Trends in IoT Intrusion Detection: A Bibliometric Analysis of Deep Learning Approaches

Amir Muhammad Hafiz Othman (1), Mohd Faizal Ab Razak (2), Ahmad Firdaus (3), Syazwani Ramli (4), Wan Nur Syamilah Wan Ali (5)
(1) Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia
(2) Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia
(3) Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia
(4) Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Parit Raja, Johor, Malaysia
(5) Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia
Fulltext View | Download
How to cite (IJASEIT) :
[1]
A. M. H. Othman, M. F. Ab Razak, A. Firdaus, S. Ramli, and W. N. S. Wan Ali, “Trends in IoT Intrusion Detection: A Bibliometric Analysis of Deep Learning Approaches”, Int. J. Adv. Sci. Eng. Inf. Technol., vol. 15, no. 3, pp. 754–763, Jun. 2025.
The Internet of Things (IoT) has transformed modern technology by interconnecting devices and systems, improving efficiency and functionality across various domains. However, its rapid expansion has also introduced significant security vulnerabilities, necessitating the development of robust intrusion detection systems (IDS) to counter evolving cyber threats. Despite advancements in IDS research, particularly through deep learning integration, a systematic bibliometric analysis assessing global research trends, key contributors, and collaboration networks remains lacking. This study addresses that gap by conducting a bibliometric analysis of IDS for IoT using deep learning, focusing on articles published between 2016 and 2024 in the Scopus database. It examines global research trends, keyword co-occurrences, publication patterns, citation dynamics, and international collaborations, offering a comprehensive overview of the field. The findings indicate a significant rise in IDS research, with India, China, the United States, and Saudi Arabia emerging as leading contributors and collaborators. The analysis also highlights influential authors and institutions driving advancements in deep learning for IoT security. Keyword analysis reveals the prominence of terms such as "machine learning," "deep learning," and "intrusion detection," underscoring the field’s focus on artificial intelligence for IoT security. This bibliometric study enhances the understanding of research dynamics in IDS for IoT, identifies gaps for future exploration, and provides valuable insights to drive innovation and global collaboration in this critical area of cybersecurity.

E. H. Houssein, M. A. Othman, W. M. Mohamed, and M. Younan, "Internet of Things in smart cities: Comprehensive review, open issues and challenges," IEEE Internet Things J., 2024, doi:10.1109/JIOT.2024.3449753.

H. Edquist, P. Goodridge, and J. Haskel, "The Internet of Things and economic growth in a panel of countries," Econ. Innov. New Technol., vol. 30, no. 3, pp. 262-283, 2021, doi:10.1080/10438599.2019.1695941.

M. Shahin, M. Maghanaki, A. Hosseinzadeh, and F. F. Chen, "Advancing network security in Industrial IoT: A deep dive into AI-enabled intrusion detection systems," Adv. Eng. Inform., vol. 60, Oct. 2024, doi: 10.1016/j.aei.2024.102685.

M. F. A. Razak, N. B. Anuar, R. Salleh, and A. Firdaus, "The rise of 'malware': Bibliometric analysis of malware study," J. Netw. Comput. Appl., vol. 75, pp. 58-76, 2016, doi: 10.1016/j.jnca.2016.08.022.

R. Saadouni et al., "Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: A systematic review of the literature," Cluster Comput., vol. 27, no. 7, pp. 8655-8681, Oct. 2024, doi: 10.1007/s10586-024-04388-5.

B. Dong and X. Wang, "Comparison deep learning method to traditional methods using for network intrusion detection," in Proc. IEEE Int. Conf. Commun. Softw. Netw. (ICCSN), 2016, pp. 1-6, doi:10.1109/iccsn.2016.7586590.

A. Aldhaheri et al., "Deep learning for cyber threat detection in IoT networks: A review," Internet Things Cyber-Phys. Syst., vol. 4, pp. 1-15, 2024, doi: 10.1016/j.iotcps.2023.09.003.

S. Kuutti et al., "A survey of deep learning applications to autonomous vehicle control," IEEE Trans. Intell. Transp. Syst., vol. 22, no. 2, pp. 712-733, Feb. 2021, doi: 10.1109/tits.2019.2962338.

H. A. Helaly, M. Badawy, and A. Y. Haikal, "A review of deep learning approaches in clinical and healthcare systems based on medical image analysis," Multimedia Tools Appl., vol. 83, no. 12, pp. 36039-36080, Apr. 2024, doi: 10.1007/s11042-023-16605-1.

N. Al-lQubaydhi et al., "Deep learning for unmanned aerial vehicles detection: A review," Comput. Sci. Rev., vol. 51, Feb. 2024, doi:10.1016/j.cosrev.2023.100614.

K. V. Nunen, J. Li, G. Reniers, and K. Ponnet, "Bibliometric analysis of safety culture research," Saf. Sci., vol. 108, pp. 248-258, Oct. 2018, doi: 10.1016/j.ssci.2017.08.011.

W. Li and Y. Zhao, "Bibliometric analysis of global environmental assessment research in a 20-year period," Environ. Impact Assess. Rev., vol. 50, pp. 158-166, Jan. 2015, doi: 10.1016/j.eiar.2014.09.012.

N. Donthu et al., "How to conduct a bibliometric analysis: An overview and guidelines," J. Bus. Res., vol. 133, pp. 285-296, Sep. 2021, doi: 10.1016/j.jbusres.2021.04.070.

R. Ullah, I. Asghar, and M. G. Griffiths, "An integrated methodology for bibliometric analysis: A case study of Internet of Things in healthcare applications," Sensors, vol. 23, no. 1, Jan. 2023, doi:10.3390/s23010067.

J. M. Merigó and J. B. Yang, "A bibliometric analysis of operations research and management science," Omega, vol. 73, pp. 37-48, Dec. 2017, doi: 10.1016/j.omega.2016.12.004.

P. Arora and A. Jain, "Cyber security threats and their solutions through deep learning: A bibliometric analysis," in Proc. Int. Conf. Adv. Comput., Commun. Control Netw. (ICAC3N), 2021, pp. 1944-1949, doi: 10.1109/icac3n53548.2021.9725480.

A. Sadeghi-Niaraki, "Internet of Thing (IoT) review of review: Bibliometric overview since its foundation," Future Gener. Comput. Syst., vol. 143, pp. 361-377, Jun. 2023, doi:10.1016/j.future.2023.01.016.

C. Dindorf et al., "Conceptual structure and current trends in artificial intelligence, machine learning, and deep learning research in sports: A bibliometric review," Int. J. Environ. Res. Public Health, vol. 20, no. 1, Jan. 2023, doi: 10.3390/ijerph20010173.

F. Jahoor, M. K. Joseph, and N. Madhav, "Bibliometric analysis of cybersecurity in e-learning systems and big data," in Proc. Conf. Inf. Commun. Technol. Soc. (ICTAS), 2024, pp. 57-62, doi:10.1109/ICTAS59620.2024.10507133.

A. Valencia-Arias et al., "Machine learning and blockchain: A bibliometric study on security and privacy," Information, vol. 15, no. 1, Jan. 2024, doi: 10.3390/info15010065.

K. Ganji and N. Afshan, "A bibliometric review of Internet of Things (IoT) on cybersecurity issues," J. Sci. Technol. Policy Manage., early access, 2024, doi: 10.1108/JSTPM-05-2023-0071.

D. C. Nguyen et al., "Federated learning for Internet of Things: A comprehensive survey," IEEE Commun. Surv. Tutor., vol. 23, no. 3, pp. 1622-1658, Jul. 2021, doi: 10.1109/COMST.2021.3075439.

I. H. Sarker, "Machine learning: Algorithms, real-world applications and research directions," SN Comput. Sci., vol. 2, no. 3, May 2021, doi:10.20944/preprints202103.0216.v1.

M. A. Ferrag et al., "Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study," J. Inf. Secur. Appl., vol. 50, Feb. 2020, doi:10.1016/j.jisa.2019.102419.

Y. Meidan et al., "N-BaIoT - Network-based detection of IoT botnet attacks using deep autoencoders," IEEE Pervasive Comput., vol. 17, no. 3, pp. 12-22, Jul.-Sep. 2018, doi: 10.1109/MPRV.2018.03367731.

J. Wang and S. Zhang, "Cross-cultural learning: A visualized bibliometric analysis based on Bibliometrix from 2002 to 2021," Mobile Inf. Syst., vol. 2022, Jan. 2022, doi:10.1155/2022/7478223.

M. A. Al-Garadi et al., "A survey of machine and deep learning methods for Internet of Things (IoT) security," IEEE Commun. Surv. Tutor., vol. 22, no. 3, pp. 1646-1685, Jul. 2020, doi:10.1109/COMST.2020.2988293.

N. Goranin, S. K. Hora, and H. A. Čenys, "A bibliometric review of intrusion detection research in IoT: Evolution, collaboration, and emerging trends," Electronics, vol. 13, no. 16, Aug. 2024, doi:10.3390/electronics13163210.

F. G. Montoya et al., "A fast method for identifying worldwide scientific collaborations using the Scopus database," Telemat. Inform., vol. 35, no. 1, pp. 168-185, Apr. 2018, doi: 10.1016/j.tele.2017.10.010.

E. M. Lasda Bergman, "Finding citations to social work literature: The relative benefits of using Web of Science, Scopus, or Google Scholar," J. Acad. Librariansh., vol. 38, no. 6, pp. 370-379, 2012, doi:10.1016/j.acalib.2012.08.002.

S. O. Kingsley and S. Hosseini, "Introduction to R programming and RStudio integrated development environment (IDE)," in R Programming: Statistical Data Analysis in Research, Singapore: Springer, 2024, pp. 3-24, doi: 10.1007/978-981-97-3385-9_1.

M. Aria and C. Cuccurullo, "bibliometrix: An R-tool for comprehensive science mapping analysis," J. Informetr., vol. 11, no. 4, pp. 959-975, Nov. 2017, doi: 10.1016/j.joi.2017.08.007.

R. Rodríguez-Soler, J. Uribe-Toril, and J. De Pablo Valenciano, "Worldwide trends in the scientific production on rural depopulation, a bibliometric analysis using bibliometrix R-tool," Land Use Policy, vol. 97, Sep. 2020, doi: 10.1016/j.landusepol.2020.104787.

K. S. Nikita, "Engaging in scientific publishing: Benefits and norms to follow as authors and reviewers," IEEE Antennas Propag. Mag., vol. 64, no. 3, pp. 156-160, Jun. 2022, doi: 10.1109/MAP.2022.3163359.

M. Mohammadi et al., "Deep learning for IoT big data and streaming analytics: A survey," IEEE Commun. Surv. Tutor., vol. 20, no. 4, pp. 2923-2960, Oct. 2018, doi: 10.1109/COMST.2018.2844341.

M. AL-Hawawreh, N. Moustafa, and E. Sitnikova, "Identification of malicious activities in industrial internet of things based on deep learning models," J. Inf. Secur. Appl., vol. 41, pp. 1-11, Aug. 2018, doi: 10.1016/j.jisa.2018.05.002.

J. B. Awotunde, C. Chakraborty, and A. E. Adeniyi, "Intrusion detection in Industrial Internet of Things network-based on deep learning model with rule-based feature selection," Wirel. Commun. Mob. Comput., vol. 2021, 2021, doi: 10.1155/2021/7154587.

P. Kumar, G. P. Gupta, and R. Tripathi, "An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks," Comput. Commun., vol. 166, pp. 110-124, Jan. 2021, doi: 10.1016/j.comcom.2020.12.003.

G. T. Reddy et al., "Analysis of dimensionality reduction techniques on big data," IEEE Access, vol. 8, pp. 54776-54788, 2020, doi:10.1109/access.2020.2980942.

A. Azmoodeh, A. Dehghantanha, and K. K. R. Choo, "Robust malware detection for Internet of (Battlefield) Things devices using deep eigenspace learning," IEEE Trans. Sustain. Comput., vol. 4, no. 1, pp. 88-95, Jan.-Mar. 2019, doi: 10.1109/TSUSC.2018.2809665.

A. Kumari et al., "Multimedia big data computing and Internet of Things applications: A taxonomy and process model," J. Netw. Comput. Appl., vol. 131, pp. 28-55, Dec. 2018, doi:10.1016/j.jnca.2018.09.014.

S. M. Tahsien, H. Karimipour, and P. Spachos, "Machine learning based solutions for security of Internet of Things (IoT): A survey," J. Netw. Comput. Appl., vol. 161, Jul. 2020, doi:10.1016/j.jnca.2020.102630.

R. M. Swarna Priya et al., "An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture," Comput. Commun., vol. 160, pp. 139-149, Jul. 2020, doi: 10.1016/j.comcom.2020.05.048.

V. Mothukuri et al., "Federated-learning-based anomaly detection for IoT security attacks," IEEE Internet Things J., vol. 9, no. 4, pp. 2545-2554, Feb. 2022, doi: 10.1109/jiot.2021.3077803.

M. Douiba et al., "An improved anomaly detection model for IoT security using decision tree and gradient boosting," J. Supercomput., vol. 79, no. 3, pp. 3392-3411, Feb. 2023, doi: 10.1007/s11227-022-04783-y.

A. Churcher et al., "An experimental analysis of attack classification using machine learning in IoT networks," Sensors, vol. 21, no. 2, Jan. 2021, doi: 10.3390/s21020446.

C. I. Nwakanma et al., "Explainable artificial intelligence (XAI) for intrusion detection and mitigation in intelligent connected vehicles: A review," Appl. Sci., vol. 13, no. 3, Feb. 2023, doi:10.3390/app13031252.

B. B. Gupta and M. Quamara, "An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols," Concurr. Comput. Pract. Exp., vol. 32, no. 21, 2020, doi:10.1002/cpe.4946.

R. Kumar et al., "SP2F: A secured privacy-preserving framework for smart agricultural unmanned aerial vehicles," Comput. Netw., vol. 187, Mar. 2021, doi: 10.1016/j.comnet.2021.107819.

E. H. Tusher et al., "Email spam: A comprehensive review of optimize detection methods, challenges, and open research problems," IEEE Access, vol. 12, pp. 1-1, 2024, doi: 10.1109/access.2024.3467996.

N. S. Nordin and M. A. Ismail, "A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection," Neural Comput. Appl., vol. 35, no. 7, pp. 5501-5512, Mar. 2023, doi: 10.1007/s00521-022-07957-0.

H. Hanif et al., "The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches," J. Netw. Comput. Appl., vol. 179, 2021, doi:10.1016/j.jnca.2021.103009.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).