Analysis of Machine Learning Techniques for Anomaly Detection in the Internet of Things (original) (raw)
Related papers
A Machine Learning-based Approach for Anomaly Detection in IoT Systems
Turkish Journal of Computer and Mathematics Education (TURCOMAT)
The increased use of IoT devices has created new hurdles in the detection of anomalies. Anomaly detection is the process of discovering unexpected or abnormal behaviour in a system, and anomalies in IoT systems can be produced by a variety of sources, including hardware and software faults, cyber assaults, and environmental conditions. Machine learning-based approaches for anomaly detection in IoT systems have emerged as a viable option, harnessing the capabilities of machine learning algorithms to detect and categorise anomalies in real-time. However, there are drawbacks to these approaches, such as data quality difficulties, the necessity for real-time analysis, and the possibility of false positives and false negatives. Organizations must carefully analyse the trade-offs associated in their implementation and deployment to overcome these problems. Based on research a review of machine learning-based algorithms for anomaly detection in IoT systems. We explore the problems and pote...
Cornell University - arXiv, 2022
The Internet of Things (IoT) is a system that connects physical computing devices, sensors, software, and other technologies. Data can be collected, transferred, and exchanged with other devices over the network without requiring human interactions. One challenge the development of IoT faces is the existence of anomaly data in the network. Therefore, research on anomaly detection in the IoT environment has become popular and necessary in recent years. This survey provides an overview to understand the current progress of the different anomaly detection algorithms and how they can be applied in the context of the Internet of Things. In this survey, we categorize the widely used anomaly detection machine learning and deep learning techniques in IoT into three types: clustering-based, classification-based, and deep learningbased. For each category, we introduce some state-of-the-art anomaly detection methods and evaluate the advantages and limitations of each technique.
Machine Learning Methods for Anomaly Detection in IoT Networks, with Illustrations
Machine Learning for Networking
IoT devices have been the target of 100 million attacks in the first half of 2019 [1]. According to [2], there will be more than 64 billion Internet of Things (IoT) devices by 2025. It is thus crucial to secure IoT networks and devices, which include significant devices like medical kit or autonomous car. The problem is complicated by the wide range of possible attacks and their evolution, by the limited computing resources and storage resources available on devices. We begin by introducing the context and a survey of Intrusion Detection System (IDS) for IoT networks with a state of the art. So as to test and compare solutions, we consider available public datasets and select the CIDDS-001 Dataset. We implement and test several machine learning algorithms and show that it is relatively easy to obtain reproducible results [20] at the state-of-the-art. Finally, we discuss embedding such algorithms in the IoT context and point-out the possible interest of very simple rules.
Study of Anomaly Detection in IoT Sensors
The rapid proliferation of Internet of Things (IoT) technology has resulted in an exponential increase in the number of connected devices and sensors. These sensors play a crucial role in collecting and transmitting data, enabling various applications and services in diverse domains. However, the large-scale deployment of IoT sensors also introduces new challenges, particularly in the realm of anomaly detection. This research paper presents a comprehensive study of anomaly detection techniques specifically designed for IoT sensors. We delve into the different types of anomalies that can occur in IoT sensor data, including sudden changes, outliers, and malicious attacks. Moreover, we explore the unique characteristics and requirements of IoT sensor networks, such as resource constraints, heterogeneous data, and dynamic network topologies. To address these challenges, we provide an overview of state-of-the-art anomaly detection methods tailored to IoT sensor networks. These methods encompass both traditional statistical approaches and machine learning algorithms, considering their applicability and effectiveness in the IoT context. We discuss the strengths and limitations of each technique, highlighting their suitability for different anomaly detection scenarios. Furthermore, we analyze and compare the performance of these methods using real-world IoT sensor datasets, evaluating their accuracy, efficiency, and scalability. The findings of our study shed light on the strengths and limitations of existing techniques, enabling researchers and practitioners to make informed decisions when choosing an appropriate anomaly detection method for their IoT sensor networks. By enhancing the reliability and security of IoT sensor networks, the outcomes of this research contribute to the advancement of IoT technology and its widespread adoption in various domains, including smart cities, healthcare, transportation, and industrial automation.
A Review of Machine Learning and Deep Learning Techniques for Anomaly Detection in IoT Data
Applied Sciences
Anomaly detection has gained considerable attention in the past couple of years. Emerging technologies, such as the Internet of Things (IoT), are known to be among the most critical sources of data streams that produce massive amounts of data continuously from numerous applications. Examining these collected data to detect suspicious events can reduce functional threats and avoid unseen issues that cause downtime in the applications. Due to the dynamic nature of the data stream characteristics, many unresolved problems persist. In the existing literature, methods have been designed and developed to evaluate certain anomalous behaviors in IoT data stream sources. However, there is a lack of comprehensive studies that discuss all the aspects of IoT data processing. Thus, this paper attempts to fill this gap by providing a complete image of various state-of-the-art techniques on the major problems and core challenges in IoT data. The nature of data, anomaly types, learning mode, window...
Attack and Anomaly Detection in IoT Networks using Machine Learning
International Journal of Computer Science and Mobile Computing, 2020
For quite a few years now the name Internet of Things (IoT) has been around. IoT is a technology capable of revolutionizing our way of life, in sectors ranging from transportation to health, from entertainment to our interactions with government. Even this great opportunity presents a number of critical obstacles. As we strive to develop policies, regulations, and governance that form this development without stifling creativity, the increase in the number of devices and the frequency of that increase presents problems to our security and freedom. This work attentions on the security aspect of IoT networks by examining the serviceability of machine learning algorithms in detecting anomalies that are contained within such network data. It discusses (Machine Learning (ML) algorithms which are used effectively in relatively similar situations and compares them using several parameters and methods. The following algorithms are implemented in this work: Random Forest (RF), Naive Bayes (NB), Support Vector Machine (SVM), and Decision tree Algorithm. The Random Forest algorithm obtained the best results, with an accuracy of 99.5 per cent.
Machine Learning for Anomaly Detection in IoT networks: Malware analysis on the IoT-23 Data set
2020
The Internet of Things is one of the newer developments in the domain of the Internet. It is defined as a network of connected devices and sensors, both physical and digital, that generate and exchange large amounts of data without the need for human intervention. As a result of eliminating the need for human operators, the IoT (Internet of Things) can process more data than ever before faster and more efficient. This paper focuses on the security aspect of IoT networks by investigating the usability of machine learning algorithms in the detection of anomalies found within the data of such networks. It examines ML algorithms that are successfully utilized in relatively similar situations and compares using a number of parameters and methods. This paper implements the following algorithms: Random Forest (RF), Näıve Bayes (NB), Multi Layer Perceptron (MLP), a variant of the Artificial Neural Network class of algorithms, Support Vector Machine (SVM) and AdaBoost (ADA). The best results...
Proceedings of the 15th International Conference on Availability, Reliability and Security, 2020
The insecure growth of Internet-of-Things (IoT) can threaten its promising benefits to our daily life activities. Weak designs, low computational capabilities, and faulty protocol implementations are just a few examples that explain why IoT devices are nowadays highly prone to cyber-attacks. In this survey paper, we review approaches addressing this problem. We focus on machine learningbased solutions as a representative trend in the related literature. We survey and classify Machine Learning (ML)-based techniques that are suitable for the construction of Intrusion Detection Systems (IDS) for IoT. We contribute with a detailed classification of each approach based on our own taxonomy. Open issues and research challenges are also discussed and provided.
Internet of Things: A survey on machine learning-based intrusion detection approaches
Computer Networks, 2019
In the world scenario, concerns with security and privacy regarding computer networks are always increasing. Computer security has become a necessity due to the proliferation of information technologies in everyday life. The increase in the number of Internet accesses and the emergence of new technologies, such as the Internet of Things (IoT paradigm, are accompanied by new and modern attempts to invade computer systems and networks. Companies are increasingly investing in studies to optimize the detection of these attacks. Institutions are selecting intelligent techniques to test and verify by comparing the best rates of accuracy. This research, therefore, focuses on rigorous state-of-the-art literature on Machine Learning Techniques applied in Internet-of-Things and Intrusion Detection for computer network security. The work aims, therefore, recent and in-depth research of relevant works that deal with several intelligent techniques and their applied intrusion detection architectures in computer networks with emphasis on the Internet of Things and machine learning. More than 95 works on the subject were surveyed, spanning across different themes related to security issues in IoT environments.
Anomaly Detection in IoT Networks: From Architectures to Machine Learning Transparency
IEEE Access, 2021
Machine learning (ML) is becoming an integral part of networks security arsenal, where Internet of Things (IoT) structures play an increasingly important role. However, IoT networks have many specific requirements, mostly due to limited energy availability and stringent computing resources. This results in limitations for traditional ML approaches to security, in particular for anomaly detection. Consequently, new focuses for solutions that range from architectural to data processing ones are necessary. Therefore, appropriate lightweight ML algorithms have to be designed and deployed in appropriate architectural settings, which is the main contribution of this paper. In addition, insights into ML functioning are needed to better understand the observed anomalies. To enable these insights (and support a wider applicability of ML based approaches), the results have to be as explainable as possible. The research presented in this paper addresses this problem through the functional and data transparency of ML applications, tailored to the specifics of anomaly detection in IoT networks. To tackle accordingly also the architectural issues, the presented approach builds on the well-established layering principle from computer communications reference models. This principle not only supports flexibility but also increases security in these new environments of growing importance. INDEX TERMS Computer networks, Internet of Things, security architectures, anomaly detection, machine learning, functional transparency, data transparency.