Skip to main content

Advertisement

Log in

Simulation and Modeling for Anomaly Detection in IoT Network Using Machine Learning

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

Today we are living in an era where everything is changing to be smart, whether it be a smart home, smart industries, smart irrigation, or a smart meter, where the word smart refers to the involvement of the Internet of Things (IoT). The increased use of IoT infrastructure in these fields has led to the failure of the nodes, increase in threats, attacks, abnormalities, and spying, which is the primary concern and an important domain of an IoT. The main objective of this paper is to use a supervised learning model to predict anomalies in the historical data which can later be incorporated into real-world scenarios to block the upcoming anomalies and attacks. This paper predicts the anomalies on the 350 K data set using the Machine Learning models and compares its performance based on the state of arts. In this paper, two different approaches are used based on the analysis done on the dataset. The classification algorithms were applied to the whole dataset in the first, and then the same classification algorithms were applied after excluding the data points having binary values (0 and 1) in the feature "value" and have achieved an average of 99.4% accuracy for the first case and 99.99% accuracy for the later.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32

Similar content being viewed by others

References

  1. O. Vermesan, P. Friess, P. Guillemin, et al., "Internet of things strategic research roadmap", Internet of Things: Global Technological and Societal Trends, vol. 1, pp.9–52, 2011.

    Google Scholar 

  2. I. Pena-L'opez, Itu Internet Report 2005: The Internet of Things, 2005.

  3. Laney, D. 3D data management: controlling data volume, velocity, and variety. META Group Research Note, 6, p. 70, 2011.

    Google Scholar 

  4. Zaslavsky, A., Perera, C. and Georgakopoulos, D. Sensing as a Service and Big Data. Paper presented at the International Conference on Advances in Cloud Computing (ACC), Bangalore, India, 2012.

  5. M.-O. Pahl, F.-X. Aubet, All eyes on you: distributed multi- dimensional IoT microservice anomaly detection, in: Proceedings of the 2018 Fourteenth International Conference on Network and Service Management (CNSM) (CNSM 2018), Rome, Italy, 2018.

  6. M.-O. Pahl, F.-X. Aubet , S. Liebald, Graph-based IoT microservice security, in: Proceedings of the NOMS 2018–2018 IEEE/IFIP Network Operations and Management Symposium, IEEE, 2018, pp. 1–3.

  7. N.K. Sahu, I. Snigdh, Applying Machine Learning Algorithms in Network-Based Intrusion Detection Systems, https://doi.org/10.1007/978-981-33-6393-9 Pages 229–236

  8. Mohamed Abomhara and Geir M. Køien Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks, Journal of Cyber Security and Mobility 4 Issue: 1 Article No: 4 pg: 65–88, Jan-2015.

  9. Jyoti Deogirikar ; Amarsinh Vidhate "Security attacks in IoT: A survey", International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2017.

  10. Liang Xiao ; Xiaoyue Wan ; Xiaozhen Lu ; Yanyong Zhang ; Di Wu IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? IEEE Signal Processing Magazine (Volume: 35, Issue: 5 , Sept. 2018)

  11. M.-O. Pahl, F.-X. Aubet, DS2OS traffic traces, 2018. (https://www.kaggle.com/francoisxa/ds2ostraffictraces)

  12. Sahu, N. K., Patnaik, M., & Snigdh, I. (2021). Feature Engineering for Various Data Types in Data Science. In M. Panda, & H. Misra (Ed.), Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science (pp. 1–16). IGI Global. http://doi:https://doi.org/10.4018/978-1-7998-6659-6.ch001

  13. J A Hanley, B J McNeil "The meaning and use of the area under a receiver operating characteristic (ROC) curve" RSNA Radiology, published Online April-1982 (https://doi.org/10.1148/radiology.143.1.7063747)

  14. Kendrick Boyd, Kevin H. Eng, C. David Page, "Area under the Precision-Recall Curve: Point Estimates and Confidence Intervals", Joint European Conference on Machine Learning and Knowledge Discovery in Databases Machine Learning and Knowledge Discovery in Databases pp 451–466, 2013

  15. Ghamrawi, N. and McCallum, A., 2005. Collective multi-label classification. Proceedings of the 14th ACM international conference on Information and knowledge management - CIKM '05,.

  16. M. Hasan, Md. M. Islam and Md. II Zarif et al. / Internet of Things 7 (2019) 100059.

  17. X. Liu, Y. Liu, A. Liu, L.T. Yang, defending on–off attacks using light probing messages in smart sensors for industrial communication systems, IEEE Trans. Ind. Inf. 14 (9) (2018) 3801–3811.

    Article  Google Scholar 

  18. H.H. Pajouh, R. Javidan, R. Khayami, D. Ali, K.-K.R. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks, IEEE Trans. Emerg. Top. Comput. (2016).

  19. A .A . Diro, N. Chilamkurti, Distributed attack detection scheme using deep learning approach for internet of things, Future Gen. Comput. Syst. 82 (2018) 761–768.

    Google Scholar 

  20. G. D'Angelo, F. Palmieri, M. Ficco, S. Rampone, An uncertainty-managing batch relevance-based approach to network anomaly detection, Appl. Soft Comput. 36 (2015) 408–418.

    Article  Google Scholar 

  21. O. Brun, Y. Yin, E. Gelenbe, Y.M. Kadioglu, J. Augusto-Gonzalez, M. Ramos, Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments, in: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Recent Cybersecurity Re- search in Europe. Lecture Notes CCIS: 821, 2018.

  22. E. Anthi, L. Williams, P. Burnap. Pulse: an adaptive intrusion detection for the internet of things. Living in the Internet of Things: Cybersecurity of the IoT - 2018, 2018 page (4 pp.)

Download references

Funding

N/A.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudip Kumar Sahana.

Ethics declarations

Conflicts of interest

N/A.

Data availability

N/A.

Code availability

N/A.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary file1 (RAR 593 kb)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mukherjee, I., Sahu, N.K. & Sahana, S.K. Simulation and Modeling for Anomaly Detection in IoT Network Using Machine Learning. Int J Wireless Inf Networks 30, 173–189 (2023). https://doi.org/10.1007/s10776-021-00542-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-021-00542-7

Keywords

Navigation