{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T14:00:23Z","timestamp":1775916023319,"version":"3.50.1"},"reference-count":86,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>In many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of-service (DoS) and remote-to-local (R2L) ones. There are several approaches and techniques that can be used to construct attack detection models, such as machine learning, data mining, and statistical analysis. Nowadays, this technique is commonly used because it can provide precise analysis and results. Therefore, we decided to study the previous literature on the detection of IoT attacks and machine learning in order to understand the process of creating detection models. We also evaluated various datasets used for the models, IoT attack types, independent variables used for the models, evaluation metrics for assessment of models, and monitoring infrastructure using DevSecOps pipelines. We found 49 primary studies, and the detection models were developed using seven different types of machine learning techniques. Most primary studies used IoT device testbed datasets, and others used public datasets such as NSL-KDD and UNSW-NB15. When it comes to measuring the efficiency of models, both numerical and graphical measures are commonly used. Most IoT attacks occur at the network layer according to the literature. If the detection models applied DevSecOps pipelines in development processes for IoT devices, they were more secure. From the results of this paper, we found that machine learning techniques can detect IoT attacks, but there are a few issues in the design of detection models. We also recommend the continued use of hybrid frameworks for the improved detection of IoT attacks, advanced monitoring infrastructure configurations using methods based on software pipelines, and the use of machine learning techniques for advanced supervision and monitoring.<\/jats:p>","DOI":"10.3390\/info12040154","type":"journal-article","created":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T11:31:59Z","timestamp":1617795119000},"page":"154","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review"],"prefix":"10.3390","volume":"12","author":[{"given":"Ahmed","family":"Bahaa","sequence":"first","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan 11795, Egypt"},{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Beni-Suef University, Beni-Suef 62521, Egypt"}]},{"given":"Ahmed","family":"Abdelaziz","sequence":"additional","affiliation":[{"name":"Information System Department, Nova Information Management School, Universdade Nova de Lisbon, 1099-085 Lisbon, Portugal"},{"name":"Higher Technological Institute, Cairo 11511, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0549-7493","authenticated-orcid":false,"given":"Abdalla","family":"Sayed","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan 11795, Egypt"}]},{"given":"Laila","family":"Elfangary","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan 11795, Egypt"}]},{"given":"Hanan","family":"Fahmy","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan 11795, Egypt"}]}],"member":"1968","published-online":{"date-parts":[[2021,4,7]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1016\/j.procs.2018.05.042","article-title":"Internet of things: Vision, applications and challenges","volume":"132","author":"Mehta","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_2","unstructured":"ISO\/IEC International Standard 20924 (2021, March 30). Information Technology-Internet of Things-Definition and Vocabulary. Available online: https:\/\/www.iso.org\/standard\/69470.html."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Yang, Z., Liang, B., and Ji, W. (2021). An Intelligent end-edge-cloud architecture for visual iot assisted healthcare systems. IEEE Internet Things J., 8.","DOI":"10.1109\/JIOT.2021.3052778"},{"key":"ref_4","first-page":"901","article-title":"Hybrid low-power wide-area mesh network for iot applications","volume":"8","author":"Jiang","year":"2020","journal-title":"IEEE IoT J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIM.2020.3028437","article-title":"Development of a novel iot-enabled power-monitoring architecture with real-time data visualization for use in domestic and industrial scenarios","volume":"70","author":"Jadhav","year":"2020","journal-title":"IEEE Trans. Instrum. Measure."},{"key":"ref_6","unstructured":"(2021, January 02). Statista Report. Available online: https:\/\/www.statista.com\/statistics\/471264\/iot number-of-connected-devices-worldwide."},{"key":"ref_7","unstructured":"Alam, T. (2018). A reliable communication framework and its use in internet of things (IoT). Int. J. Sci. Res. Comp. Sci. Eng. Inf. Technol., 3."},{"key":"ref_8","unstructured":"(2021, January 02). Cyberattack Knocks Out Access to Websites. Available online: https:\/\/www.wsj.com\/articles\/denial-of-service-web-attack-affects-amazon-twitter-others-1477056080."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"164200","DOI":"10.1109\/ACCESS.2020.3022272","article-title":"eMUD: Enhanced manufacturer usage description for IoT botnets prevention on home WiFi routers","volume":"8","author":"Sajjad","year":"2020","journal-title":"IEEE Access"},{"key":"ref_10","first-page":"349","article-title":"A vision of IoT: Applications, challenges, and opportunities with china perspective","volume":"1","author":"Chen","year":"2014","journal-title":"IEEE IoT J."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Doshi, K., Yilmaz, Y., and Uludag, S. (2021). Timely detection and mitigation of stealthy DDoS attacks via IoT networks. IEEE Trans. Dependable Secur. Comput., 1.","DOI":"10.1109\/TDSC.2021.3049942"},{"key":"ref_12","unstructured":"(2021, March 28). McAfee Labs COVID-19 Threats Report. Available online: https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterlythreats-july-2020.pdf."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"13938","DOI":"10.1109\/ACCESS.2021.3051602","article-title":"Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network","volume":"9","author":"Singh","year":"2021","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/TII.2020.2981382","article-title":"Adaptive multivariate data compression in smart metering Internet of Things","volume":"17","author":"Chowdhury","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1109\/TII.2020.2968927","article-title":"An efficient spam detection technique for IoT devices using machine learning","volume":"17","author":"Makkar","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Darko, A., and Vr\u010dek, N. (2018, January 26\u201328). Machine learning for the Internet of Things security: A systematic review. Proceedings of the International Conference on Software Technologies (ICSOFT), Porto, Portugal.","DOI":"10.5220\/0006841205630570"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2019\/5747136","article-title":"A systematic literature review of authentication in Internet of Things for heterogeneous devices","volume":"2019","author":"Kavianpour","year":"2019","journal-title":"J. Comput. Netw. Commun."},{"key":"ref_18","first-page":"8182","article-title":"IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices","volume":"6","author":"Meneghello","year":"2019","journal-title":"IEEE IoT J."},{"key":"ref_19","first-page":"100050","article-title":"Enforcing security in Internet of Things frameworks: A systematic literature review","volume":"6","author":"Aly","year":"2019","journal-title":"IoT"},{"key":"ref_20","first-page":"212220","article-title":"Systematic literature review on IoT-based botnet attack","volume":"8","author":"Ihsan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Hinderks, A., Jos\u00e9, F., Mayo, D., Thomaschewski, J., and Escalona, M.J. (2020, January 5\u201311). An SLR-tool: Search process in practice: A tool to conduct and manage systematic literature review (SLR). Proceedings of the 2020 IEEE\/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), Seoul, Korea.","DOI":"10.1145\/3377812.3382137"},{"key":"ref_22","unstructured":"Kitchenham, B., and Charters, S. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering, School of Computer Science and Mathematics, Keele University."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Anthi, E., Williams, L., S\u0142owi\u0144ska, M., Theodorakopoulos, G., and Burnap, P. (2018, January 28\u201329). Pulse: An Adaptive Intrusion Detection for the Internet of Things, Living in the Internet of Things: Cybersecurity of the IoT. Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT\u20142018, London, UK.","DOI":"10.1049\/cp.2018.0035"},{"key":"ref_24","first-page":"9042","article-title":"A supervised intrusion detection system for smart home IoT devices","volume":"6","author":"Anthi","year":"2019","journal-title":"IEEE IoT J."},{"key":"ref_25","unstructured":"Prachi, S. (2017, January 7\u20138). ML-IDS: A Machine Learning Approach to Detect Wormhole Attacks in Internet of Things. Proceedings of the Intelligent Systems Conference (IntelliSys), London, UK."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Bakhtiar, F.A., Pramukantoro, E.S., and Nihri, H. (2019, January 12\u201314). A lightweight ids based on J48 algorithm for detecting dos attacks on IoT Middleware. Proceedings of the IEEE 1st Global Conference on Life Sciences and Technologies (LifeTech), Osaka, Japan.","DOI":"10.1109\/LifeTech.2019.8884057"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Yahyaoui, A., Abdellatif, T., and Attia, R. (2019, January 24\u201328). Hierarchical anomaly-based intrusion detection and localization in IoT. Proceedings of the 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco.","DOI":"10.1109\/IWCMC.2019.8766574"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","article-title":"Machine learning-based network vulnerability analysis of industrial Internet of Things","volume":"6","author":"Zolanvari","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Bhatt, P., and Morais, A. (2018, January 20\u201321). HADS: Hybrid anomaly detection system for IoT environments. Proceedings of the International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), Hamammet, Tunisia.","DOI":"10.1109\/IINTEC.2018.8695303"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Ioannou, C., and Vassiliou, V. (2019, January 29\u201331). Classifying security attacks in IoT networks using supervised learning. Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini, Greece.","DOI":"10.1109\/DCOSS.2019.00118"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Bhunia, S.S., and Gurusamy, M. (2017, January 22\u201324). Dynamic attack detection and mitigation in IoT using SDN. Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, VIC, Australia.","DOI":"10.1109\/ATNAC.2017.8215418"},{"key":"ref_32","unstructured":"Nobakht, M., Sivaraman, V., and Boreli, R. (September, January 31). A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"100283","DOI":"10.1109\/ACCESS.2019.2930000","article-title":"Self-service cybersecurity monitoring as enabler for devsecops","volume":"7","author":"Mena","year":"2019","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Bhatia, R., Benno, S., Esteban, J., Lakshman, T.V., and Grogan, J. (2019, January 1\u20135). Unsupervised machine learning for net-work-centric anomaly detection in IoT. Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks, New York, NY, USA.","DOI":"10.1145\/3359992.3366641"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., and Sauvignac, C. (2019). An Intrusion Detection System for the OneM2M Service Layer Based on Edge Machine Learning, Springer.","DOI":"10.1007\/978-3-030-31831-4_35"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.procs.2018.10.511","article-title":"A darknet traffic analysis for IoT malwares using association rule learning","volume":"144","author":"Hashimoto","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s10207-019-00439-w","article-title":"A study of IoT malware activities using association rule learning for darknet sensor data","volume":"19","author":"Ozawa","year":"2020","journal-title":"Int. J. Inform. Secur."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Maleh, Y. (2019). Machine learning techniques for IoT intrusions detection in aerospace cyber-physical systems. Machine Learning and Data Mining in Aerospace Technology, Springer.","DOI":"10.1007\/978-3-030-20212-5_11"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Thamilarasu, G., and Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors, 19.","DOI":"10.3390\/s19091977"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Ioannou, C., and Vassiliou, V. (2020, January 25\u201327). Experimentation with local intrusion detection in IoT networks using supervised learning. Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems (DCOSS), Marina del Rey, CA, USA.","DOI":"10.1109\/DCOSS49796.2020.00073"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Liu, Z., Thapa, N., Shaver, A., Kaushik, R., Xiaohong, Y., and Khorsandroo, S. (2020, January 6\u20137). Anomaly detection on loT network intrusion using machine learning. Proceedings of the International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa.","DOI":"10.1109\/icABCD49160.2020.9183842"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Pecori, R., Tayebi, A., Vannucci, A., and Veltri, L. (2020, January 19\u201324). IoT Attack detection with deep learning analysis. Proceedings of the International Joint Conference on Neural Networks (IJCNN), Glasgow, UK.","DOI":"10.1109\/IJCNN48605.2020.9207171"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Liang, C., Shanmugam, B., Azam, S., Jonkman, M., De Boer, F., and Narayansamy, G. (2019, January 30\u201331). Intrusion detection system for Internet of Things based on a machine learning approach. Proceedings of the International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), Vellore, India.","DOI":"10.1109\/ViTECoN.2019.8899448"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Illy, P., Kaddoum, G., Moreira, C.M., Kaur, K., and Garg, S. (2019, January 1). Securing fog-to-things environment using intrusion detection system based on ensemble learning. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco.","DOI":"10.1109\/WCNC.2019.8885534"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","article-title":"A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks","volume":"7","author":"Pajouh","year":"2016","journal-title":"IEEE Trans. Emerg. Top. Comp."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/MCOM.2018.1700332","article-title":"Deep learning: The frontier for distributed attack detection in fog-to-things computing","volume":"56","author":"Abeshu","year":"2018","journal-title":"IEEE Comm. Mag."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Shalaginov, A., Semeniuta, O., and Alazab, M. (2019, January 1\u20135). MEML: Resource-Aware MQTT-Based Machine Learning for Network Atack Detection on IoT Edge Devices. Proceedings of the 12th IEEE\/ACM International Conference on Utility and Cloud Computing Companion (UCC\u201919 Companion), Auckland, New Zealand.","DOI":"10.1145\/3368235.3368876"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Rezvy, S., Petridis, M., Lasebae, A., and Zebin, T. (2019). Intrusion Detection and Classification with Au-toencoded Deep Neural Network, Springer.","DOI":"10.1007\/978-3-030-12942-2_12"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","article-title":"Semi-supervised learning based distributed attack detection framework","volume":"72","author":"Rathore","year":"2018","journal-title":"Appl. Soft Comp."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","article-title":"Distributed attack detection scheme using deep learning approach for Internet of Things","volume":"82","author":"Diro","year":"2018","journal-title":"Future Gener. Comp. Syst."},{"key":"ref_51","first-page":"203","article-title":"A machine learning-based lightweight intrusion detection system for the Internet of Things","volume":"33","author":"Fenanir","year":"2019","journal-title":"Rev. d\u2019Intelligence Artif."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","article-title":"Machine learning based intrusion detection systems for IoT applications","volume":"111","author":"Verma","year":"2019","journal-title":"Wireless Pers Commun."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"121513","DOI":"10.1109\/ACCESS.2020.3007024","article-title":"3D reconstruction for super-resolution CT images in the Internet of health things using deep learning","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Taghavinejad, S.M., Taghavinejad, M., Shahmiri, L., Zavvar, M., and Zavvar, M.H. (2020, January 22\u201323). Intrusion detection in IoT-based smart grid using hybrid decision tree. Proceedings of the 6th International Conference on Web Research (ICWR), Tehran, Iran.","DOI":"10.1109\/ICWR49608.2020.9122320"},{"key":"ref_55","unstructured":"Al-Emadi, S., Al-Mohannadi, A., and Al-Senaid, F. (, January 2\u20135). Using deep learning techniques for network intrusion detection. Proceedings of the IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"107417","DOI":"10.1016\/j.comnet.2020.107417","article-title":"Hybrid approach to intrusion detection in fog-based IoT environments","volume":"180","year":"2020","journal-title":"Comp. Netw."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Rani, D., and Kaushal, N.C. (2020, January 1\u20133). Supervised machine learning based network intrusion detection system for Internet of Things. Proceedings of the 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India.","DOI":"10.1109\/ICCCNT49239.2020.9225340"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Zhao, S., Li, W., Zia, T., and Zomaya, A.Y. (2017, January 6\u201310). A dimension reduction model and classifier for anomaly-based intrusion detection in Internet of Things. Proceedings of the 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech), Orlando, FL, USA.","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.141"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Indre, I., and Lemnaru, C. (2016, January 8\u201310). Detection and prevention system against cyber attacks and botnet malware for information systems and internet of things. Proceedings of the 12th International Conference on Intelligent Computer Communication and Processing (ICCP), Cluj-Napoca, Romania.","DOI":"10.1109\/ICCP.2016.7737142"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1515\/comp-2020-0009","article-title":"Distributed denial-of-service prediction on IoT framework by learning techniques","volume":"10","author":"Dwivedi","year":"2020","journal-title":"Open Comput. Sci."},{"key":"ref_61","unstructured":"Bipraneel, R., and Cheung, H. (2018, January 21\u201323). A deep learning approach for intrusion detectionin internet of things using BI-directional long short-term memory recurrent neural network. Proceedings of the 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, NSW, Australia."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Hanif, S., Ilyas, T., and Zeeshan, M. (2019, January 6\u20139). Intrusion detection in IoT using artificial neural networks on UNSW-15 Dataset. Proceedings of the 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), Charlotte, NC, USA.","DOI":"10.1109\/HONET.2019.8908122"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Latif, S., Idrees, Z., Zou, Z., and Ahmad, J. (2020, January 20\u201321). DRaNN: A deep random neural network model for intrusion detection in industrial IoT. Proceedings of the International Conference on UK-China Emerging Technologies (UCET), Glasgow, UK.","DOI":"10.1109\/UCET51115.2020.9205361"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Chkirbene, Z., Eltanbouly, S., Bashendy, M., Alnaimi, N., and Erbad, A. (2020, January 2\u20135). Hybrid machine learning for network anomaly intrusion detection. Proceedings of the IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar.","DOI":"10.1109\/ICIoT48696.2020.9089575"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Verma, A., and Ranga, V. (2019, January 18\u201319). ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things. Proceedings of the 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India.","DOI":"10.1109\/IoT-SIU.2019.8777504"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Shakhov, V., Ullah Jan, S., and Ahmed, S. (2019, January 3\u20136). On Lightweight method for intrusions detection in the Internet of Things. Proceedings of the International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, Russia.","DOI":"10.1109\/BlackSeaCom.2019.8812813"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Ge, M., Fu, X., Syed, N., Baig, Z., Teo, G., and Robles-Kelly, A. (2019, January 1\u20133). Deep learning-based intrusion detection for IoT networks. Proceedings of the 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan.","DOI":"10.1109\/PRDC47002.2019.00056"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Hosseini, M., and Borojeni, H.R.S. (2018, January 1\u20133). A hybrid approach for anomaly detection in the Internet of Things. Proceedings of the Proceedings of the International Conference on Smart Cities and Internet of Things-SCIOT\u201918, Mashhad, Iran.","DOI":"10.1145\/3269961.3269975"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"89337","DOI":"10.1109\/ACCESS.2020.2994079","article-title":"A novel attack detection scheme for the industrial internet of things using a lightweight random neural network","volume":"8","author":"Latif","year":"2020","journal-title":"IEEE Access"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Roopak, M., Tian, G.Y., and Chambers, J. (2020, January 6\u20138). Intrusion detection system against ddos attacks in loT networks. Proceedings of the 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC47524.2020.9031206"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Alzahrani, H., Abulkhair, M., and Alkayal, E. (2020). A multi-class neural network model for rapid detection of IoT botnet attacks. Int. J. Adv. Comp. Sci. Appl.","DOI":"10.14569\/IJACSA.2020.0110783"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","article-title":"TON_IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems","volume":"8","author":"Alsaedi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"24168","DOI":"10.1109\/ACCESS.2021.3056149","article-title":"\u201cREAD-IoT: Reliable anomalies and events detection framework for the Internet of Things","volume":"9","author":"Yahyaoui","year":"2021","journal-title":"IEEE Access"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"16062","DOI":"10.1109\/ACCESS.2021.3051074","article-title":"Deep belief network integrating improved kernel-based extreme learning machine for network intrusion detection","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Access"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"22351","DOI":"10.1109\/ACCESS.2021.3056614","article-title":"Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset","volume":"9","author":"Maseer","year":"2021","journal-title":"IEEE Access"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"146","DOI":"10.26599\/TST.2019.9010051","article-title":"A hybrid unsupervised clustering-based anomaly detection method","volume":"26","author":"Pu","year":"2021","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1109\/JIOT.2020.3018677","article-title":"Zero-bias deep learning for accurate identification of Internet-of-Things (IoT) devices","volume":"8","author":"Liu","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Nair, R., Sharma, P., and Kumar Singh, D. (2020). Security Attacks in Internet of Things, Wiley Online Library Publishing. Chapter 14.","DOI":"10.1002\/9781119670087.ch14"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Sharma, P., Kherajani, M., Jain, D., and Patel, D. (2020, January 28\u201329). A Study of Routing Protocols, Security Issues and Attacks in Network Layer of Internet of Things Framework. Proceedings of the 2nd International Conference on Data, Engineering and Applications (IDEA), Bhopal, India.","DOI":"10.1109\/IDEA49133.2020.9170741"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Raghuprasad, A., Padmanabhan, S., Babu, M.A., and Binu, P.K. (2020, January 28\u201330). Security analysis and prevention of attacks on IoT devices. Proceedings of the International Conference on Communication and Signal Processing (ICCSP), Chennai, India.","DOI":"10.1109\/ICCSP48568.2020.9182055"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"105426","DOI":"10.1109\/ACCESS.2020.2998819","article-title":"Prioritization based taxonomy of DevOps security challenges using PROMETHEE","volume":"8","author":"Rafi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_82","unstructured":"Mohan, V., and Othmane, L.B. (September, January 31). SecDevOps: Is it a marketing buzzword?-Mapping research on security in DevOps. Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MS.2017.3571578","article-title":"Francois Raynaud on DevSecOps","volume":"34","author":"Carter","year":"2017","journal-title":"IEEE Softw."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Karapantelakis, A., Liang, H., Wang, K., Vandikas, K., Inam, R., Fersman, E., Mulas-Viela, I., Seyvet, N., and Giannokostas, V. (2016, January 22\u201324). DevOps for IoT Applications using cellular networks and Cloud. Proceedings of the IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria.","DOI":"10.1109\/FiCloud.2016.55"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"10189","DOI":"10.1109\/JIOT.2020.3009633","article-title":"Continuous delivery of customized SaaS edge applications in highly distributed IoT systems","volume":"7","author":"Diaz","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"10695","DOI":"10.1109\/JIOT.2020.3012763","article-title":"DevOps for IoT systems: Fast & continuous monitoring feedback of system availability","volume":"7","author":"Humanes","year":"2020","journal-title":"IEEE Internet Things J."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/12\/4\/154\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:58:47Z","timestamp":1760363927000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/12\/4\/154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":86,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,4]]}},"alternative-id":["info12040154"],"URL":"https:\/\/doi.org\/10.3390\/info12040154","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,7]]}}}