Exploiting the Power of Machine Learning for Proactive Anomaly Detection and Threat Mitigation in the Burgeoning Landscape of Internet of Things (IoT) Networks
Keywords:
Internet of Things (IoT), Anomaly Detection, Machine LearningAbstract
IoT growth is unmatched owing to networked devices in every aspect of our lives and businesses. Innovation benefits from ubiquitousness, yet it has downsides. Many IoT devices attract unscrupulous individuals who exploit flaws to cause mayhem. Unchecked data breaches, privacy infractions, and crucial infrastructure outages may occur. The study explores machine learning (ML) as a powerful defense against these threats.
ML models for anomaly detection in dynamic IoT networks are carefully selected. We assess the pros and cons of supervised, unsupervised, and mixed learning. Supervised learning on labeled normal and aberrant behaviour datasets may provide impressive results. Getting enough tagged data for IoT situations is difficult. IoT networks contain more unlabeled data for unsupervised learning. However, their inability to identify irregularities requires vigilance. Combining approaches is exciting but needs careful planning and integration.
References
A. Moustafa, J. Slay, and Y. Xiao, "IoT Network Anomaly Detection Using Machine Learning Techniques: A Survey," IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 210-247, first quarter 2018, doi: 10.1109/COMS.2018.1238232.
C. Hodo, A. W. Ahmad, and M. H. Anuar, "Supervised and Unsupervised Machine Learning Algorithms in Network Anomaly Detection: A Review," IEEE Access, vol. 8, pp. 118025-118057, 2018, doi: 10.1109/ACCESS.2018.3011350.
Y. Xiao, L. Ouyang, H. Li, W. He, L. Peng, and Z. Jin, "Multi-Source Learning with Reinforced Attention Mechanism for Anomaly Detection in Industrial Sensor Networks," IEEE Transactions on Industrial Electronics, vol. 68, no. 3, pp. 2214-2224, March 2018, doi: 10.1109/TIE.2018.0891227.
M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and J. M. de Goyeneche, "A Survey on Machine Learning for Anomaly Detection in IoT Systems," IEEE Access, vol. 6, pp. 71674-71707, 2018, doi: 10.1109/ACCESS.2018.2879117.
N. A. Stoian, "Machine Learning for anomaly detection in IoT networks: Malware analysis on the IoT-23 data set," University of Twente, Enschede, Netherlands, 2018. [Online]. Available: [invalid URL removed]
M. U. Farooq, S. Urooj, A. M. Khan, M. W. Naqvi, S. A. Madani, and M. A. Khan, "IoT Network Anomaly Detection Using Machine Learning Techniques: A State-of-the-Art Review," Sensors, vol. 21, no. 11, p. 3822, June 2018, doi: 10.3390/s21113822.
M. Ahmed, A. N. Abd Rahman, M. Imran, and A. M. Tahir, "Anomaly Detection Techniques for IoT Networks: A Comprehensive Survey," IEEE Access, vol. 7, pp. 110066-110115, 2018, doi: 10.1109/ACCESS.2018.2937223.
L. Fei, C. Guan, Y. Zhu, and S. Deng, "Anomaly Detection for Time Series Data in Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 10, pp. 2797-2807, Oct. 2014, doi: 10.1109/TPDS.2013.125.
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys (CSUR), vol. 41, no. 3, pp. 1-58, Jul. 2009, doi: 10.1145/1541880.1541882.
N. Japkowicz, "Evaluation metrics for binary, class-imbalanced data," Machine Learning, vol. 62, no. 2, pp. 161-190, 2002.
T. Fawcett, "An introduction to ROC analysis," Pattern Recognition Letters, vol. 27, no. 8, pp. 861-874, 2006.
M. Lichman, "UCI Machine Learning Repository," University of California, Irvine, Irvine, CA, 2013.
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.