Research
Research
information
technology collage
Cybersecurity
Department
student preparation
Sadik Ali Sadik
Muhammad Ahmed Ismail Al-Sharabi
Abdul Malik Balghaith Yahya Al-Ahdal
Yaqub Ali Saghir Shalkhuf
Sana’a Yemen 2023/2024
Abstract: The Internet of Things (IoT) is a well-known technology that has a significant
impact on many areas, including connections, work, healthcare, and the economy. IoT has
the potential to improve life in a variety of contexts, from smart cities to classrooms, by
automating tasks, increasing output, and decreasing anxiety. Cyberattacks and threats, on
the other hand, have a significant impact on intelligent IoT applications. Many traditional
techniques for protecting the IoT are now ineffective due to new dangers and
vulnerabilities. To keep their security procedures, IoT systems of the future will need AI-
efficient machine learning and deep learning. The capabilities of artificial intelligence,
particularly machine and deep learning solutions, must be used if the next-generation IoT
system is to have a continuously changing and up-to-date security system. IoT security
intelligence is examined in this paper from every angle available. An innovative method for
protecting IoT devices against a variety of cyberattacks is to use machine learning and
deep learning to gain information from raw data. Finally, we discuss relevant research
issues and potential next steps considering our findings. This article examines how
machine learning and deep learning can be used to detect attack patterns
in unstructured data and safeguard IoT devices
5. Conclusions
This research provides a comprehensive review of the
literature on IoT security awareness.
IoT model, IoT-based intelligent environments, and
associated security challenges
are some of the topics highlighted by machine learning
solutions. In this work, we evaluated
the knowledge base on IoT security intelligence. We
investigated the IoT paradigm,
IoT-based smart environments, security issues, and
machine learning solutions to these
problems. Identifying and protecting IoT devices and
systems necessitates a thorough
examination of IoT system architectures, as well as the
cyberattacks that can break them
down layer by layer. We investigated how various
machine learning and deep learning
technologies could be used to improve IoT security. If
IoT security is to be effective, it
must be built on machine learning or deep learning
models that use data attributes. Before
it can assist in making intelligent decisions, the system
must have an effective learning
algorithm based on the IoT security knowledge
acquired and the application for which
it is used. We also talked about potential directions and
approaches for future research
on teaching and learning. Because of these issues, References
there is room for new research in the 1. Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.;
field, and this is where the opportunity to develop Sikdar, B. A Survey on IoT Security: Application Areas,
effective strategies for continuously Security Threats,
improving IoT security presents itself. We believe that and Solution Architectures. IEEE Access 2019, 7, 82721–
our research on machine-learningand 82743. [CrossRef]
deep-learning-based security solutions is a step in the 2. ´Slusarczyk, B. Industry 4.0: Are we ready? Pol. J. Manag.
right direction and will help Stud. 2018, 17, 232–248. [CrossRef]
3. Sarker, I.H.; Kayes, A.S.M.; Badsha, S.; Alqahtani, H.; of Things: Challenges, Fundamentals, and Enabling
Watters, P.; Ng, A. Cybersecurity data science: An overview Technologies. IEEE Internet Things J. 2019, 6, 7946–7970.
from machine [CrossRef]
learning perspective. J. Big Data 2020, 7, 41. [CrossRef] 18. Rawat, D.B.; Doku, R.; Garuba, M. Cybersecurity in Big
4. Minerva, R.; Biru, A.; Rotondi, D. Towards a definition of Data Era: From Securing Big Data to Data-Driven Security.
the Internet of Things (IoT). IEEE Internet Initiat. 2015, 1, 1– IEEE Trans.
86. Serv. Comput. 2019, 14, 2055–2072. [CrossRef]
5. Khan, M.A.; Salah, K. IoT security: Review, blockchain 19. Farrokhi, A.; Farahbakhsh, R.; Rezazadeh, J.; Minerva, R.
solutions, and open challenges. Future Gener. Comput. Syst. Application of Internet of Things and artificial intelligence for
2018, 82, smart
395–411. [CrossRef] fitness: A survey. Comput. Netw. 2021, 189, 107859.
6. Minoli, D.; Occhiogrosso, B. Blockchain mechanisms for IoT [CrossRef]
security. IOT 2018, 1, 1–13. [CrossRef] 20. Yahya, F.; Zaki, A.F.A.; Moung, E.G.; Sallehudin, H.; Bakar,
7. Zhang, Z.-K.; Cho, M.C.Y.; Wang, C.-W.; Hsu, C.-W.; Chen, N.A.A.; Utomo, R.G. An IoT-based Coastal Recreational
C.-K.; Shieh, S. IoT security: Ongoing challenges and research Suitability
opportunities. In Proceedings of the 2014 IEEE 7th System using Effective Messaging Protocol. Int. J. Adv.
International Conference on Service-Oriented Computing and Comput. Sci. Appl. 2021, 12, 8. [CrossRef]
Applications, 21. Routray, S.K.; Gopal, D.; Javali, A.; Sahoo, A. Narrowband
Matsue, Japan, 17–19 November 2014; pp. 230–234. IoT (NBIoT) Assisted Smart Grids. In Proceedings of the 2021
8. Noor, M.B.M.; Hassan,W.H. Current research on Internet International
of Things (IoT) security: A survey. Comput. Netw. 2019, 148, Conference on Artificial Intelligence and Smart Systems
283–294. (ICAIS), Coimbatore, India, 25–27March 2021; pp. 1454–
[CrossRef] 1458.
9. Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; 22. Sangra, P.; Rana, B.; Singh, Y. Energy efficiency in IoT-
Ghani, N. Demystifying IoT Security: An Exhaustive Survey on based smart healthcare. In Proceedings of Third International
IoT Conference on
Vulnerabilities and a First Empirical Look on Internet-Scale Computing, Communications, and Cyber-Security; Springer:
IoT Exploitations. IEEE Commun. Surv. Tutor. 2019, 21, 2702– Singapore, 2023; pp. 503–515.
2733. 23. Alshamrani, M. IoT and artificial intelligence
[CrossRef] implementations for remote healthcare monitoring systems:
10. Abbas, S.G.; Hashmat, F.; Shah, G.A. A multi-layer A survey. J. King Saud
industrial-IoT attack taxonomy: Layers, dimensions, Univ. Comput. Inf. Sci. 2021, 34, 4687–4701. [CrossRef]
techniques and 24. Kumar, Y.; Singla, R. Effectiveness of Machine and Deep
application. In Proceedings of the 2020 IEEE 19th Learning in IOT-Enabled Devices for Healthcare System. In
International Conference on Trust, Security and Privacy in Intelligent
Computing and Internet of Things for Healthcare and Industry; Springer:
Communications (TrustCom), Guangzhou, China, 29 Berlin/Heidelberg, Germany, 2022; pp. 1–19. [CrossRef]
December 2020–1 January 2021; pp. 1820–1825. 25. Tahsien, S.M.; Karimipour, H.; Spachos, P. Machine
11. Dalal, K.R. Analysing the role of supervised and learning based solutions for security of Internet of Things
unsupervised machine learning in iot. In Proceedings of the (IoT): A survey.
2020 International J. Netw. Comput. Appl. 2020, 161, 102630. [CrossRef]
Conference on Electronics and Sustainable Communication Brain Sci. 2023, 13, 683 26 of 30
Systems (ICESC), Coimbatore, India, 2–4 July 2020; pp. 75–79. 26. Kaur, J.; Jaskaran; Sindhwani, N.; Anand, R.; Pandey, D.
12. Hussain, F.; Hussain, R.; Hassan, S.A.; Hossain, E. Machine Implementation of IoT in Various Domains, in IoT Based
Learning in IoT Security: Current Solutions and Future Smart Applications;
Challenges. Springer: Berlin/Heidelberg, Germany, 2023; pp. 165–178.
IEEE Commun. Surv. Tutor. 2020, 22, 1686–1721. [CrossRef] [CrossRef]
13. Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.K.; Du, X.; Ali, I.; 27. Stracener, C.; Samelson, Q.; Mackie, J.; Ihaza, M. The
Guizani, M. A Survey of Machine and Deep Learning Methods Internet of Things Grows Artificial Intelligence and Data
for Sciences. IT Prof.
Internet of Things (IoT) Security. IEEE Commun. Surv. Tutor. 2019, 21, 55–62. [CrossRef]
2018, 22, 1646–1685. [CrossRef] 28. Chen, L.; Hu,W.; Jamieson, K.; Chen, X.; Fang, D.;
14. Zhou, W.; Jia, Y.; Peng, A.; Zhang, Y.; Liu, P. The Effect of Gummeson, J. Pushing the Physical Limits of {IoT} Devices
IoT New Features on Security and Privacy: New Threats, with Programmable
Existing Metasurfaces. In 18th USENIX Symposium on Networked
Solutions, and Challenges Yet to Be Solved. IEEE Internet Systems Design and Implementation (NSDI 21); NSDI: Boston,
Things J. 2018, 6, 1606–1616. [CrossRef] MA, USA,
15. Li, S.; Xu, L.D.; Zhao, S. The internet of things: A survey. 2021; pp. 425–438.
Inf. Syst. Front. 2015, 17, 243–259. [CrossRef] 29. Noura, M.; Atiquzzaman, M.; Gaedke, M. Interoperability
16. Asim, M.; Arif, M.; Rafiq, M. Applications of Internet of in Internet of Things: Taxonomies and Open Challenges. Mob.
Things in university libraries of Pakistan: An empirical Netw.
investigation. Appl. 2018, 24, 796–809. [CrossRef]
J. Acad. Libr. 2022, 48, 102613. [CrossRef] 30. Behrendt, F. Cycling the Smart and Sustainable City:
17. Ma, Z.; Xiao, M.; Xiao, Y.; Pang, Z.; Poor, H.V.; Vucetic, B. Analyzing EC Policy Documents on Internet of Things,
High-Reliability and Low-Latency Wireless Communication for Mobility and
Internet Transport, and Smart Cities. Sustainability 2019, 11, 763.
[CrossRef]
31. Kumar, S.; Tiwari, P.; Zymbler, M. Internet of Things is a 553–558. [CrossRef]
revolutionary approach for future technology enhancement: 43. Fernandes, B.H.P. Smart Bed IoT-Based Wireless Data
A review. Acquisition for Untethered Patients. Ph.D. Thesis,
J. Big Data 2019, 6, 1–21. [CrossRef] Universidade de
32. Li, Y.; Alqahtani, A.; Solaiman, E.; Perera, C.; Jayaraman, Coimbra, Coimbra, Portugal, 2022.
P.P.; Buyya, R.; Morgan, G.; Ranjan, R. IoT-CANE: A unified 44. Janarthanan, T.; Zargari, S. Feature selection in UNSW-
knowledge NB15 and KDDCUP’99 datasets. In Proceedings of the 2017
management system for data-centric Internet of Things IEEE 26th
application systems. J. Parallel Distrib. Comput. 2019, 131, International Symposium on Industrial Electronics (ISIE),
161–172. Edinburgh, UK, 19–21 June 2017; pp. 1881–1886.
[CrossRef] 45. Karn, R.R.; Kudva, P.; Elfadel, I.M. LearningWithout
33. Nawalagatti, A. IoT: A Boon for Advancement of Forgetting: A New Framework for Network Cyber Security
Technology. Int. J. Res. Appl. Sci. Eng. Technol. 2022, 10, 652– Threat Detection.
655. [CrossRef] IEEE Access 2021, 9, 137042–137062. [CrossRef]
34. Ja, S.; Dhasb, J.T.M.; Angelc, T.S. Proposed Novel 46. Gharaibeh, M.; Papadopoulos, C. Darpa-2009 Intrusion
Methodology for Automatic Drainage Block Identification in Detection Dataset Report. Tech. Rep. 2014. Available online:
Smart Cities Using https://www.isi.edu/~johnh/PAPERS/Gharaibeh14a.pdf
Internet of Things. In Advances in Parallel Computing (accessed on 31 December 2022).
Algorithms, Tools and Paradigms; IOS Press: Amsterdam, The 47. Ahmed, M.; Byreddy, S.; Nutakki, A.; Sikos, L.F.; Haskell-
Netherlands, 2022. Dowland, P. ECU-IoHT: A dataset for analyzing cyberattacks in
35. Muthulakshmi, S.; Chitra, R. IoT technologies, applications Internet
and challenges, blockchain and its role in IoT: A survey. Int. J. of Health Things. Ad. Hoc. Netw. 2021, 122, 102621.
Internet [CrossRef]
Technol. Secur. Trans. 2022, 12, 321–352. [CrossRef] 48. Moustafa, N. A new distributed architecture for
36. Singh, P.K.; Singh, S.; Usman, H.; Urooj, S. Recent evaluating AI-based security systems at the edge: Network
Advances and Future Trends of IoT-Based Devices. In Energy TON_IoT datasets.
Harvesting; Sustain. Cities Soc. 2021, 72, 102994. [CrossRef]
Chapman and Hall/CRC: Boca Raton, FL, USA, 2022; pp. 179– 49. Kilincer, I.F.; Ertam, F.; Sengur, A. Machine learning
203. methods for cyber security intrusion detection: Datasets and
37. Cˇ olakovic´, A.; Salihovic´, N.; Dželihodžic´, A. Adaptive comparative
Traffic Management Systems Based on the Internet of Things study. Comput. Netw. 2021, 188, 107840. [CrossRef]
(IoT). In 50. Yavanoglu, O.; Aydos, M. A review on cyber security
Proceedings of Advanced Technologies, Systems, and datasets for machine learning algorithms. In Proceedings of
Applications VII: Proceedings of the International Symposium the 2017 IEEE
on Innovative and International Conference on Big Data (Big Data), Boston, MA,
Interdisciplinary Applications of Advanced Technologies (IAT) USA, 11–14 December 2017; pp. 2186–2193.
2022; Springer International Publishing: Cham, Switzerland, 51. Amit, I.; Matherly, J.; Hewlett, W.; Xu, Z.; Meshi, Y.;
2022; Weinberger, Y. Machine learning in cyber-security-problems,
pp. 426–437. challenges and
38. Perwej, Y.; AbouGhaly, M.A.; Kerim, B.; Harb, H.A.M. An data sets. arXiv preprint 2018, arXiv:1812.07858.
Extended Review on Internet of Things (iot) and Its Promising Brain Sci. 2023, 13, 683 27 of 30
Applications; 52. Soheily-Khah, S.; Marteau, P.-F.; Bechet, N. Intrusion
Communications on Applied Electronics: New York, NY, USA, Detection in Network Systems Through Hybrid Supervised
2019; pp. 2394–4714. and Unsupervised
39. Mazhar, T.; Irfan, H.M.; Haq, I.; Ullah, I.; Ashraf, M.; Al Machine Learning Process: A Case Study on the ISCX Dataset.
Shloul, T.; Ghadi, Y.Y.; Imran; Elkamchouchi, D.H. Analysis of In Proceedings of the 2018 1st International Conference on
Challenges Data Intelligence and Security (ICDIS), South Padre Island, TX,
and Solutions of IoT in Smart Grids Using AI and Machine USA, 8–10 April 2018; pp. 219–226. [CrossRef]
Learning Techniques: A Review. Electronics 2023, 12, 242. 53. Apruzzese, G.; Colajanni, M.; Ferretti, L.; Guido, A.;
[CrossRef] Marchetti, M. On the effectiveness of machine and deep
40. Qureshi, A.; Qureshi, M.A.; Haider, H.A.; Khawaja, R. A learning for cyber
review on machine learning techniques for secure IoT security. In Proceedings of the 2018 10th international
networks. In conference on cyber Conflict (CyCon), Tallinn, Estonia, 29
Proceedings of the 2020 IEEE 23rd international multitopic May–1 June 2018;
conference (INMIC), Bahawalpur, Pakistan, 5–7 November pp. 371–390.
2020; 54. Putra, M.A.R.; Hostiadi, D.P.; Ahmad, T. Botnet dataset
pp. 1–6. with simultaneous attack activity. Data Brief 2022, 45,
41. Mazhar, T.; Malik, M.A.; Haq, I.; Rozeela, I.; Ullah, I.; Khan, 108628. [CrossRef]
M.A.; Adhikari, D.; Ben Othman, M.T.; Hamam, H. The Role of 55. Folino, G.; Pisani, F. Evolving meta-ensemble of classifiers
ML, for handling incomplete and unbalanced datasets in the
AI and 5G Technology in Smart Energy and Smart Building cyber security
Management. Electronics 2022, 11, 3960. [CrossRef] domain. Appl. Soft Comput. 2016, 47, 179–190. [CrossRef]
42. Meena, G.; Choudhary, R.R. A review paper on IDS 56. Kasim, Ö. A Robust DNS Flood Attack Detection with a
classification using KDD 99 and NSL KDD dataset in WEKA. In Hybrid Deeper Learning Model. Comput. Electr. Eng. 2022,
Proceedings 100, 107883.
of the 2017 International Conference on Computer, [CrossRef]
Communications and Electronics (Comptelix), Jaipur, India, 1– 57. Kent, A.D. Comprehensive,Multi-Source Cyber-Security
2 July 2017; pp. Events Data Set; Los Alamos National Lab. (LANL): Los
Alamos, NM, USA, 2015.
58. Xiao, L.;Wan, X.; Lu, X.; Zhang, Y.;Wu, D. IoT security 71. Khan, J.; Khan, J.; Ali, F.; Ullah, F.; Bacha, J.; Lee, S.
techniques based on machine learning: How do IoT devices Artificial intelligence and internet of things (AI-IoT)
use AI to technologies in response
enhance security? IEEE Signal Process. Mag. 2018, 35, 41–49. to COVID-19 pandemic: A systematic review. IEEE Access
[CrossRef] 2022, 10, 62613–62660. [CrossRef]
59. Ngo, Q.-D.; Nguyen, H.-T.; Le, V.-H.; Nguyen, D.-H. A 72. Ranaldi, L.; Pucci, G. Knowing Knowledge: Epistemological
survey of IoT malware and detection methods based on static Study of Knowledge in Transformers. Appl. Sci. 2023, 13, 677.
features. [CrossRef]
ICT Express 2020, 6, 280–286. [CrossRef] 73. Hasan, N.; Chen, Z.; Zhao, C.; Zhu, Y.; Liu, C. IoT Botnet
60. Sarker, I.H. Deep Cybersecurity: A Comprehensive Detection framework from Network Behavior based on
Overview from Neural Network and Deep Learning Extreme
Perspective. SN Comput. Learning Machine. In Proceedings of the IEEE INFOCOM
Sci. 2021, 2, 154. [CrossRef] 2022-IEEE Conference on Computer Communications
61. Kumar, K.D.; Sudhakara, M.; Poluru, R.K. Towards the Workshops
integration of blockchain and IoT for security challenges in (INFOCOM WKSHPS), New York, NY, USA, 2–5 May 2022; pp.
IoT: A review. 1–6.
Res. Anthol. Converg. Blockchain Internet Things Secur. 2023, 74. Montanaro, T.; Sergi, I.; Stefanizzi, I.; Landi, L.; Di Donato,
193–209. [CrossRef] L.; Patrono, L. IoT-Aware Architecture to Guarantee Safety of
62. Kumar, K.D.; Venkata Rathnam, T.; Venkata Ramana, R.; Maintenance Operators in Industrial Plants. Appl. Syst. Innov.
Sudhakara, M.; Poluru, R.K. Towards the Integration of 2023, 6, 46. [CrossRef]
Blockchain and 75. Haneef, S.; Venkataraman, N. Proactive Fault Prediction
IoT for Security Challenges in IoT. 2019. Available online: of Fog Devices Using LSTM-CRP Conceptual Framework for
https://www.igi-global.com/chapter/towards-the- IoT
integration-ofblockchain- Applications. Sensors 2023, 23, 2913.
and-iot-for-security-challenges-in-iot/310448 (accessed on 31 76. Shah, M.; Vakharia, V.; Chaudhari, R.; Vora, J.; Pimenov,
December 2022). D.Y.; Giasin, K. Tool wear prediction in face milling of stainless
63. Bin Zikria, Y.; Afzal, M.K.; Kim, S.W.; Marin, A.; Guizani, M. steel
Deep learning for intelligent IoT: Opportunities, challenges using singular generative adversarial network and LSTM deep
and learning models. Int. J. Adv. Manuf. Technol. 2022, 121, 723–
solutions. Comput. Commun. 2020, 164, 50–53. [CrossRef] 736.
64. Mirmozaffari, M.; Yazdani, M.; Boskabadi, A.; Dolatsara, [CrossRef]
H.A.; Kabirifar, K.; Golilarz, N.A. A Novel Machine Learning 77. Mendonça, R.V.; Silva, J.C.; Rosa, R.L.; Saadi, M.;
Approach Rodriguez, D.Z.; Farouk, A. A lightweight intelligent intrusion
Combined with Optimization Models for Eco-Efficiency detection system
Evaluation. Appl. Sci. 2020, 10, 5210. [CrossRef] for industrial internet of things using deep learning
65. Mirmozaffari, M.; Shadkam, E.; Khalili, S.M.; Kabirifar, K.; algorithms. Expert Syst. 2021, 39, e12917. [CrossRef]
Yazdani, R.; Gashteroodkhani, T.A. A novel artificial intelligent 78. Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A. Internet of
approach: Comparison of machine learning tools and Things: Security and Solutions Survey. Sensors 2022, 22,
algorithms based on optimization DEA Malmquist 7433. [CrossRef]
productivity index for 79. Tsimenidis, S.; Lagkas, T.; Rantos, K. Deep learning in IoT
eco-efficiency evaluation. Int. J. Energy Sect. Manag. 2021, intrusion detection. J. Netw. Syst. Manag. 2022, 30, 1–40.
15, 523–550. [CrossRef] [CrossRef]
66. Sarker, I.H.; Khan, A.I.; Abushark, Y.B.; Alsolami, F. Brain Sci. 2023, 13, 683 28 of 30
Internet of Things (IoT) Security Intelligence: A 80. Alshohoumi, F.; Sarrab, M.; AlHamadani, A.; Al-Abri, D.
Comprehensive Overview, Systematic Review of Existing IoT Architectures Security and
Machine Learning Solutions and Research Directions. Mob. Privacy
Netw. Appl. 2022, 1–17. [CrossRef] Issues and Concerns. Int. J. Adv. Comput. Sci. Appl. 2019, 10,
67. Mirmozaffari, M.; Shadkam, E.; Khalili, S.M.; Yazdani, M. 232–251. [CrossRef]
Developing a Novel Integrated Generalised Data 81. Jha, K.K.; Jha, R.; Jha, A.K.; Hassan, M.A.M.; Yadav, S.K.;
Envelopment Analysis Mahesh, T. A Brief Comparison on Machine Learning
(DEA) to Evaluate Hospitals Providing Stroke Care Services. Algorithms Based
Bioengineering 2021, 8, 207. [CrossRef] on Various Applications: A Comprehensive Survey. In
68. Gupta, C.; Johri, I.; Srinivasan, K.; Hu, Y.-C.; Qaisar, S.M.; Proceedings of the 2021 IEEE International Conference on
Huang, K.-Y. A Systematic Review on Machine Learning and Computation
Deep System and Information Technology for Sustainable Solutions
Learning Models for Electronic Information Security in Mobile (CSITSS), Bangalore, India, 16–18 December 2021; pp. 1–5.
Networks. Sensors 2022, 22, 2017. [CrossRef] 82. Balo, F.; Tor˘ gul, B. Internet of Things: A Survey. Int. J.
69. Koroniotis, N.; Moustafa, N.; Slay, J. A new Intelligent Appl. Math. Electron. Comput. 2016, 104–110. [CrossRef]
Satellite Deep Learning Network Forensic framework for 83. Albalawi, A.M.; Almaiah, M.A. Assessing and reviewing of
smart satellite cyber-security threats, attacks, mitigation techniques in IoT
networks. Comput. Electr. Eng. 2022, 99, 107745. [CrossRef] environment.
70. Thomas, L.; Bhat, S. Machine learning and deep learning J. Theor. Appl. Inf. Technol. 2022, 100, 2988–3011.
techniques for IoT-based intrusion detection systems: A 84. Deep, S.; Zheng, X.; Jolfaei, A.; Yu, D.; Ostovari, P.; Bashir,
literature A.K. A survey of security and privacy issues in the Internet of
review. Int. J. Manag. Technol. Soc. Sci. 2021, 6, 296–314. Things
[CrossRef] from the layered context. Trans. Emerg. Telecommun.
Technol. 2020, 33, e3935. [CrossRef]
85. Navya, P.; Rama, G.S.; Kumar, T.P.; Pasha, S.N.; 99. Aregbesola, M.K.; Griva, I. A Fast Algorithm for Training
Mahender, K. IoT technology: Architecture, stack, security Large Scale Support Vector Machines. J. Comput. Commun.
risks, privacy risks 2022, 10,
and its applications. In Proceedings of AIP Conference 1–15. [CrossRef]
Proceedings; AIP Publishing LLC.: College Park, MD, USA, 100. Agghey, A.Z.; Mwinuka, L.J.; Pandhare, S.M.; Dida, M.A.;
2022; p. 020062. Ndibwile, J.D. Detection of Username Enumeration Attack on
86. Chatterjee, U.; Ray, S. Security Issues on IoT SSH
Communication and Evolving Solutions. In Soft Computing in Protocol: Machine Learning Approach. Symmetry 2021, 13,
Interdisciplinary Sciences; 2192. [CrossRef]
Springer: Berlin/Heidelberg, Germany, 2022; pp. 183–204. 101. Júnior, E.C.; Costa,W.L.; Portela, A.L.C.; Rocha, L.S.;
[CrossRef] Gomes, R.L.; Andrade, R.M.C. Detecting Attacks and Locating
87. Haque, A.K.M.B.; Bhushan, B.; Dhiman, G. Conceptualizing Malicious
smart city applications: Requirements, architecture, security Devices Using Unmanned Air Vehicles and Machine Learning.
issues, J. Internet Serv. Appl. 2022, 13, 11–20. [CrossRef]
and emerging trends. Expert Syst. 2021, 39, e12753. 102. Edemacu, K.; Kim, J.W. Multi-Party Privacy-Preserving
[CrossRef] Logistic Regression with Poor Quality Data Filtering for IoT
88. Jangjou, M.; Sohrabi, M.K. A Comprehensive Survey on Contributors.
Security Challenges in Different Network Layers in Cloud Electronics 2021, 10, 2049. [CrossRef]
Computing. 103. Puthal, D.;Wilson, S.; Nanda, A.; Liu, M.; Swain, S.;
Arch. Comput. Methods Eng. 2022, 29, 3587–3608. [CrossRef] Sahoo, B.P.; Yelamarthi, K.; Pillai, P.; El-Sayed, H.; Prasad, M.
89. Zahran, S.; Elkadi, H.; Helm,W. Fog of Things Framework Decision tree
to Handle Data Streaming Heterogeneity on Internet of based user-centric security solution for critical IoT
Things. In infrastructure. Comput. Electr. Eng. 2022, 99, 107754.
Proceedings of International Conference on Advanced [CrossRef]
Intelligent Systems and Informatics; Springer International 104. Abdaljabar, Z.H.; Ucan, O.N.; Alheeti, K.M.A. An intrusion
Publishing: Cham, detection system for IoT using KNN and decision-tree based
Switzerland, 2022; pp. 653–667. classification. In Proceedings of the 2021 International
90. Rasheed, M.A.; Saleem, J.; Murtaza, H.; Tanweer, H.A.; Conference of Modern Trends in Information and
Rasheed, M.A.; Ahmed, M. A Survey on Fog computing in IoT. Communication
VFAST Technology Industry (MTICTI), Sana’a, Yemen, 4–6 December
Trans. Softw. Eng. 2022, 9, 4. 2021; pp. 1–5.
91. Yassein, M.B.; Shatnawi, M.Q. Application layer protocols 105. Al-Ghaili, A.M.; Kasim, H.; Al-Hada, N.M. A secured data
for the Internet of Things: A survey. In Proceedings of the transform-and-transfer algorithm for energy internet-of-
2016 things
International Conference on Engineering & MIS (ICEMIS), applications. Telkomnika (Telecommun. Comput. Electron.
Agadir, Morocco, 22–24 September 2016; pp. 1–4. Control) 2021, 19, 1872–1883. [CrossRef]
92. Donta, P.K.; Srirama, S.N.; Amgoth, T.; Annavarapu, C.S.R. 106. Menter, Z.; Tee, W.Z.; Dave, R. Application of Machine
Survey on recent advances in IoT application layer protocols Learning-Based Pattern Recognition in IoT Devices. In
and Proceedings of
machine learning scope for research directions. Digit. International Conference on Communication and
Commun. Netw. 2021, 8, 727–744. [CrossRef] Computational Technologies; Springer: Singapore, 2021; pp.
93. Kakkar, L.; Gupta, D.; Saxena, S.; Tanwar, S. IoT 669–689.
architectures and its security: A review. In Proceedings of the 107. Meijin, L.; Zhiyang, F.; Junfeng, W.; Luyu, C.; Qi, Z.; Tao,
Second International Y.; Yinwei, W.; Jiaxuan, G. A Systematic Overview of Android
Conference on Information Management and Machine Malware
Intelligence; Springer: Singapore, 2021; pp. 87–94. Detection. Appl. Artif. Intell. 2021, 36, 2007327. [CrossRef]
94. Ahmad, Z.; Khan, A.S.; Shiang, C.W.; Abdullah, J.; Ahmad, Brain Sci. 2023, 13, 683 29 of 30
F. Network intrusion detection system: A systematic study of 108. Nakip, M.; Gelenbe, E. Botnet attack detection with
machine incremental online learning. In Proceedings of International
learning and deep learning approaches. Trans. Emerg. ISCIS Security
Telecommun. Technol. 2020, 32, e4150. [CrossRef] Workshop; Springer International Publishing: Cham,
95. Sarker, I.H. Deep Learning: A Comprehensive Overview on Switzerland, 2022; pp. 51–60.
Techniques, Taxonomy, Applications and Research Directions. 109. Ravikumar, D. Towards Enhancement of Machine
SN Learning Techniques Using CSE-CIC-IDS2018 Cybersecurity
Comput. Sci. 2021, 2, 420. [CrossRef] Dataset; Rochester
96. Abbas, G.; Mehmood, A.; Carsten, M.; Epiphaniou, G.; Institute of Technology: Rochester, NY, USA, 2021.
Lloret, J. Safety, Security and Privacy in Machine Learning 110. Van der Schyff, K.; Flowerday, S. Mediating effects of
Based Internet information security awareness. Comput. Secur. 2021, 106,
of Things. J. Sens. Actuator Netw. 2022, 11, 38. [CrossRef] 102313. [CrossRef]
97. Han, S.; Mannan, N.; Stein, D.C.; Pattipati, K.R.; Bollas, 111. Sarker, I.H. Machine Learning for Intelligent Data
G.M. Classification and regression models of audio and Analysis and Automation in Cybersecurity: Current and
vibration signals Future Prospects.
for machine state monitoring in precision machining systems. Ann. Data Sci. 2022, 1–26. [CrossRef]
J. Manuf. Syst. 2021, 61, 45–53. [CrossRef] 112. AKTAR, H.; PERKGÖZ, C. Autoencoder Aided Machine
98. Hsieh, S.-C. Prediction of Compressive Strength of Learning Methods for Intrusion Detection Systems. In New
Concrete and Rock Using an Elementary Instance-Based Trends in
Learning Algorithm. Technical, Natural Sciences, Engineering and Health Sciences;
Adv. Civ. Eng. 2021, 2021, 6658932. [CrossRef] Duvar Publishing: Izmir, Türkiye, 2022; p. 101.
113. Giordano, G.; Palomba, F.; Ferrucci, F. On the use of 125. Doshi, R.; Apthorpe, N.; Feamster, N. Machine Learning
artificial intelligence to deal with privacy in IoT systems: A DDoS Detection for Consumer Internet of Things Devices. In
systematic Proceedings
literature review. J. Syst. Softw. 2022, 193, 111475. of the 2018 IEEE Security and Privacy Workshops (SPW), San
[CrossRef] Francisco, CA, USA, 24 May 2018; pp. 29–35. [CrossRef]
114. Kallitsis, M.; Prajapati, R.; Honavar, V.;Wu, D.; Yen, J. 126. Zhang, C.; Sun, X.; Xia,W.; Zhang, J.; Zhu, H.;Wang, X.
Detecting and Interpreting Changes in Scanning Behavior in Deep Learning Based Double-Contention Random Access for
Large Network Massive
Telescopes. IEEE Trans. Inf. Forensics Secur. 2022, 17, 3611– Machine-Type Communications. IEEE Trans. Wirel. Commun.
3625. [CrossRef] 2022, 22, 1794–1807. [CrossRef]
115. Masum, M.H.R. IT-Security Challenges for IoT 127. Anidu, A.; Obuzor, Z. Evaluation of Machine Learning
Infrastructures; Frankfurt University of Applied Sciences: Algorithms on Internet of Things (IoT) Malware Opcodes.
Frankfurt am Main, Handb. Big
Germany, 2022. Data Anal. Forensics 2022, 177–191. [CrossRef]
116. Gordaliza, P.M. Computer-Aided Assessment of 128. Zhou, W.; Yu, B. A cloud-assisted malware detection and
Tuberculosis with Radiological Imaging: From Rule-Based suppression framework for wireless multimedia system in IoT
Methods to Deep based on
Learning. Ph.D. Thesis, Universidad Carlos III de Madrid, dynamic differential game. China Commun. 2018, 15, 209–
Madrid, Spain, 2022. 223. [CrossRef]
117. Elghamrawy, S.M.; Lotfy, M.O.; Elawady, Y.H. An 129. Chauhan, J.; Seneviratne, S.; Hu, Y.; Misra, A.;
Intrusion Detection Model Based on Deep Learning and Seneviratne, A.; Lee, Y. Breathing-Based Authentication on
Multi-Layer Perceptron Resource-Constrained
in the Internet of Things (IoT) Network. In International IoT Devices using Recurrent Neural Networks. Computer
Conference on Advanced Machine Learning Technologies and 2018, 51, 60–67. [CrossRef]
Applications; 130. Ismaeel, H.; Elmedany, W. Anomaly-based detection
Springer: Berlin/Heidelberg, Germany, 2022; pp. 34–46. Technique using Deep Learning for Internet of Things: A
[CrossRef] Survey. In
118. Uhricek, D.; Hynek, K.; Cejka, T.; Kolar, D. BOTA: Proceedings of the 2022 International Conference on
Explainable IoT Malware Detection in Large Networks; IEEE: Innovation and Intelligence for Informatics, Computing, and
New York, NY, USA, Technologies
2022; p. 1. [CrossRef] (3ICT), Sakheer, Bahrain, 20–21 November 2022; pp. 278–
119. Madhu, B.; Chari, M.V.G.; Vankdothu, R.; Silivery, A.K.; 284.
Aerranagula, V. Intrusion detection models for IOT networks 131. An, N.; Duff, A.; Naik, G.; Faloutsos, M.; Weber, S.;
via deep Mancoridis, S. Behavioral anomaly detection of malware on
learning approaches. Meas. Sens. 2022, 100641. [CrossRef] home routers. In
120. Al-Shareeda, M.A.; Manickam, S.; Saare, M.A. DDoS Proceedings of the 2017 12th International Conference on
attacks detection using machine learning and deep learning Malicious and Unwanted Software (MALWARE), Fajardo, PR,
techniques: USA,
Analysis and comparison. Bull. Electr. Eng. Inform. 2023, 12, 11–14 October 2017; pp. 47–54.
930–939. [CrossRef] 132. da Costa, K.A.; Papa, J.P.; Lisboa, C.O.; Munoz, R.; de
121. Gopal, S.B.; Poongodi, C.; Nanthiya, D.; Kirubakaran, T.; Albuquerque, V.H.C. Internet of Things: A survey on machine
Logeshwar, D.; Saravanan, B.K. Autoencoder based learningbased
Architecture for intrusion detection approaches. Comput. Netw. 2019, 151,
Mitigating Phishing URL attack in the Internet of Things (IoT) 147–157. [CrossRef]
Using Deep Neural Networks. In 2022 6th International 133. Wahi, V.; Yadav, S.; Thenuia, Y.; Chauhan, A. Anomaly
Conference Based Intrusion Detection for IoT. In Proceedings of the 2022
on Devices, Circuits and Systems (ICDCS); IEEE: New York, NY, 3rd
USA, 2022; pp. 427–431. [CrossRef] International Conference for Emerging Technology (INCET),
122. Bhattacharya, S.; Ghorai, S.; Khan, A.K. Systematic Study Belgaum, India, 27–29 May 2022; pp. 1–7.
of Detection Mechanism for Network Intrusion in Cloud, Fog, Brain Sci. 2023, 13, 683 30 of 30
and 134. Yang, X.; Peng, G.; Zhang, D.; Lv, Y. An Enhanced
Internet of Things Using Deep Learning. In Human-Centric Intrusion Detection System for IoT Networks Based on Deep
Smart Computing; Springer: Berlin/Heidelberg, Germany, Learning and
2023; Knowledge Graph. Secur. Commun. Netw. 2022, 2022,
pp. 31–43. [CrossRef] 4748528. [CrossRef]
123. Saheed, Y.K.; Baba, U.A.; Orje-Ishegh, T.; Longe, O.B. An 135. Thavamani, S.; Mahesh, D.; Sinthuja, U.; Manoharan, G.
Efficient Machine Learning and Deep Belief Network Models Crucial attacks in internet of things via artificial intelligence
for Wireless Intrusion Detection System. 2022. Available techniques:
online: The security survey. In AIP Conference Proceedings; AIP
https://www.researchgate.net/publication/364203267_ Publishing LLC.: College Park, MD, USA, 2022. [CrossRef]
An_Efficient_Machine_Learning_and_Deep_Belief_Network_ 136. Khan, R.; Yang, Q.; Ullah, I.; Rehman, A.U.; Bin Tufail, A.;
Models_for_Wireless_Intrusion_Detection_System (accessed Noor, A.; Rehman, A.; Cengiz, K. 3D convolutional neural
on networks
31 December 2022). based automatic modulation classification in the presence of
124. Deng, L.; Li, D.; Yao, X.; Wang, H. Retraction Note to: channel noise. IET Commun. 2021, 16, 497–509. [CrossRef]
Mobile network intrusion detection for IoT system based on 137. Haji, S.H.; Ameen, S.Y. Attack and Anomaly Detection in
transfer IoT Networks using Machine Learning Techniques: A Review.
learning algorithm. Clust. Comput. 2021, 24, 589. [CrossRef] Asian J.
Res. Comput. Sci. 2021, 9, 30–46. [CrossRef]
138. Abideen, Z.U.; Mazhar, T.; Razzaq, A.; Haq, I.; Ullah, I.; IPv6 Extension for Next-Generation IoT Networks. IEEE
Alasmary, H.; Mohamed, H.G. Analysis of Enrollment Criteria Internet Things J. 2021, 10, 2095–2103. [CrossRef]
in
Secondary Schools Using Machine Learning and Data Mining
Approach. Electronics 2023, 12, 694. [CrossRef]
139. Khan, W.U.; Imtiaz, N.; Ullah, I. Joint optimization of
NOMA-enabled backscatter communications for beyond 5G
IoT networks.
Internet Technol. Lett. 2020, 4, e265. [CrossRef]
140. Esmalifalak, M.; Liu, L.; Nguyen, N.; Zheng, R.; Han, Z.
Detecting Stealthy False Data Injection Using Machine
Learning in Smart
Grid. IEEE Syst. J. 2017, 11, 1644–1652. [CrossRef]
141. Pourghebleh, B.;Wakil, K.; Navimipour, N.J. A
Comprehensive Study on the Trust Management Techniques
in the Internet of
Things. IEEE Internet Things J. 2019, 6, 9326–9337. [CrossRef]
142. Hajjaji, Y.; Boulila, W.; Farah, I.R.; Romdhani, I.; Hussain,
A. Big data and IoT-based applications in smart
environments:
A systematic review. Comput. Sci. Rev. 2021, 39, 100318.
[CrossRef]
143. Stergiou, C.; Psannis, K.E.; Gupta, B.B.; Ishibashi, Y.
Security, privacy & efficiency of sustainable Cloud Computing
for Big Data &
IoT. Sustain. Comput. Inform. Syst. 2018, 19, 174–184.
[CrossRef]
144. Chui, K.T.; Liu, R.W.; Lytras, M.D.; Zhao, M. Big data and
IoT solution for patient behaviour monitoring. Behav. Inf.
Technol. 2019,
38, 940–949. [CrossRef]
145. Mkrttchian, V.; Gamidullaeva, L.; Finogeev, A.;
Chernyshenko, S.; Chernyshenko, V.; Amirov, D.; Potapova, I.
Big data and
Internet of Things (IoT) technologies’ influence on higher
education: Current state and future prospects. Int. J. Web-
Based Learn.
Teach. Technol. (IJWLTT) 2021, 16, 137–157. [CrossRef]
146. Khalil, H.; Rahman, S.U.; Ullah, I.; Khan, I.; Alghadhban,
A.J.; Al-Adhaileh, M.H.; Ali, G.; ElAffendi, M. A UAV-Swarm-
Communication Model Using a Machine-Learning Approach
for Search-and-Rescue Applications. Drones 2022, 6, 372.
[CrossRef]
147. Dehghantanha, A.; Choo, K.-K.R. Handbook of Big Data
and IoT Security; Springer: Berlin/Heidelberg, Germany, 2019.
148. Dwivedi, S.K.; Roy, P.; Karda, C.; Agrawal, S.; Amin, R.
Blockchain-Based Internet of Things and Industrial IoT: A
Comprehensive
Survey. Secur. Commun. Netw. 2021, 2021, 7142048.
[CrossRef]
149. Yousafzai, B.K.; Khan, S.A.; Rahman, T.; Khan, I.; Ullah, I.;
Rehman, A.U.; Baz, M.; Hamam, H.; Cheikhrouhou, O.
Student-
Performulator: Student Academic Performance Using Hybrid
Deep Neural Network. Sustainability 2021, 13, 9775.
[CrossRef]
150. Raj, A.; Shetty, S.D. IoT Eco-system, Layered
Architectures, Security and Advancing Technologies: A
Comprehensive Survey.
Wirel. Pers. Commun. 2021, 122, 1481–1517. [CrossRef]
151. Gupta, D.; Juneja, S.; Nauman, A.; Hamid, Y.; Ullah, I.;
Kim, T.; Tag eldin, E.M.; Ghamry, N.A. Energy Saving
Implementation in
Hydraulic Press Using Industrial Internet of Things (IIoT).
Electronics 2022, 11, 4061.
152. Hussain, A.; Nazir, S.; Khan, F.; Nkenyereye, L.; Ullah, A.;
Khan, S.; Verma, S. Kavita A Resource-Efficient Hybrid Proxy
Mobile