Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review

The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features. The Intrusion detection system faces a trade-off between var...

Full description

Saved in:
Bibliographic Details
Main Authors: Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2024-01-01
Series:Internet of Things and Cyber-Physical Systems
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2667345224000038
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features. The Intrusion detection system faces a trade-off between various parameters such as detection accuracy, relevance, redundancy, false alarm rate, and other objectives. The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. MOAs provide a set of optimized solutions for the intrusion detection process in highly complex IoT networks. This paper presents the identification of multiple objectives of intrusion detection, comparative analysis of multi-objective algorithms for intrusion detection in IoT based on their approaches, and the datasets used for their evaluation. The multi-objective optimization algorithms show the encouraging potential in IoT networks to enhance multiple conflicting objectives for intrusion detection. Additionally, the current challenges and future research ideas are identified. In addition to demonstrating new advancements in intrusion detection techniques, this study attempts to identify research gaps that can be addressed while designing intrusion detection systems for IoT networks.
ISSN:2667-3452