Security analysis of network anomalies mitigation schemes in IoT networks

Muhammad Aminu Lawal, Riaz Ahmed Shaikh, Syed Raheel Hassan

Research output: Contribution to journalArticlepeer-review

Abstract

The Internet of Things (IoT) is on the rise and it is giving a new shape to several fields such as smart cities, smart homes, smart health, etc. as it facilitates the connection of physical objects to the internet. However, this advancement comes along with new challenges in terms of security of the devices in the IoT networks. Some of these challenges come as network anomalies. Hence, this has prompted the use of network anomaly mitigation schemes as an integral part of the defense mechanisms of IoT networks in order to protect the devices from malicious users. Thus, several schemes have been proposed to mitigate network anomalies. This paper covers a review of different network anomaly mitigation schemes in IoT networks. The schemes' objectives, operational procedures, and strengths are discussed. A comparison table of the reviewed schemes, as well as a taxonomy based on the detection methodology, is provided. In contrast to other surveys that presented qualitative evaluations, our survey provides both qualitative and quantitative evaluations. The UNSW-NB15 dataset was used to conduct a performance evaluation of some classification algorithms used for network anomaly mitigation schemes in IoT. Finally, challenges and open issues in the development of network anomaly mitigation schemes in IoT are discussed.
Original languageEnglish
Pages (from-to)43355-43374
Number of pages20
JournalIEEE Access
Volume8
DOIs
Publication statusPublished - 27 Feb 2020

Keywords

  • Classification algorithms
  • Internet of Things (IoT)
  • Intrusion Detection System (IDS)
  • Machine learning
  • Network anomalies
  • Security

Cite this