Open Access iconOpen Access

REVIEW

crossmark

A Comprehensive Survey of Contemporary Anomaly Detection Methods for Securing Smart IoT Systems

Chaimae Hazman1,2, Azidine Guezzaz2, Said Benkirane2, Mourade Azrour3,*, Vinayakumar Ravi4, Abdulatif Alabdulatif 5

1 Research Team LAMIGEP, EMSI, Marrakech, 40000, Morocco
2 SISAR Team, LaRTID Laboratory, Higher School of Technology, Cadi Ayyad University, Marrakech, 40000, Morocco
3 IMIA Laboratory, MSIA Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, 52000, Morocco
4 Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar, 31952, Saudi Arabia
5 Department of Computer Science, College of Computer, Qassim University, Buraydah, 52571, Saudi Arabia

* Corresponding Author: Mourade Azrour. Email: email

Computers, Materials & Continua 2025, 85(1), 301-329. https://doi.org/10.32604/cmc.2025.064777

Abstract

Attacks are growing more complex and dangerous as network capabilities improve at a rapid pace. Network intrusion detection is usually regarded as an efficient means of dealing with security attacks. Many ways have been presented, utilizing various strategies and focusing on different types of visitors. Anomaly-based network intrusion monitoring is an essential area of intrusion detection investigation and development. Despite extensive research on anomaly-based network detection, there is still a lack of comprehensive literature reviews covering current methodologies and datasets. Despite the substantial research into anomaly-based network intrusion detection algorithms, there is a dearth of a research evaluation of new methodologies and datasets. We explore and evaluate 50 highest publications on anomaly-based intrusion detection using an in-depth review of related literature techniques. Our work thoroughly explores the technological environment of the subject in order to help future research in this sector. Our examination is carried out from the relevant angles: application areas, data preprocessing and threat detection approaches, assessment measures, and datasets. We select unresolved research difficulties and underexplored research areas from every viewpoint recommendation of the study. Finally, we outline five potentially increased research areas for the future.

Keywords

Smart IoT security; anomaly detection; attacks; machine learning; deep learning; datasets

Cite This Article

APA Style
Hazman, C., Guezzaz, A., Benkirane, S., Azrour, M., Ravi, V. et al. (2025). A Comprehensive Survey of Contemporary Anomaly Detection Methods for Securing Smart IoT Systems. Computers, Materials & Continua, 85(1), 301–329. https://doi.org/10.32604/cmc.2025.064777
Vancouver Style
Hazman C, Guezzaz A, Benkirane S, Azrour M, Ravi V, Alabdulatif A. A Comprehensive Survey of Contemporary Anomaly Detection Methods for Securing Smart IoT Systems. Comput Mater Contin. 2025;85(1):301–329. https://doi.org/10.32604/cmc.2025.064777
IEEE Style
C. Hazman, A. Guezzaz, S. Benkirane, M. Azrour, V. Ravi, and A. Alabdulatif, “A Comprehensive Survey of Contemporary Anomaly Detection Methods for Securing Smart IoT Systems,” Comput. Mater. Contin., vol. 85, no. 1, pp. 301–329, 2025. https://doi.org/10.32604/cmc.2025.064777



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 3101

    View

  • 2216

    Download

  • 0

    Like

Share Link