Navigating the IoT Landscape: A Deep Dive into Anomaly Classification for IoT Security
International Journal of Electronics and Communication Engineering |
© 2024 by SSRG - IJECE Journal |
Volume 11 Issue 11 |
Year of Publication : 2024 |
Authors : Jisha Jose, J.E. Judith |
How to Cite?
Jisha Jose, J.E. Judith, "Navigating the IoT Landscape: A Deep Dive into Anomaly Classification for IoT Security," SSRG International Journal of Electronics and Communication Engineering, vol. 11, no. 11, pp. 153-167, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I11P114
Abstract:
The Internet of Things (IoT) is crucial for technological advancement, attracting significant interest from researchers worldwide. However, the exponential growth of IoT devices and their huge volumes of data introduce substantial risks related to several security threats and vulnerabilities. The increasing implementation of IoT infrastructure has led to challenges such as device failures, elevated risks, and greater exposure to attacks, anomalies, and potential security breaches. Tackling and alleviating these concerns represent a critical area of focus within the broader field of IoT. By utilizing the IoTID20 dataset, precisely designed for IoT anomaly detection, the study suggests a novel approach for anomaly classification in IoT environments using a Deep Learning (DL) model optimized by a Normalized Bayesian Optimization Algorithm (NBOA) and a Convolutional Neural Network (CNN) architecture is employed for classifying anomaly, benefiting from the spatial pattern recognition capabilities of CNNs. The study employs a Machine Learning (ML) approach that utilizes Decision Tree (DT) and feature selection through the Harris Hawk Optimization (HHO) algorithm. The study validates the efficiency of using NBOA and HHO in boosting anomaly classification, ensuring faster convergence and improved accuracy. The outcomes demonstrate the superior performance of the DL model with 95.67% accuracy, surpassing the proposed ML and other state-of-the-art models. Combining these advanced optimization techniques with the DL and ML models, the study addresses the security challenges in the rapidly expanding IoT landscape, offering a robust solution for real-time anomaly detection.
Keywords:
Anomalies, Internet of things, Deep learning, Machine learning, Optimization.
References:
[1] Martha Rodríguez, Diana P. Tobón, and Danny Múnera, “Anomaly Classification in Industrial Internet of Things: A Review,” Intelligent Systems with Applications, vol. 18, pp. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Fereshteh Abbasi, Marjan Naderan, and Seyed Enayatallah Alavi, “Anomaly Detection in Internet of Things Using Feature Selection and Classification Based on Logistic Regression and Artificial Neural Network on N-BaIoT Dataset,” 2021 5th International Conference on Internet of Things and Applications (IoT), Isfahan, Iran, pp. 1-7, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Khaled A. Alaghbari et al., “Deep Autoencoder-Based Integrated Model for Anomaly Detection and Efficient Feature Extraction in IoT Networks,” IoT, vol. 4, no. 3, pp. 345-365, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Himani Tyagi, and Rajendra Kumar, “Attack and Anomaly Detection in IoT Networks Using Supervised Machine Learning Approaches,” Revue d'Intelligence Artificielle, vol. 35, no. 1, pp. 11-21, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Redhwan Al-amri et al., “A Review of Machine Learning and Deep Learning Techniques for Anomaly Detection in Iot Data,” Applied Sciences, vol. 11, no. 12, pp. 1-23, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Esra Altulaihan, Mohammed Amin Almaiah, and Ahmed Aljughaiman, “Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms,” Sensors, vol. 24, no. 2, pp. 1-30, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Yue Guan, Morteza Noferesti, and Naser Ezzati-Jivan, “A Two-Tiered Framework for Anomaly Classification in IoT Networks Utilizing CNN-BiLSTM Model,” Software Impacts, vol. 20, pp. 1-8, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Qi Xin et al., “IoT Traffic Classification and Anomaly Detection Method Based on Deep Autoencoders,” Preprints.org, pp. 1-13, 2024.
[Google Scholar] [Publisher Link]
[9] Maryam Mahsal Khan, and Mohammed Alkhathami, “Anomaly Detection in IoT-Based Healthcare: Machine Learning for Enhanced Security,” Scientific Reports, vol. 14, no. 1, pp. 1-16, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Tin Lai et al., “Ensemble Learning Based Anomaly Detection for IoT Cybersecurity via Bayesian Hyperparameters Sensitivity Analysis,” Cybersecurity, vol. 7, no. 1, pp. 1-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Usama Tahir et al., “Enhancing IoT Security through Machine Learning-Driven Anomaly Detection,” VFAST Transactions on Software Engineering, vol. 12, no. 2, pp. 1-13, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Bhawana Sharma et al., “Anomaly Based Network Intrusion Detection for IoT Attacks Using Deep Learning Technique,” Computers and Electrical Engineering, vol. 107, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] R.S. Kamalakannan et al., “Anomaly based Intrusion Detection System Using Hybrid Machine Learning Approach in IoT Environment,” Journal of Electrical Systems, vol. 20, no. 10s, pp. 2763-2771, 2024.
[Google Scholar] [Publisher Link]
[14] Asif Rahim et al., “Enhancing Smart Home Security: Anomaly Detection and Face Recognition in Smart Home IoT Devices Using Logit-Boosted CNN Models,” Sensors, vol. 23, no. 15, pp. 1-42, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Muhammad Aminu Lawal, Riaz Ahmed Shaikh, and Syed Raheel Hassan, “Security Analysis of Network Anomalies Mitigation Schemes in IoT Networks,” IEEE Access, vol. 8, pp. 43355-43374, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] IoT Intrusion Dataset. [Online]. Available: https://sites.google.com/view/iot-network-intrusion-dataset/home
[17] Imtiaz Ullah, and Qusay H. Mahmoud, “Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks,” IEEE Access, vol. 9, pp. 103906-103926, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Dukka Karun Kumar Reddy et al., “Ensemble Bagging Approach for IoT Sensor Based Anomaly Detection,” Proceeding of the First International Conference on Intelligent Computing in Control and Communication, pp. 647-665, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Xilu Wang et al., “Recent Advances in Bayesian Optimization,” ACM Computing Surveys, vol. 55, no. 13s, pp. 1-36, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Madeline E. Scyphers et al., “Bayesian Optimization for Anything (BOA): An Open-Source Framework for Accessible, User-Friendly Bayesian Optimization,” Environmental Modelling & Software, vol. 182, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Shaik Althaf V. Shajihan et al., “CNN Based Data Anomaly Detection Using Multi-Channel Imagery for Structural Health Monitoring,” Smart Structures and Systems, vol. 29, no. 1, pp. 181-193, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Ali Asghar Heidari et al., “Harris Hawks Optimization: Algorithm and Applications,” Future Generation Computer Systems, vol. 97, pp. 849-872, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[23] B.K. Tripathy et al., “Harris Hawk Optimization: A Survey Onvariants and Applications,” Computational Intelligence and Neuroscience, vol. 2022, no. 1, pp. 1-20, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Amuthan Prabakar Muniyandi, R. Rajeswari, and R. Rajaram, “Network Anomaly Detection by Cascading K-Means Clustering and C4. 5 Decision Tree Algorithm,” Procedia Engineering, vol. 30, pp. 174-182, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Panagiotis I. Radoglou-Grammatikis, and Panagiotis G. Sarigiannidis, “An Anomaly-Based Intrusion Detection System for the Smart Grid Based on Cart Decision Tree,” 2018 Global Information Infrastructure and Networking Symposium (GIIS), Thessaloniki, Greece, pp. 1-5, 2018.
[CrossRef] [Google Scholar] [Publisher Link]