Machine Learning Approaches for Anomaly Detection in IoT Networks

被引:0
作者
Kumar, Gotte Ranjith [1 ]
Kulkarni, Anagha Deepak [2 ]
Kumar, B. Santhosh [3 ]
Singh, Navdeep [4 ]
Revathi, V [5 ]
Kumar, T. Ch. Anil [6 ]
机构
[1] SR Univ, Sch CS & AI, Warangal 506371, Telangana, India
[2] Dr DY Patil Vidyapeeth Deemed Be Univ, Dr DY Patil Sch Sci & Technol, Pune, Maharashtra, India
[3] Inst Aeronaut Engn, Hyderabad, India
[4] Lovely Profess Univ, Phagwara, India
[5] New Horizon Coll Engn, Dept Appl Sci, Bangalore, Karnataka, India
[6] Fdn Sci Technol & Res, Dept Mech Engn, Vignan&39S, Vadlamudi 522213, Andhra Pradesh, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Machine learning; Anomaly detection; IoT networks; Security; Supervised learning; Unsupervised learning; Semi-supervised learning;
D O I
10.1109/ACCAI61061.2024.10601954
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exploration paper explores the application of machine literacy ways for anomaly discovery within Internet of Effects (IoT) networks. With the rapid expansion of IoT bias, icing network security becomes decreasingly grueling. Traditional security measures frequently fall suddenly in detecting arising pitfalls and anomalies in the vast and dynamic IoT terrain. thus, this study investigates the efficacity of colorful machine learning algorithms in relating abnormal geste reflective of implicit security breaches or system malfunctions. Through a comprehensive review of the literature and empirical analysis, the paper examines the strengths and limitations of different machine learning approaches, including supervised, unsupervised, and semi-supervised styles, in detecting anomalies within IoT networks. The findings give perceptivity into the feasibility and effectiveness of employing machine literacy for enhancing the security and trustability of IoT ecosystems.
引用
收藏
页数:5
相关论文
共 12 条
[1]   Human gene and disease associations for clinical-genomics and precision medicine research [J].
Ahmed, Zeeshan ;
Zeeshan, Saman ;
Mendhe, Dinesh ;
Dong, XinQi .
CLINICAL AND TRANSLATIONAL MEDICINE, 2020, 10 (01) :297-318
[2]  
[Anonymous], 2023, Intelligent Technologies for Sensors
[3]  
Cheng Y., 2020, IEEE Access, V8
[4]   Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment [J].
Jeniffer, J. Thresa ;
Chandrasekar, A. .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) :703-723
[5]   An intensive healthcare monitoring paradigm by using IoT based machine learning strategies [J].
Kondaka, Lakshmi Sudha ;
Thenmozhi, M. ;
Vijayakumar, K. ;
Kohli, Rashi .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (26) :36891-36905
[6]  
Li S., 2018, IEEE Internet of Things Journal, V5, P3887
[7]  
Liu H., 2021, IEEE Transactions on Network Science and Engineering, V8, P157
[8]  
Nuthakki R., 2021, P 4 INT C COMM CYB P, P7, DOI [10.1007/978-981-16-7985-82, DOI 10.1007/978-981-16-7985-82]
[9]   IoT-based patient monitoring system for predicting heart disease using deep learning [J].
Ramkumar, Govindaraj ;
Seetha, J. ;
Priyadarshini, R. ;
Gopila, M. ;
Saranya, G. .
MEASUREMENT, 2023, 218
[10]  
Rosaline S., 2022, CSNT, DOI [10.1109/csnt54456.2022.9787571, DOI 10.1109/CSNT54456.2022.9787571]