Skip to main content

Anomaly Detection Under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption

  • Conference paper
  • First Online:
Wireless Artificial Intelligent Computing Systems and Applications (WASA 2024)

Abstract

Learning-based anomaly detection methods train models using normal data samples to capture normal behavioral patterns for identifying anomalies. Unfortunately, the distribution of normal data in Internet of Things (IoT) environments always shifts because of device upgrades and security patch implementations. Although few efforts have been made, current approaches fail to effectively exclude anomalies during the phase of normality shifts detection, and suffer from a high labeling costs during the adaptation phase. To overcome these drawbacks, this study proposes a comprehensive solution encompassing three modules. The first Normality Shift Filter is preposed to filter anomalies, meanwhile, leverages the latent space representation of an Autoencoder (AE) to capture representative samples, thereby significantly reducing the cost of labeling. The second Normality Shift Detector employs a tripartite ensemble method to accurately detect normality shifts. The third Normality Shift Adapter is designed as a customized progressive neural network to further adapt incoming shifts while retaining the valuable knowledge learned from historical data. Empirical tests conducted on open datasets demonstrate that our proposed method outperforms the state-of-the-art (SOTA) methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Al-Hawawreh, M., Sitnikova, E., et al.: X-iiotid: a connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things. IEEE Internet Things J. 9(5), 3962ā€“3977 (2022)

    Article  Google Scholar 

  2. Andresini, G., Pendlebury, F., et al.: Insomnia: towards concept-drift robustness in network intrusion detection. In: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, pp. 111ā€“122 (2021)

    Google Scholar 

  3. Cai, Z., He, Z.: Trading private range counting over big iot data. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 144ā€“153 (2019)

    Google Scholar 

  4. Cai, Z., Zheng, X., et al.: Private data trading towards range counting queries in internet of things. IEEE Trans. Mob. Comput. (2022)

    Google Scholar 

  5. Du, M., Chen, Z., et al.: Lifelong anomaly detection through unlearning. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security pp. 1283ā€“1297 (2019)

    Google Scholar 

  6. Fisher, R.A.: Statistical methods for research workers. In: Breakthroughs in Statistics: Methodology and Distribution, pp. 66ā€“70. Springer (1970)

    Google Scholar 

  7. Han, D., Wang, Z., et al.: Anomaly detection in the open world: normality shift detection, explanation, and adaptation. In: 30th Annual Network and Distributed System Security Symposium (NDSS) (2023)

    Google Scholar 

  8. Jordaney, R., Sharad, K., et al.: Transcend: detecting concept drift in malware classification models. In: Proceedings of the 26th USENIX Conference on Security Symposium, pp. 625ā€“642 (2017)

    Google Scholar 

  9. Lu, J., Liu, A., et al.: Learning under concept drift: a review. IEEE Trans. Knowl. Data Eng. 31(12), 2346ā€“2363 (2019)

    Google Scholar 

  10. Meng, W., Liu, Y., et al.: Logclass: anomalous log identification and classification with partial labels. IEEE Trans. Netw. Serv. Manage. 18(2), 1870ā€“1884 (2021)

    Article  Google Scholar 

  11. Ramesh, R., Thangaraj, S.J.J.: Analyzing and detecting botnet attacks using anomaly detection with machine learning. In: 2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 911ā€“915 (2023)

    Google Scholar 

  12. Rusu, A.A., Rabinowitz, N.C., et al.: Progressive neural networks. arXiv preprint arXiv:1606.04671 (2016)

  13. Sharma, D.K., Dhankhar, T., et al.: Anomaly detection framework to prevent ddos attack in fog empowered iot networks. Ad Hoc Netw. 121, 102603 (2021)

    Article  Google Scholar 

  14. Smirnov, N.V.: On the estimation of the discrepancy between empirical curves of distribution for two independent samples. Bull. Math. Univ. Moscou 2(2), 3ā€“14 (1939)

    MathSciNet  Google Scholar 

  15. Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy, pp. 305ā€“316 (2010)

    Google Scholar 

  16. Song, J., Takakura, H., et al.: Statistical analysis of honeypot data and building of kyoto 2006+ dataset for nids evaluation. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 29ā€“36 (2011)

    Google Scholar 

  17. Upadhyay, S.: Nature-Inspired Malware and Anomaly Detection in Android-Based Systems, pp. 85ā€“108. Springer (2022)

    Google Scholar 

  18. Yang, L., Zou, Y., et al.: Distributed consensus for blockchains in internet-of-things networks. Tsinghua Science and Technology (2022)

    Google Scholar 

  19. Yang, L., Guo, W., et al.: CADE: Detecting and explaining concept drift samples for security applications. In: 30th USENIX Security Symposium (USENIX Security 21). pp. 2327ā€“2344 (2021)

    Google Scholar 

  20. Yang, Y., Wu, L., et al.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250ā€“1258 (2017)

    Article  Google Scholar 

  21. Yu, D., Zou, Y., et al.: Competitive age of information in dynamic iot networks. IEEE Internet Things J. 8(20), 15160ā€“15169 (2020)

    Article  Google Scholar 

  22. Zahan, H., Al Azad, M.W., et al.: Iot-ad: a framework to detect anomalies among interconnected iot devices. IEEE Internet Things J. 11(1), 478ā€“489 (2024)

    Google Scholar 

  23. Zheng, X., Cai, Z.: Preserved data sharing towards multiple parties in industrial iots. IEEE J. Sel. Areas Commun. 38(5), 968ā€“979 (2020)

    Article  Google Scholar 

  24. Zhou, X., Liang, W., et al.: Adaptive segmentation enhanced asynchronous federated learning for sustainable intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. (2024)

    Google Scholar 

  25. Zhou, X., Wu, J., et al.: Reconstructed graph neural network with knowledge distillation for lightweight anomaly detection. IEEE Trans. Neural Networks Learn. Syst. (2024)

    Google Scholar 

  26. Zou, Y., Xu, M., et al.: Crowd density computation and diffusion via internet of things. IEEE Internet Things J. 7(9), 8111ā€“8121 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

This work is partially supported by the Young Scientists Fund of the National Natural Science Foundation of China under Grant No. 62302322 and 62302196, in part by the Guangzhou Basic and Applied Basic Research Project under Grant SL2022A04J01519.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenyi Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pan, M., Tang, W., He, Z., Chen, B. (2025). Anomaly Detection Under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption. In: Cai, Z., Takabi, D., Guo, S., Zou, Y. (eds) Wireless Artificial Intelligent Computing Systems and Applications. WASA 2024. Lecture Notes in Computer Science, vol 14998. Springer, Cham. https://doi.org/10.1007/978-3-031-71467-2_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-71467-2_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-71466-5

  • Online ISBN: 978-3-031-71467-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics