.

ISSN 2063-5346
For urgent queries please contact : +918130348310

Analysis Of Methodologies, Deployment Strategy, Validation Framework, Vulnerabilities, Available Datasets And Issues For Intrusion Detection Systems In Internet Of Things (IoTs)

Main Article Content

Shubham Kumar , Dr. Nishant Kumar Pathak
» doi: 10.31838/ecb/2023.12.sa1.149

Abstract

The Internet of Things (IoT) is evolving swiftly in order to impact major industrial systems and people's daily lives more significantly. Most of the IDS technologies, that may be generally categorised based on detection approach, validation strategy, and deployment strategy have been presented in the literature to address assaults on the IoT ecosystem. This survey article provides a thorough analysis of current IoT IDS as well as an overview of the methods, deployment strategies, validation strategies, and datasets that are frequently used to create IDS. Moreover, we examine how current IoT IDS identify and protect exchanges over the IoT. In order to make IoT more secure, it also gives a taxonomy of IoT threats and highlights upcoming research challenges to defend against them. By bringing together, comparing, and combining disparate research efforts, these goals aid IoT security experts. Hence, in order to shed light on IoT IDS methodologies, their benefits and drawbacks, IoT attacks that take use of IoT communication networks, and related sophisticated IDS and detection capabilities to identify IoT assaults, we offer an original IoT IDS taxonomy.

Article Details