Affiliation:
1. University of Ottawa Ottawa, ON, Canada
2. Ciena Ottawa, ON, Canada
Abstract
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely used against cyber threats in IoT networks with promising performance. An Advanced Persistent Threat (APT) is prominent for cybercriminals to compromise networks, and it is crucial to long-term and harmful characteristics. However, it is difficult to apply ML-based approaches to identify APT attacks to obtain a promising detection performance due to an extremely small percentage among normal traffic. There are limited surveys that fully investigate APT attacks in IoT networks due to the lack of public datasets with all types of APT attacks. It is worth bridging the state of the art in network attack detection with APT attack detection in a comprehensive review article. This survey article reviews the security challenges in IoT networks and presents well-known attacks, APT attacks, and threat models in IoT systems. Meanwhile, signature-based, anomaly-based, and hybrid intrusion detection systems are summarized for IoT networks. The article highlights statistical insights regarding frequently applied ML-based methods against network intrusion. Finally, open issues and challenges for common network intrusion and APT attacks are presented for future research.
Funder
Ontario Centre for Innovation under ENCQOR 5G
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference189 articles.
1. Rodika Tollefson. 2020. ICS/SCADA Malware Threats. Retrieved April 23 2022 from https://resources.infosecinstitute.com/category/certifications-training/ics-scada/ics-scada-threats-threat-actors/ics-scada-malware-threats/.
2. Romain Fontugne Pierre Borgnat Patrice Abry and Kensuke Fukuda. 2010. MAWILab: Combining Diverse Anomaly Detectors for Automated Anomaly Labeling and Performance Benchmarking. In ACM (CoNEXT’10) . Philadel-phia PA.
3. IBM. n.d. X-Force Threat Intelligence Index 2020. Retrieved April 23 2022 from XXX.
4. Control Engineering. 2009. When Considering Controllers… Do Operating Systems Matter? Retrieved April 23 2022 fromhttps://www.controleng.com/articles/when-considering-controllers-do-operating-systems-matter/.
5. Steve Morgan. 2018. Global ransomware damage costs predicted to hit $11.5 billion by 2019. Cybercrime Magazine . Retrieved April 23 2022 from https://cybersecurityventures.com/ransomware-damage-report-2017-part-2/.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献