Using Machine Learning Algorithms in Intrusion Detection Systems: A Review
DOI:
https://doi.org/10.25130/tjps.v29i3.1553Keywords:
Supervised learning, IoT intrusion detection systems, Machine learning algorithms, Feature selection, Future research directionsAbstract
Intrusion Detection Systems (IDS) are essential for identifying and mitigating security threats in Internet of Things (IoT) networks. This paper explores the unique challenges of IoT environments and presents machine learning (ML) algorithms as powerful solutions for IoT-IDS, encompassing supervised, unsupervised, and semi-supervised learning. Notable algorithms, including decision trees, random forests, support vector machines, and deep learning architectures, are discussed. Emphasis is placed on the critical role of feature selection in developing efficient IDS, addressing challenges such as heterogeneity, limited resources, real-time detection, privacy concerns, and adversarial attacks. Future research directions include advanced ML algorithms for IoT data, integration of anomaly detection, exploration of federated learning, and combining ML with other cybersecurity techniques. The paper advocates for benchmark datasets and evaluation frameworks to standardize the assessment of ML-based IoT-IDS approaches, ultimately contributing to heightened security and integrity in IoT systems..
Downloads
Published
How to Cite
License
Copyright (c) 2024 THIS IS AN OPEN ACCESS ARTICLE UNDER THE CC BY LICENSE http://creativecommons.org/licenses/by/4.0/
This work is licensed under a Creative Commons Attribution 4.0 International License.
Tikrit Journal of Pure Science is licensed under the Creative Commons Attribution 4.0 International License, which allows users to copy, create extracts, abstracts, and new works from the article, alter and revise the article, and make commercial use of the article (including reuse and/or resale of the article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made, and the licensor is not represented as endorsing the use made of the work. The authors hold the copyright for their published work on the Tikrit J. Pure Sci. website, while Tikrit J. Pure Sci. is responsible for appreciate citation of their work, which is released under CC-BY-4.0, enabling the unrestricted use, distribution, and reproduction of an article in any medium, provided that the original work is properly cited.