Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review

In many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of-service (DoS) and remote-to-local (R2L) ones....

Full description

Bibliographic Details
Main Authors: Ahmed Bahaa, Ahmed Abdelaziz, Abdalla Sayed, Laila Elfangary, Hanan Fahmy
Format: Article
Language:English
Published: MDPI AG 2021-04-01
Series:Information
Subjects:
Online Access:https://www.mdpi.com/2078-2489/12/4/154
id doaj-31b97af743124adf8e5ecb85c05e0aed
record_format Article
spelling doaj-31b97af743124adf8e5ecb85c05e0aed2021-04-07T23:02:40ZengMDPI AGInformation2078-24892021-04-011215415410.3390/info12040154Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature ReviewAhmed Bahaa0Ahmed Abdelaziz1Abdalla Sayed2Laila Elfangary3Hanan Fahmy4Department of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan 11795, EgyptInformation System Department, Nova Information Management School, Universdade Nova de Lisbon, 1099-085 Lisbon, PortugalDepartment of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan 11795, EgyptDepartment of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan 11795, EgyptDepartment of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan 11795, EgyptIn many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of-service (DoS) and remote-to-local (R2L) ones. There are several approaches and techniques that can be used to construct attack detection models, such as machine learning, data mining, and statistical analysis. Nowadays, this technique is commonly used because it can provide precise analysis and results. Therefore, we decided to study the previous literature on the detection of IoT attacks and machine learning in order to understand the process of creating detection models. We also evaluated various datasets used for the models, IoT attack types, independent variables used for the models, evaluation metrics for assessment of models, and monitoring infrastructure using DevSecOps pipelines. We found 49 primary studies, and the detection models were developed using seven different types of machine learning techniques. Most primary studies used IoT device testbed datasets, and others used public datasets such as NSL-KDD and UNSW-NB15. When it comes to measuring the efficiency of models, both numerical and graphical measures are commonly used. Most IoT attacks occur at the network layer according to the literature. If the detection models applied DevSecOps pipelines in development processes for IoT devices, they were more secure. From the results of this paper, we found that machine learning techniques can detect IoT attacks, but there are a few issues in the design of detection models. We also recommend the continued use of hybrid frameworks for the improved detection of IoT attacks, advanced monitoring infrastructure configurations using methods based on software pipelines, and the use of machine learning techniques for advanced supervision and monitoring.https://www.mdpi.com/2078-2489/12/4/154DevSecOpsIoT attacksmachine learningliterature review
collection DOAJ
language English
format Article
sources DOAJ
author Ahmed Bahaa
Ahmed Abdelaziz
Abdalla Sayed
Laila Elfangary
Hanan Fahmy
spellingShingle Ahmed Bahaa
Ahmed Abdelaziz
Abdalla Sayed
Laila Elfangary
Hanan Fahmy
Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review
Information
DevSecOps
IoT attacks
machine learning
literature review
author_facet Ahmed Bahaa
Ahmed Abdelaziz
Abdalla Sayed
Laila Elfangary
Hanan Fahmy
author_sort Ahmed Bahaa
title Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review
title_short Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review
title_full Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review
title_fullStr Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review
title_full_unstemmed Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review
title_sort monitoring real time security attacks for iot systems using devsecops: a systematic literature review
publisher MDPI AG
series Information
issn 2078-2489
publishDate 2021-04-01
description In many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of-service (DoS) and remote-to-local (R2L) ones. There are several approaches and techniques that can be used to construct attack detection models, such as machine learning, data mining, and statistical analysis. Nowadays, this technique is commonly used because it can provide precise analysis and results. Therefore, we decided to study the previous literature on the detection of IoT attacks and machine learning in order to understand the process of creating detection models. We also evaluated various datasets used for the models, IoT attack types, independent variables used for the models, evaluation metrics for assessment of models, and monitoring infrastructure using DevSecOps pipelines. We found 49 primary studies, and the detection models were developed using seven different types of machine learning techniques. Most primary studies used IoT device testbed datasets, and others used public datasets such as NSL-KDD and UNSW-NB15. When it comes to measuring the efficiency of models, both numerical and graphical measures are commonly used. Most IoT attacks occur at the network layer according to the literature. If the detection models applied DevSecOps pipelines in development processes for IoT devices, they were more secure. From the results of this paper, we found that machine learning techniques can detect IoT attacks, but there are a few issues in the design of detection models. We also recommend the continued use of hybrid frameworks for the improved detection of IoT attacks, advanced monitoring infrastructure configurations using methods based on software pipelines, and the use of machine learning techniques for advanced supervision and monitoring.
topic DevSecOps
IoT attacks
machine learning
literature review
url https://www.mdpi.com/2078-2489/12/4/154
work_keys_str_mv AT ahmedbahaa monitoringrealtimesecurityattacksforiotsystemsusingdevsecopsasystematicliteraturereview
AT ahmedabdelaziz monitoringrealtimesecurityattacksforiotsystemsusingdevsecopsasystematicliteraturereview
AT abdallasayed monitoringrealtimesecurityattacksforiotsystemsusingdevsecopsasystematicliteraturereview
AT lailaelfangary monitoringrealtimesecurityattacksforiotsystemsusingdevsecopsasystematicliteraturereview
AT hananfahmy monitoringrealtimesecurityattacksforiotsystemsusingdevsecopsasystematicliteraturereview
_version_ 1721535713855406080