咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Advancements in training and d... 收藏

Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review

作     者:Mallidi, S. Kumar Reddy Ramisetty, Rajeswara Rao 

作者机构:Computer Science and Engineering Jawaharlal Nehru Technological University AP Kakinada533003 India Computer Science and Engineering Sri Vasavi Engineering College AP Tadepalligudem534101 India Computer Science and Engineering Jawaharlal Nehru Technological University Gurajada AP Vizianagaram535003 India 

出 版 物:《Discover Internet of Things》 (Discov. Internet Things)

年 卷 期:2025年第5卷第1期

页      面:1-33页

核心收录:

主  题:Federated learning 

摘      要:As the Internet of Things (IoT) grows, ensuring robust security is crucial. Intrusion Detection Systems (IDS) protect IoT networks from various cyber threats. This systematic literature review (SLR) explores the advancements in training and deployment strategies of Artificial Intelligence (AI) based IDS within IoT environments. The study begins by outlining prevalent IoT attacks and developing an updated taxonomy to enhance understanding of these threats. It then examines various IDS architectures and delves into the integration of machine learning (ML) and deep learning (DL) technologies that improve detection capabilities and system responsiveness. Significant emphasis is placed on analyzing different IDS training paradigms-centralized, distributed, and federated learning-and deployment strategies, including in cloud, fog, and edge layers. Their effectiveness within IoT contexts is evaluated comprehensively. Moreover, the review assesses the datasets commonly used for training and validating IDS and discusses key performance metrics and validation measures critical for assessing IDS effectiveness. The study concludes by synthesizing the major challenges facing current IDS implementations in IoT and suggesting future research directions aimed at overcoming these hurdles. This review highlights the technological advancements in IDS and sets the stage for future enhancements in IoT security, emphasizing the integration of innovative training and deployment strategies. © The Author(s) 2025.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分