footprint, J. Ambient Intell. Humaniz. Comput. 9 (2018), no. 4, 1141–1152.
[9] E. Bertino and N. Islam, Botnets and internet of things security, Computer (Long. Beach. Calif). 50 (2017), no. 2, 76–79.
[10] L. Bontemps, V.L. Cao, J. McDermott, and N.-A. Le-Khac, Collective anomaly detection based on long short-term memory recurrent neural networks, Int. Conf. Future Data Secur. Engin., 2016, pp. 141–152.
[11] P.B. Callahan and S.R. Kosaraju, A decomposition of multidimensional point sets with applications to k nearestneighbors and n-body potential fields, J. ACM 42 (1995), no. 1, 67–90.
[12] A.M. Chandrashekhar, S.T. Ahmed, and N. Rahul, Analysis of security threats to database storage systems, Int. J. Adv. Res. data Min. Cloud Comput. 3 (2015), no. 5.
[13] Y. Chen, Y. Li, D. Xu, and L. Xiao, DQN-based power control for iot transmission against jamming, IEEE 87th Vehicular Technol. Conf. (VTC Spring), 2018, pp. 1–5.
[14] M. Conti, N. Dragoni, and V. Lesyk, A survey of man in the middle attacks, IEEE Commun. Surv. Tutorials 18 (2016), no. 3, 2027–2051.
[15] E. De Coninck, M. Abdel-Nasser, S. Willocx, B. Peeters, P. Simoens, P. Demeester, and M. Van de Ginste, Distributed neural networks for internet of things: The big-little approach, Int. Internet Things Summit, 2015, pp. 484–492.
[16] D.E. Denning, An intrusion-detection model, IEEE Trans. Softw. Eng. (1987), no. 2, 222–232.
[17] E. Fix and J.L. Hodges, Discriminatory analysis, nonparametric discrimination: Consistency properties, Int. Statist. Rev. 57 (1989), no. 3, 238–247.
[18] K. Fukushima, Neocognitron: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position, Biol. Cybern. 36 (1980), no. 4, 193–202.
[19] I. Goodfellow, Y. Bengio, and A. Courville, Deep learning, MIT press, 2016.
[20] T. Guo, Z. Xu, X. Yao, H. Chen, K. Aberer, and K. Funaya, Robust online time series prediction with recurrent neural networks, IEEE Int. Conf. Data Sci. Adv. Analy. (DSAA), 2016, pp. 816–825.
[21] M. Hermans and B. Schrauwen, Training and analysing deep recurrent neural networks, Adv. Neural Inf. Process. Syst., vol. 26, 2013.
[22] A. Heuser and M. Zohner, Intelligent machine homicide, Int. Workshop Constructive Side-Channel Anal. Secure Design, Springer, 2012, pp. 249–264.
[23] H. Hindy, C. Tachtatzis, R. Atkinson, E. Bayne, and X. Bellekens, Mqtt-iot-ids2020: Mqtt internet of things intrusion detection dataset, 2020.
[24] I. Idrissi, M. Azizi, and O. Moussaoui, Iot security with deep learning-based intrusion detection systems: A systematic literature review, Fourth Int. Conf. Intell. Comput. Data Sci. (ICDS), 2020, pp. 1–10.
[25] A.M. Iliyasu and C. Fatichah, A quantum hybrid pso combined with fuzzy k-nn approach to feature selection and cell classification in cervical cancer detection, Sensors 17 (2017), no. 12, 2935.
[26] T. Reinbacher J. Diechmann, K. Heineke and D. Wee, The internet of things: How to capture the value of IoT, Tech. report, Technical Report, 2018.
[27] S.U. Jan, S. Ahmed, V. Shakhov, and I. Koo, Toward a lightweight intrusion detection system for the internet of things, IEEE Access 7 (2019), 42450–42471.
[28] G.W. Kibirige and C.s Sanga, A survey on detection of sinkhole attack in wireless sensor network, arXiv preprint arXiv:1505.01941 (2015).
[29] I. Kotenko, I. Saenko, and A. Branitskiy, Framework for mobile internet of things security monitoring based on big data processing and machine learning, IEEE Access 6 (2018), 72714–72723.
[30] L.I. Kuncheva, Combining pattern classifiers: Methods and algorithms, John Wiley & Sons, 2014. [31] Y. LeCun, Y. Bengio, and G. Hinton, Deep learning, Nature 521 (2015), no. 7553, 436–444.
[32] L. Lerman, G. Bontempi, and O. Markowitch, A machine learning approach against a masked AES, J. Cryptographic Engin. 5 (2015), no. 2, 123–139.
[33] S. Li and L. Da Xu, Securing the internet of things, Syngress, 2017.
[34] W. Li, P. Yi, Y. Wu, L. Pan, and J. Li, A new intrusion detection system based on KNN classification algorithm in wireless sensor network, J. Electric. Comput. Engin. 2014 (2014).
[35] G. Liu, H. Zhao, F. Fan, G. Liu, Q. Xu, and S. Nazir, An enhanced intrusion detection model based on improved kNN in WSNs, Sensors 22 (2022), no. 4, 1407.
[36] J. Liu and W. Sun, Smart attacks against intelligent wearables in people-centric internet of things, IEEE Commun. Mag. 54 (2016), no. 12, 44–49.
[37] H. Maghrebi, T. Portigliatti, and E. Prouff, Breaking cryptographic implementations using deep learning techniques, Int. Conf. Secur. Privacy Appl. Cryptography Engin., 2016, pp. 3–26.
[38] P. Malhotra, L. Vig, G. Shroff, and P. Agarwal, Long short term memory networks for anomaly detection in time series, ESANN., vol. 89, 2015, pp. 89–94.
[39] N. McLaughlin, J. Martinez del Rincon, B.B. Kang, A.W.A. Wahab, H.J. Lee, and H. Kim, Deep android malware detection, Proc. Seventh ACM Conf. Data Appl. Secur. Privacy, 2017, pp. 301–308.
[40] M. Nawir, A. Amir, N. Yaakob, and O.B. Lynn, Internet of things (IoT): Taxonomy of security attacks, 3rd Int. Conf. Electronic Design (ICED), IEEE, 2016, pp. 321–326.
[41] H.F. Nweke, Y.W. Teh, M.A. Al-garadi, and U.R. Alo, Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: State of the art and research challenges, Expert Syst. Appl. 105 (2018), 233–261.
[42] M. O’Neill and C. Ryan, Grammatical evolution, IEEE Trans. Evol. Comput. 5 (2001), no. 4, 349–358.
[43] R. Pascanu, C. Gulcehre, K. Cho, and Y. Bengio, How to construct deep recurrent neural networks, arXiv Prepr. arXiv1312.6026 (2013).
[44] D. Perez, M.A. Astor, D.P. Abreu, and E. Scalise, Intrusion detection in computer networks using hybrid machine learning techniques, XLIII Latin Amer. Comput. Conf.(CLEI), 2017, pp. 1–10.
[45] P. Pongle and G. Chavan, Real time intrusion and wormhole attack detection in internet of things, Int. J. Comput. Appl. 121 (2015), no. 9.
[46] Y. Qin, D. Song, H. Chen, W. Cheng, G. Jiang, and G. Cottrell, A dual-stage attention-based recurrent neural network for time series prediction, arXiv Prepr. arXiv1704.02971 (2017).
[47] R. Zaheer R. Khan, S.U. Khan and S. Khan, Future internet: the internet of things architecture, possible applications and key challenges, 10th Int. Conf. Front. Inf. Technol., 2012, pp. 257–260.
[48] B. Rajagopalan and U. Lall, A k-nearest-neighbor simulator for daily precipitation and other weather variables, Water Resources Res. 35 (1999), no. 10, 3089–3101.
[49] A. Rajan, J. Jithish, and S. Sankaran, Sybil attack in IOT: Modelling and defenses, Int. Conf. Adv. Comput. Commun. Inf.(ICACCI), IEEE, 2017, pp. 2323–2327.
[50] Syed Rizvi, Aaron Kurtz, Joshua Pfeffer, and Mohammad Rizvi, Securing the internet of things (IoT): A securitytaxonomy for IoT, 17th IEEE Int. Conf. Trust, Secur. Privacy Comput. Commun./12th IEEE Int. Conf. Big Data Sci. Engin. (TrustCom/BigDataSE), IEEE, 2018, pp. 163–168.
[51] D.E. Rumelhart, G.E. Hinton, and R.J. Williams, Learning representations by back-propagating errors, Nature 323 (1986), no. 6088, 533–536.
[52] C. Ryan, J.J. Collins, and M.O’N. Neill, Grammatical evolution: Evolving programs for an arbitrary language, Eur. Conf. Genetic Program., 1998, pp. 83–96.
[53] T. Saba, T. Sadad, A. Rehman, Z. Mehmood, and Q. Javaid, Intrusion detection system through advance machine learning for the internet of things networks, IT Profess. 23 (2021), no. 2, 58–64.
[54] S. Samonas and D. Coss, The CIA strikes back: Redefining confidentiality, integrity and availability in security, J. Inf. Syst. Secur. 10 (2014), no. 3.
[55] B. Sch¨olkopf, Z. Luo, and V. Vovk, Empirical inference: Festschrift in honor of Vladimir N. Vapnik, Springer Science & Business Media, 2013.
[56] D.T. Shipmon, J.M. Gurevitch, P.M. Piselli, and S.T. Edwards, Time series anomaly detection; detection of anomalous drops with limited features and sparse examples in noisy highly periodic data, arXiv Prepr. arXiv1708.03665 (2017).
[57] K. Sonar and H. Upadhyay, A survey: Ddos attack on internet of things, Int. J. Eng. Res. Dev. 10 (2014), no. 11, 58–63.
[58] S. Tong and D. Koller, Support vector machine active learning with applications to text classification, J. Mach.
Learn. Res. 2 (2001), no. Nov, 45–66 
[59] A. Torkaman and M.A. Seyyedi, Analyzing iot reference architecture models, Int. J. Comput. Sci. Softw. Eng. 5 (2016), no. 8, 154.
[60] P. Torres, C. Catania, S. Garcia, and C.G. Garino, An analysis of recurrent neural networks for botnet detection behavior, IEEE Biennial Cong. Argentina (ARGENCON), 2016, pp. 1–6.
[61] S. Vashi, J. Ram, J. Modi, S. Verma, and C. Prakash, Internet of things (IoT): A vision, architectural elements, and security issues, Int. Conf. I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017, pp. 492–496.
[62] L. Xiao, X. Wan, X. Lu, Y. Zhang, and D. Wu, Iot security techniques based on machine learning: How do iot devices use AI to enhance security?, IEEE Signal Process. Mag. 35 (2018), no. 5, 41–49.
[63] L. Yang, C. Ding, M. Wu, and K. Wang, Robust detection of false data injection attacks for data aggregation in an internet of things-based environmental surveillance, Computer Networks 129 (2017), 410–428.
[64] I. Yaqoob, H. Alasmary, A. Alashaikh, E. Ahmed, H. Song, and J.J.P.C. Rodrigues, The rise of ransomware and emerging security challenges in the internet of things, Comput. Networks 129 (2017), 444–458.
[65] Y. Yang Y. Peng X. Wang Z. Yang, Y. Yue and W. Liu, Study and application on the architecture and key technologies for IOT, Int. Conf. Multimedia Technol., 2011, pp. 747–751.
[66] Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, On secure wireless communications for iot under eavesdropper collusion, IEEE Trans. Autom. Sci. Eng. 13 (2015), no. 3, 1281–1293.
[67] K. Zhao and L. Ge, A survey on the internet of things security, Ninth Int. Conf. Comput. Intell. Secur., 2013,pp. 663 667.
[68] L. Zhu and N. Laptev, Deep and confident prediction for time series at uber, IEEE Int. Conf. Data Min. Workshops (ICDMW), 2017, pp. 103–110.
Volume 14, Issue 5
May 2023
Pages 27-35
  • Receive Date: 11 December 2022
  • Revise Date: 26 January 2023
  • Accept Date: 14 March 2023