Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review

In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0), where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have evolved exponentially on a large scale. The rapid development of IoT devices and networks in various forms generat...

Full description

Bibliographic Details
Main Authors: Mujaheed Abdullahi, Yahia Baashar, Hitham Alhussian, Ayed Alwadain, Norshakirah Aziz, Luiz Fernando Capretz, Said Jadid Abdulkadir
Format: Article
Language:English
Published: MDPI AG 2022-01-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/11/2/198
_version_ 1797494512272015360
author Mujaheed Abdullahi
Yahia Baashar
Hitham Alhussian
Ayed Alwadain
Norshakirah Aziz
Luiz Fernando Capretz
Said Jadid Abdulkadir
author_facet Mujaheed Abdullahi
Yahia Baashar
Hitham Alhussian
Ayed Alwadain
Norshakirah Aziz
Luiz Fernando Capretz
Said Jadid Abdulkadir
author_sort Mujaheed Abdullahi
collection DOAJ
description In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0), where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have evolved exponentially on a large scale. The rapid development of IoT devices and networks in various forms generate enormous amounts of data which in turn demand careful authentication and security. Artificial intelligence (AI) is considered one of the most promising methods for addressing cybersecurity threats and providing security. In this study, we present a systematic literature review (SLR) that categorize, map and survey the existing literature on AI methods used to detect cybersecurity attacks in the IoT environment. The scope of this SLR includes an in-depth investigation on most AI trending techniques in cybersecurity and state-of-art solutions. A systematic search was performed on various electronic databases (SCOPUS, Science Direct, IEEE Xplore, Web of Science, ACM, and MDPI). Out of the identified records, 80 studies published between 2016 and 2021 were selected, surveyed and carefully assessed. This review has explored deep learning (DL) and machine learning (ML) techniques used in IoT security, and their effectiveness in detecting attacks. However, several studies have proposed smart intrusion detection systems (IDS) with intelligent architectural frameworks using AI to overcome the existing security and privacy challenges. It is found that support vector machines (SVM) and random forest (RF) are among the most used methods, due to high accuracy detection another reason may be efficient memory. In addition, other methods also provide better performance such as extreme gradient boosting (XGBoost), neural networks (NN) and recurrent neural networks (RNN). This analysis also provides an insight into the AI roadmap to detect threats based on attack categories. Finally, we present recommendations for potential future investigations.
first_indexed 2024-03-10T01:35:22Z
format Article
id doaj.art-42fe76c7f5cd4033bdd90b6a164a46df
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T01:35:22Z
publishDate 2022-01-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-42fe76c7f5cd4033bdd90b6a164a46df2023-11-23T13:33:51ZengMDPI AGElectronics2079-92922022-01-0111219810.3390/electronics11020198Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature ReviewMujaheed Abdullahi0Yahia Baashar1Hitham Alhussian2Ayed Alwadain3Norshakirah Aziz4Luiz Fernando Capretz5Said Jadid Abdulkadir6Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Seri Iskandar 32610, MalaysiaInstitute of Sustainable Energy (ISE), Universiti Tenaga Nasional (UNITEN), Kajang 43000, MalaysiaDepartment of Computer and Information Sciences, Universiti Teknologi PETRONAS, Seri Iskandar 32610, MalaysiaComputer Science Department, Community College, King Saud University, Riyadh 145111, Saudi ArabiaDepartment of Computer and Information Sciences, Universiti Teknologi PETRONAS, Seri Iskandar 32610, MalaysiaDepartment of Electrical & Computer Engineering, Western University, London, ON N6A5B9, CanadaDepartment of Computer and Information Sciences, Universiti Teknologi PETRONAS, Seri Iskandar 32610, MalaysiaIn recent years, technology has advanced to the fourth industrial revolution (Industry 4.0), where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have evolved exponentially on a large scale. The rapid development of IoT devices and networks in various forms generate enormous amounts of data which in turn demand careful authentication and security. Artificial intelligence (AI) is considered one of the most promising methods for addressing cybersecurity threats and providing security. In this study, we present a systematic literature review (SLR) that categorize, map and survey the existing literature on AI methods used to detect cybersecurity attacks in the IoT environment. The scope of this SLR includes an in-depth investigation on most AI trending techniques in cybersecurity and state-of-art solutions. A systematic search was performed on various electronic databases (SCOPUS, Science Direct, IEEE Xplore, Web of Science, ACM, and MDPI). Out of the identified records, 80 studies published between 2016 and 2021 were selected, surveyed and carefully assessed. This review has explored deep learning (DL) and machine learning (ML) techniques used in IoT security, and their effectiveness in detecting attacks. However, several studies have proposed smart intrusion detection systems (IDS) with intelligent architectural frameworks using AI to overcome the existing security and privacy challenges. It is found that support vector machines (SVM) and random forest (RF) are among the most used methods, due to high accuracy detection another reason may be efficient memory. In addition, other methods also provide better performance such as extreme gradient boosting (XGBoost), neural networks (NN) and recurrent neural networks (RNN). This analysis also provides an insight into the AI roadmap to detect threats based on attack categories. Finally, we present recommendations for potential future investigations.https://www.mdpi.com/2079-9292/11/2/198systematic literature reviewinternet of thingsartificial intelligencemachine learningdeep learningintrusion detection systems
spellingShingle Mujaheed Abdullahi
Yahia Baashar
Hitham Alhussian
Ayed Alwadain
Norshakirah Aziz
Luiz Fernando Capretz
Said Jadid Abdulkadir
Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
Electronics
systematic literature review
internet of things
artificial intelligence
machine learning
deep learning
intrusion detection systems
title Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
title_full Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
title_fullStr Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
title_full_unstemmed Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
title_short Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
title_sort detecting cybersecurity attacks in internet of things using artificial intelligence methods a systematic literature review
topic systematic literature review
internet of things
artificial intelligence
machine learning
deep learning
intrusion detection systems
url https://www.mdpi.com/2079-9292/11/2/198
work_keys_str_mv AT mujaheedabdullahi detectingcybersecurityattacksininternetofthingsusingartificialintelligencemethodsasystematicliteraturereview
AT yahiabaashar detectingcybersecurityattacksininternetofthingsusingartificialintelligencemethodsasystematicliteraturereview
AT hithamalhussian detectingcybersecurityattacksininternetofthingsusingartificialintelligencemethodsasystematicliteraturereview
AT ayedalwadain detectingcybersecurityattacksininternetofthingsusingartificialintelligencemethodsasystematicliteraturereview
AT norshakirahaziz detectingcybersecurityattacksininternetofthingsusingartificialintelligencemethodsasystematicliteraturereview
AT luizfernandocapretz detectingcybersecurityattacksininternetofthingsusingartificialintelligencemethodsasystematicliteraturereview
AT saidjadidabdulkadir detectingcybersecurityattacksininternetofthingsusingartificialintelligencemethodsasystematicliteraturereview