Anomaly Detection in IoT Networks—Classifications and Analysis Techniques

  • Conference paper
  • First Online:
Artificial Intelligence, Data Science and Applications (ICAISE 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 838))

  • 316 Accesses

Abstract

The Internet of Things is a technology that we’ve been talking about for numerous years. It defines itself as a global network consisting of interconnected services and various intelligent objects. Also, it aims to support human activities of daily life, through its sensing, computing, and communication capabilities. This network may have many risks of cyber security, so anything connected to the Internet can be exposed to cyber-attacks. Experience has shown that encryption and authentication alone aren’t enough to secure an IoT network, and detection systems are needed to detect and avoid attacks from dangerous nodes. Furthermore, designing and develo** new systems based on machine learning (ML) and deep learning (DL) that can detect anomalies and attacks in IoT Networks is important. In this context, the problem of outlier detection is one of the most important problems that require more research and customized solutions. The challenge is to identify anomalies and classify them as errors that should be ignored, or as critical events that require action to prevent further service degradation. This paper aims to analyze and assess the effectiveness of anomaly detection models rooted in machine learning for IoT networks. A couple of machine learning models were compared, and their classification was also discussed for this purpose.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Thailand)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 149.79
Price includes VAT (Thailand)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 179.99
Price excludes VAT (Thailand)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sahu, N.K., Mukherjee, I.: Machine learning based anomaly detection for IoT network: (Anomaly detection in IoT network). In: 4th International Conference on Trends in Electronics and Informatics (ICOEI) (48184), pp. 787–794. IEEE (2020)

    Google Scholar 

  2. Han, S., Wu, Q., Yang, Y.: Machine learning for Internet of Things anomaly detection under low-quality data. Int. J. Distrib. Sens. Netw. 18(10), 15501329221133764 (2022)

    Article  Google Scholar 

  3. Munir, M., Siddiqui, S.A., Dengel, A., Ahmed, S.: DeepAnT: a deep learning approach for unsupervised anomaly detection in time series. IEEE Access 7, 1991–2005 (2018)

    Article  Google Scholar 

  4. Yasaei, R., Hernandez, F., Faruque, M.A.A.: IoT-CAD: context-aware adaptive anomaly detection in IoT systems through sensor association. In: Proceedings of the 39th International Conference on Computer-Aided Design, pp. 1–9 (2020)

    Google Scholar 

  5. Shahraki, A., Taherkordi, A., Haugen, Ø.: TONTA: Trend-based online network traffic analysis in ad-hoc IoT networks. Comput. Netw. 194, 108125 (2021)

    Article  Google Scholar 

  6. Shen, M., Tang, X., Zhu, L., Du, X., Guizani, M.: Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet of Things J. 6(5), 7702–7712 (2019)

    Google Scholar 

  7. Sen, P.C., Hajra, M., Ghosh, M.: Supervised classification algorithms in machine learning: a survey and review. In: Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph, pp. 99–111. Springer Singapore (2020)

    Google Scholar 

  8. **ao, L., Li, Y., Han, G., Liu, G., Zhuang, W.: PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans. Veh. Technol. 65(12), 10037–10047 (2016)

    Article  Google Scholar 

  9. Alghanmi, N., Alotaibi, R., Buhari, S.M.: Machine learning approaches for anomaly detection in IoT: an overview and future research directions. Wirel. Pers. Commun. 122(3), 2309–2324 (2022)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamza Rhachi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rhachi, H., Bouayad, A., Balboul, Y., Aitmessaad, B. (2024). Anomaly Detection in IoT Networks—Classifications and Analysis Techniques. In: Farhaoui, Y., Hussain, A., Saba, T., Taherdoost, H., Verma, A. (eds) Artificial Intelligence, Data Science and Applications. ICAISE 2023. Lecture Notes in Networks and Systems, vol 838. Springer, Cham. https://doi.org/10.1007/978-3-031-48573-2_67

Download citation

Publish with us

Policies and ethics

Navigation