• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • About QSpace
    • Vision & Mission
  • Help
    • Item Submission
    • Publisher policies
    • User guides
      • QSpace Browsing
      • QSpace Searching (Simple & Advanced Search)
      • QSpace Item Submission
      • QSpace Glossary
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A survey on recent approaches in intrusion detection system in IoTs

    Thumbnail
    Date
    2019
    Author
    Tabassum, Aliya
    Erbad, Aiman
    Guizani, Mohsen
    Metadata
    Show full item record
    Abstract
    Internet of Things (IoTs) are Internet-connected devices that integrate physical objects and internet in diverse areas of life like industries, home automation, hospitals and environment monitoring. Although IoTs ease daily activities benefiting human operations, they bring serious security challenges worth concerning. IoTs have become potentially vulnerable targets for cybercriminals, so companies are investing billions of dollars to find an appropriate mechanism to detect these kinds of malicious activities in IoT networks. Nowadays intelligent techniques using Machine Learning (ML) and Artificial Intelligence (AI) are being adopted to prevent or detect novel attacks with best accuracy. This survey classifies and categorizes the recent Intrusion Detection approaches for IoT networks, with more focus on hybrid and intelligent techniques. Moreover, it provides a comprehensive review on IoT layers, communication protocols and their security issues which confirm that IDS is required in both layered and protocol approaches. Finally, this survey discusses the limitations and advantages of each approach to identify future directions of potential IDS implementation. - 2019 IEEE.
    DOI/handle
    http://dx.doi.org/10.1109/IWCMC.2019.8766455
    http://hdl.handle.net/10576/14861
    Collections
    • Computer Science & Engineering [‎2484‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us
    Contact Us | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission

    Help

    Item Submission Publisher policies

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us
    Contact Us | QU

     

     

    Video