Research Article

Optimal method to monitor network for IoT devices based on anomaly detection

Volume: 4 Number: 1 June 30, 2024
EN

Optimal method to monitor network for IoT devices based on anomaly detection

Abstract

Many challenges have been identified to monitor, manage, process, and store the big data that accumulates from different sources in the IoT concept. The focus of this paper is very significant and limited to solving the problem of monitoring classified big data. Detection of anomalies in a grouping of classified data made it easy to monitor and help to make decisions for action to operate. There is no need to store, process, or manage the redundant data further that is already within the range of the group. So, the main concern is abnormal values in the groups that need to be processed further and require focus. The method proposed in this paper serves as an optimal solution designed to address the visualization challenges associated with dense and high-volume datasets. Our approach involves a strategic process of categorizing data into groups and pinpointing anomalies within these groups. This systematic classification not only enhances data organization but also plays a pivotal role in simplifying the visualization of intricate data patterns. Additionally, this method brings about significant cost efficiencies by strategically optimizing the expenses incurred in processing operations and the allocation of storage space for the equipment.

Keywords

Supporting Institution

TTG International - Türkiye

Thanks

TTG International is very active in the field of big data monitoring and analysis, especially for centralized network solutions. It provides OSS products and solutions to IT and Telecom clients all around the world. We are thankful to TTG International for supporting and encouraging us in research and development work.

References

  1. [1] Sinaeepourfard, A., Hierarchical distributed fog-to-cloud data management in smart cities (Doctoral dissertation, Universitat Politècnica de Catalunya (UPC)). 2017; DOI: 10.5821/dissertation-2117-114435.
  2. [2] Sarkar, S., Chatterjee, S., & Misra, S., Assessment of the suitability of fog computing in the context of internet of things. IEEE Transactions on Cloud Computing. 2015; 6(1); 46-59. DOI: 10.1109/TCC.2015.2485206.
  3. [3] Bonomi, F., Milito, R., Zhu, J., Addepalli, S., Fog computing and its role in the Internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing. 2012; 13-16. DOI: 10.1145/2342509.2342513.
  4. [4] Khan, R., Khan, SU., Zaheer, R., Khan, S., Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges. 10th International Conference on Frontiers of Information Technology. 2012; 257-260. DOI: 10.1109/FIT.2012.53.
  5. [5] Yi, S., Hao, Z., Qin, Z., & Li, Q., Fog computing: Platform and applications, Third IEEE Workshop on Hot Topics In Web Systems And Technologies (HotWeb). 2015; 73-78. DOI: 10.1109/HotWeb.2015.22.
  6. [6] Munir, A., Kansakar, P., & Khan, S, U., IFCIoT: Integrated Fog Cloud IoT: A novel architectural paradigm for the future Internet of Things. IEEE Consumer Electronics Magazine. 2017; 6(3); 74-82. DOI: 10.1109/MCE.2017.2684981.
  7. [7] Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U., The rise of “big data” on cloud computing: Review and open research issues. Information systems. 2015; 98-115. DOI: 10.1016/j.is.2014.07.006
  8. [8] Pandey, K. K., Challenges of big data to big data mining with their processing framework, 8th International Conference on Communication Systems and Network Technologies, 2018; 89-94. DOI: 10.1109/CSNT.2018.8820282.

Details

Primary Language

English

Subjects

Artificial Intelligence

Journal Section

Research Article

Early Pub Date

February 8, 2024

Publication Date

June 30, 2024

Submission Date

March 6, 2023

Acceptance Date

February 5, 2024

Published in Issue

Year 2024 Volume: 4 Number: 1

Vancouver
1.Umar Ali, Cenk Calis. Optimal method to monitor network for IoT devices based on anomaly detection. Computers and Informatics. 2024 Jun. 1;4(1):41-50. doi:10.62189/ci.1260288

Computers and Informatics is licensed under CC BY-NC 4.0