Anomaly Detection System for Users and Devices Involved in Internet of Things Integrated Cloud Applications Using Machine Algorithms

被引:0
作者
Mirdula, S. [1 ]
Roopa, M. [1 ]
机构
[1] SRM Inst Sci & Technol, Fac Engn & Technol, Dept Elect & Commun Engn, Chennai, Tamil Nadu, India
关键词
data security; IoT; IoT-cloud; IoT-cloud security; IoT-security; user authentication;
D O I
10.1002/itl2.642
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, due to their application nature, devices in the Internet of Things (IoT) networks also need to be involved in the cloud. IoT devices generally work on top of the Internet, whereas today, the Internet is called a cloud because it provides an uncountable number of services to the public. Software, Platform, Infrastructure, and Service are the base classes of cloud services that support IoT devices. It is well known that the security level of the cloud is deficient because anyone can access it from anywhere at any strategy. Like the cloud, IoT networks also permit any device to join anytime from anywhere. This vulnerability of IoT networks is a cause for concern, and various conventional and optimisation methods have proposed multiple algorithms for increasing the IoT Cloud's security level, which have been developed for particular applications. This problem is solved by thoroughly examining the IoT devices, user information, and meta-information to detect anomalies in the cloud applications, ensuring the validity and effectiveness of our proposed solution. The IoT network is analyzed using an NS2 simulator, and machine learning algorithms carry out the data analytics to select the best one that outperforms the others in anomaly detection. The machine learning algorithms were implemented in Python and experimented with it to check their efficiency.
引用
收藏
页数:6
相关论文
共 10 条
[1]   Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse [J].
Bhatia M.P.S. ;
Sangwan S.R. .
Personal and Ubiquitous Computing, 2024, 28 (01) :123-133
[2]   A Data Mining Method Using Deep Learning for Anomaly Detection in Cloud Computing Environment [J].
Gao, Jin ;
Liu, Jiaquan ;
Guo, Sihua ;
Zhang, Qi ;
Wang, Xinyang .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
[3]   Anomaly Detection in a Smart Industrial Machinery Plant Using IoT and Machine Learning [J].
Jaramillo-Alcazar, Angel ;
Govea, Jaime ;
Villegas-Ch, William .
SENSORS, 2023, 23 (19)
[4]   An Empirical Study on Network Anomaly Detection using Convolutional Neural Networks [J].
Kwon, Donghwoon ;
Natarajan, Kathiravan ;
Suh, Sang C. ;
Kim, Hyunjoo ;
Kim, Jinoh .
2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, :1595-1598
[5]   FuseAD: Unsupervised Anomaly Detection in Streaming Sensors Data by Fusing Statistical and Deep Learning Models [J].
Munir, Mohsin ;
Siddiqui, Shoaib Ahmed ;
Chattha, Muhammad Ali ;
Dengel, Andreas ;
Ahmed, Sheraz .
SENSORS, 2019, 19 (11)
[6]   Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection-Current Research Trends [J].
Rafique, Saida Hafsa ;
Abdallah, Amira ;
Musa, Nura Shifa ;
Murugan, Thangavel .
SENSORS, 2024, 24 (06)
[7]   IoT Network Anomaly Detection in Smart Homes Using Machine Learning [J].
Sarwar, Nadeem ;
Bajwa, Imran Sarwar ;
Hussain, Muhammad Zunnurain ;
Ibrahim, Muhammad ;
Saleem, Khizra .
IEEE ACCESS, 2023, 11 :119462-119480
[8]  
Schueller Q., 2018, 2018 28 INT TELECOMM, P16
[9]   Deep learning approach for intrusion detection in IoT-multi cloud environment [J].
Selvapandian, D. ;
Santhosh, R. .
AUTOMATED SOFTWARE ENGINEERING, 2021, 28 (02)
[10]   Anomaly detection based on Artificial Intelligence of Things: A Systematic Literature Mapping [J].
Trilles, Sergio ;
Hammad, Sahibzada Saadoon ;
Iskandaryan, Ditsuhi .
INTERNET OF THINGS, 2024, 25