A Deep Transfer Learning Framework for Robust IoT Attack Detection: A Review
DOI:
https://doi.org/10.31449/inf.v48i12.5955Abstract
Our lives have been significantly altered due to the digital revolution, and the Internet of Things (IoT) has played a significant part in this transformation. However, the fast expansion of the IoT into almost every aspect of life has resulted in various new cybersecurity dangers. As a result, detecting and preventing possible attacks on IoT networks have lately garnered significant attention from the academic and business worlds. Machine learning (ML)-based techniques, particularly deep learning (DL), have shown significant promise among the many different approaches to attack detection. This is because they can identify attacks at an early stage. However, for these DL algorithms to be effective, gathering substantial data from IoT devices, including label information, is necessary. On the other hand, the labelling process is often resource-intensive and time-consuming; hence, it may not be able to accommodate rapidly growing IoT threats in the real world. The introduction of DL methods to the IoT datasets is the main emphasis of this study, which also reviews the newest advancements in security measures for threat detection. This review aims to examine DL techniques and continuing breakthroughs in approaches that may be used to produce enhanced attack detection models for IoT frameworks. This is the objective of this review. When applying DL to IoT security, we address the benefits and research gaps associated with each strategy.Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika