Leveraging Artificial Intelligence for Enhanced Threat Detection, Response, and Anomaly Identification in Resource-Constrained IoT Networks
Keywords:
Internet of Things (IoT), Artificial Intelligence (AI), Threat DetectionAbstract
The billion-device Internet of Things enables worldwide data collection, transmission, and analysis. Networked ecosystem weakens security. Hackable IoT devices have little memory and computational power. This evolving threat landscape defeats traditional security measures. AI's threat, response, and anomaly detection secure IoT networks.
AI's IoT ecosystem security is examined. AI-powered threat detection is investigated. Machine learning may detect sensor or network traffic issues. We employ supervised learning to categorize hazards and assist the system distinguish safe and harmful activities. We investigate how unsupervised learning algorithms may identify network patterns and security problems.
Beyond risk detection, AI-driven reactions are studied. AI-based incident response systems assess security events, trigger pre-defined countermeasures, and clean up in real time. AI-based self-healing improves network security. Protecting IoT networks involves anomaly detection. We explore AI network activity anomaly detection. Machine learning and statistical anomaly detection are evaluated in resource-limited settings.
References
1. Xiao, L., Wan, X., Lu, X., Zhang, Y., & Wu, D. (2018). IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?. IEEE Signal Processing Magazine, 35(5), 41-49.
2. Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250-1258.
3. Rutledge, R. L., Massey, A. K., & Antón, A. I. (2016, September). Privacy impacts of IoT devices: A SmartTV case study. In 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW) (pp. 261-270). IEEE.
4. Sha, K., Errabelly, R., Wei, W., Yang, T. A., & Wang, Z. (2017, May). Edgesec: Design of an edge layer security service to enhance IoT security. In 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC) (pp. 81-88). IEEE.
5. Tripathy, B. K., & Anuradha, J. (Eds.). (2017). Internet of things (IoT): technologies, applications, challenges and solutions. CRC Press.
6. Meidan, Y., Shabtai, A., Rokach, L., & Hindy, H. (2たて18). A survey on machine learning for cyber security. ACM Computing Surveys (CSUR), 51(5), 1-38.
7. Moustafa, N., Slay, J., & Tafazolli, R. (2019). Anomaly detection for system health monitoring in IoT networks. IEEE Transactions on Sustainable Computing, 1-11.
8. Yu, S., Liu, Y., & Yang, L. (2018). A lightweight anomaly detection approach for edge networks in the internet of things. IEEE Internet of Things Journal, 5(6), 4898-4907.
9. Zhang, Y., Li, K., & Ji, Y. (2017, December). A survey on deep learning for big data. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 701-708). IEEE.
10. Nogueira, R., Araujo, R., Pellegrini, R., & Freitas, A. A. (2018, September). Towards unsupervised anomaly detection in streaming data. In 2018 International Joint Conference on Neural Networks (IJCNN) (pp. 1-8). IEEE.
11. Vapnik, V. N. (2013). The nature of statistical learning theory. Springer Science & Business Media.
12. James, G., Witten, D., Hastie, T., & Tibshirani, R. (2013). An introduction to statistical learning with applications in R. Springer.
13. Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58.
14. Zissman, A., & Forsyth, D. A. (2011). Computer vision: Algorithms and applications. Springer Science & Business Media.
15. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., ... & Bengio, Y. (2016). Deep learning. MIT press.
16. Hinton, G. E., Osindero, S., & Teh, Y. W. (2006). A fast learning algorithm for deep belief nets. Neural computation, 18(7), 1527-1554.
17. Recht, B., Rezende, D. J., Khanna, A., Poole, B., & Le QV (2018). Tensorflow tutorials. [Online]. tensorflow.org
18. McMahan, H. B., Rao, E., Balcan, M., Hinderman, R., Li, J., Moreno, M., ... & Talwar, M. (2017, April).
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.