Open Access Open Access  Restricted Access Subscription Access

ANAMOLY DETECTION IN IOT NETWORKS USING MACHINE LEARNING

HARSHA N S, Manoj N M, Kotresh G B

Abstract


The rapid growth of the Internet of Things (IoT) has transformed industries, enabling seamless automation, smart homes, and interconnected industrial systems. However, this surge in connected devices has amplified security risks due to diverse communication protocols and limited computational resources in IoT devices. Traditional security measures often fall short in identifying complex and evolving threats. This research delves into the application of machine learning (ML) techniques for anomaly detection in IoT networks, aiming to spot irregular patterns that may indicate potential security breaches or malicious activities. By leveraging models such as decision trees, support vector machines, and neural networks, this study explores their efficacy in real-time and resource-constrained environments. The project also addresses challenges related to data quality, model optimization, and scalability. The anticipated results will contribute to more robust IoT security frameworks, providing an adaptive and intelligent approach to threat detection and prevention. Furthermore, this research highlights the importance of feature engineering and data preprocessing tailored for IoT environments, as the quality and variability of data play a crucial role in model performance. Comparative analyses will be conducted to evaluate the strengths and limitations of various ML algorithms, such as deep learning models like LSTM (Long Short-Term Memory) networks, which are well-suited for handling sequential and time- series data prevalent in IoT traffic. The study also incorporates evaluation metrics like detection accuracy, false positive rates, and computational efficiency to ensure the solutions are practical for deployment on edge devices with limited processing power.


Full Text:

PDF

References


Smith, J., & Lee, K. (2021). *Supervised Learning Approaches for Anomaly Detection in IoT Networks*. Journal of Network 6. Deepak, N.R., Balaji, S. (2016). Uplink Channel Performance and Implementation of Software for Image Communication in 4G Network. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives and Application in Intelligent Systems. CSOC 2016. Advances in Intelligent Systems and Computing, vol 465. Springer, Cham. https://doi.org/10.1007/978-3-319-33622- 0_10 in IoT Networks*. Journal of Network Security, 34(2), 123-134.

Chen, R., Xu, P., & Zhao, Q. (2022). *Long Short-Term Memory Networks for Time-Series Anomaly Detection in IoT Systems*. IEEE Transactions on Cybernetics,

(1), 145-157.

Zhang, Y., Wang, T., & Liu, H. (2020). *Feature Engineering Techniques for Improving Machine Learning in IoT Security*. Journal of Computer Science, 29(3), 456-472.

Patel, S., & Sharma, V. (2023). *Lightweight Machine Learning Algorithms for Real-Time IoT Anomaly Detection on Edge Devices*. Journal of Embedded Systems, 18(4), 301-314.

Nguyen, T., Tran, D., & Vo, L. (2021). *Federated Learning for Distributed Anomaly Detection in IoT Networks*. Journal of Distributed Systems and Applications, 45(7), 789-804.

Simran Pal R and Deepak N R, “Evaluation on Mitigating Cyber Attacks and Securing Sensitive Information with the Adaptive Secure Metaverse Guard (ASMG) Algorithm Using Decentralized Security”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 656–667, Sep. 2024.

B, Omprakash & Metan, Jyoti & Konar, Anisha & Patil, Kavitha & KK, Chiranthan. (2024). Unravelling Malware Using Co- Existence Of Features. 1-6. 10.1109/ICAIT61638.2024.10690795.

Rezni S and Deepak N R, “Challenges and Innovations in Routing for Flying Ad Hoc Networks: A Survey of Current Protocols”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 64–74, Sep. 2024.

N. R. Deepak and S. Balaji, "Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network," 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015, pp. 1-5, doi: 10.1109/ICCIC.2015.7435774.

Patil, Kavitha S et al. “Hybrid and Adaptive Cryptographic-based secure authentication approach in Io T based applications using hybrid encryption.” Pervasive Mob. Comput. 82 (2022): 101552.


Refbacks

  • There are currently no refbacks.