Abstract

The Internet of Things (IoT) is on the rise and it is giving a new shape to several fields such as smart cities, smart homes, smart health, etc. as it facilitates the connection of physical objects to the internet. However, this advancement comes along with new challenges in terms of security of the devices in the IoT networks. Some of these challenges come as network anomalies. Hence, this has prompted the use of network anomaly mitigation schemes as an integral part of the defense mechanisms of IoT networks in order to protect the devices from malicious users. Thus, several schemes have been proposed to mitigate network anomalies. This paper covers a review of different network anomaly mitigation schemes in IoT networks. The schemes' objectives, operational procedures, and strengths are discussed. A comparison table of the reviewed schemes, as well as a taxonomy based on the detection methodology, is provided. In contrast to other surveys that presented qualitative evaluations, our survey provides both qualitative and quantitative evaluations. The UNSW-NB15 dataset was used to conduct a performance evaluation of some classification algorithms used for network anomaly mitigation schemes in IoT. Finally, challenges and open issues in the development of network anomaly mitigation schemes in IoT are discussed.

Highlights

  • The emergence of a new type of networking paradigm which enables physical objects to communicate with the internet, known as the Internet of Things (IoT) has caught the attention of the research communities and the Information and Communication Technology (ICT) industry

  • The authors guided their discussion using a taxonomy that consists of the deployment strategies, detection methodologies, security threats and validation techniques employed in Intrusion Detection System (IDS) for IoT networks

  • Similar to the abovementioned surveys we focus on IDS schemes for IoT networks

Read more

Summary

INTRODUCTION

The emergence of a new type of networking paradigm which enables physical objects to communicate with the internet, known as the Internet of Things (IoT) has caught the attention of the research communities and the Information and Communication Technology (ICT) industry. Zarpelão et al [9] provided a review of IDS schemes for IoT networks proposed between 2009 and 2016 The authors guided their discussion using a taxonomy that consists of the deployment strategies, detection methodologies, security threats and validation techniques employed in IDS for IoT networks. A review and comparison of IDS schemes for IoT systems based on learning techniques with a focus on deployments, detection techniques as well as attacks treated by each scheme is presented. The aforementioned surveys discussed the general IoT network landscape, architecture, standards, and protocols as well as a review of the proposed IDS schemes for IoT.

BACKGROUND
PERFORMANCE EVALUATION
RESULTS AND DISCUSSION
CHALLENGES AND FUTURE DIRECTION
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.