Anomaly Detection in IoT : State-of-the-Art Techniques and Implementation Insights

被引:0
作者
Ferhi, Wafaa [1 ]
Hadjila, Mourad [1 ]
Moussaoui, Djillali [1 ]
Bouidaine, Al Baraa [1 ]
机构
[1] UABT Univ, Fac Technol, Lab STIC, Tilimsen, Algeria
来源
PROGRAM OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATIC CONTROL, ICEEAC 2024 | 2024年
关键词
Anomaly detection; Iot; Security; Datasets; Mchine learning; Deep learning; Metrics evaluation; INTERNET;
D O I
10.1109/ICEEAC61226.2024.10576293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current work in the area of anomaly detection for the Internet of Things (IoT) is rapidly expanding. Therefore, this paper attempts to contribute to the field by shedding light on the intricacies of anomaly detection. We have explored and compared a variety of anomaly detection types and techniques, from traditional machine learning approaches to more sophis- ticated deep learning methods such as convolutional neural networks, graphical neural networks reinforcement learning and the combination of complex techniques. This research provides valuable insights into the diversity of approaches available to address the challenges of anomaly detection in the IoT domain. The comparative analysis of the results provides valuable findings on the strengths and weaknesses of different anomaly detection techniques. These insights can help researchers and practitioners select the most appropriate methods based on the specific requirements of their IoT applications.
引用
收藏
页数:7
相关论文
共 65 条
[11]   IoT anomaly detection methods and applications: A survey [J].
Chatterjee, Ayan ;
Ahmed, Bestoun S. .
INTERNET OF THINGS, 2022, 19
[12]  
Chauhan K., 2022, Soft Computing: Theories and Applications, P157
[13]  
Cloudera Fast Forward Labs, 2020, Deep Learning for Anomaly Detection
[14]  
Darban ZZ, 2024, Arxiv, DOI arXiv:2211.05244
[15]   Deep Learning for Network Anomalies Detection [J].
Dawoud, Ahmed ;
Shahristani, Seyed ;
Raun, Chun .
2018 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND DATA ENGINEERING (ICMLDE 2018), 2018, :149-153
[16]   Hybrid approach to intrusion detection in fog-based IoT environments [J].
de Souza, Cristiano Antonio ;
Westphall, Carlos Becker ;
Machado, Renato Bobsin ;
Mangueira Sobral, Joao Bosco ;
Vieira, Gustavo dos Santos .
COMPUTER NETWORKS, 2020, 180
[17]   Deep reinforcement learning for data-efficient weakly supervised business process anomaly detection [J].
Elaziz, Eman Abd ;
Fathalla, Radwa ;
Shaheen, Mohamed .
JOURNAL OF BIG DATA, 2023, 10 (01)
[18]  
Elmrabit N., 2020, 2020 INT C CYB SEC P, P1
[19]   Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning [J].
Ferrag, Mohamed Amine ;
Friha, Othmane ;
Hamouda, Djallel ;
Maglaras, Leandros ;
Janicke, Helge .
IEEE ACCESS, 2022, 10 :40281-40306
[20]   RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Ahmim, Ahmed ;
Derdour, Makhlouf ;
Janicke, Helge .
FUTURE INTERNET, 2020, 12 (03)