A Review on Deep Learning and Intrusion Detection System Technologies to Secure IoT
Main Article Content
Abstract
Today the usage of internet has increased and the emergence of new technologies has invaded computer systems and networks. IoT is a new technology which opens up opportunities for new services and new innovations that is enabled by the developments in RFID, smart sensors and communication technologies. The fundamental aspect is to have smart sensors that communicate directly without human intervention to deliver a new application. All objects will be connected and are able to communicate with each other, while they operate in unprotected environments. This aspect leads to major security challenges. Companies are increasingly investing in these areas of research to optimize the detection of these attacks. Intrusion Detection Systems (IDS) are a vital tool for the protection of networks and data. Insights derived from the raw IoT data is highly complex that goes beyond the competence of traditional data analytical paradigms. Deep Learning models are better than conventional machine learning paradigms in the following ways. First, they mitigate the requirement for supervised feature sets to be utilized for training so that the features that might not be recognizable to a human can be extracted smoothly by Deep Learning models. This work focuses on the review related to IoT, IDS and Deep learning, traversing different areas related to security issues in IoT domain.
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.