Intrusion Detection Systems (IDS) are key components for securing critical infrastructures, capable of detecting malicious activities on networks or hosts. The procedure of implementing a IDS for Internet of Things (IoT) networks is not without challenges due to the variability of these systems and specifically the difficulty in accessing data. The specifics of these very constrained devices render the design of an IDS capable of dealing with the varied attacks a very challenging problem and a very active research subject. In the current state of literature, a number of approaches have been proposed to improve the efficiency of intrusion detection, catering to some of these limitations, such as resource constraints and mobility. In this article, we review works on IDS specifically for these kinds of devices from 2008 to 2018, collecting a total of 51 different IDS papers. We summarise the current themes of the field, summarise the techniques employed to train and deploy the IDSs and provide a qualitative evaluations of these approaches. While these works provide valuable insights and solutions for sub-parts of these constraints, we discuss the limitations of these solutions as a whole, in particular what kinds of attacks these approaches struggle to detect and the setup limitations that are unique to this kind of system. We find that although several paper claim novelty of their approach little inter paper comparisons have been made, that there is a dire need for sharing of datasets and almost no shared code repositories, consequently raising the need for a thorough comparative evaluation.
翻译:入侵探测系统(IDS)是确保关键基础设施的关键组成部分,能够发现网络或主机上的恶意活动。实施信息传输系统用于物联网网络的互联网,其程序并非没有挑战,因为这些系统变化多端,特别是难以获取数据。这些非常受限制装置的具体特点使得设计能够应对各种袭击的国际数据系统成为极具挑战性的问题和非常活跃的研究课题。在目前的文献中,提出了若干方法来提高入侵探测的效率,满足其中一些限制,例如资源限制和流动性。在本篇文章中,我们专门为2008年至2018年这类设备审查信息传输系统的工作,共收集了51份不同的信息传输系统文件。我们总结了目前实地的主题,总结了用于培训和部署信息传输系统的技术,对这些方法进行了定性评估。这些工作为这些制约的次部分提供了宝贵的洞察和解决办法,我们讨论了这些解决办法的局限性,特别是这些方法在探查和流动性方面的困难。我们从2008年到2018年,我们专门为这类设备收集了信息,共收集了51份不同的信息服务文件。我们总结了实地主题,总结了用于培训和部署信息服务的技术,并提供了质量评估。这些方法的独特性。我们无法再评估。我们从纸库中找出了评估。