BibTex RIS Cite

Anomaly Detection in IoT Network by using Multi-class Adaptive Boosting Classifier

Year 2020, Volume: 9 Issue: 3, 164 - 171, 01.09.2020

Abstract

Detection of anomaly and attack identification is some of the major concern in IoT domain in recent days. With the exponential use of IoT based infrastructure in every domain, threats and anomalies are amplifying adequately. Attacks such as malicious operations, spying, service denial etc. are the main cause for failure in IoT system. So, developing an efficient model to identify and decipher such complex problem is always been a challenging task. Rather some of the machine learning based models is developed to solve such problem, but due to highly nonlinear nature of the data, such methods seem to be failed to prove the efficacy. With the combination of several models, ensemble learning helps to enhance the performance of machine learning methods. As compared to any single method, the ensemble learning based models are highly predictable for large dimensional data. In this paper, an adaptive boosting based model has been proposed to identify the anomaly in IoT based environment. The performance of the proposed method is compared with several other competitive machine learning based methods and found to be superior with all the considered metrics.

References

  • [1] M. Hasan, M.M. Islam, M.I.I. Zarif and M.M.A. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches”, Internet of Things, Vol.7, pp.1-14, 2019.
  • [2] O. Salman, I. Elhajj, A. Chehab and A. Kayssi., “IoT survey: An SDN and fog computing perspective”, Computer Networks, Vol.143, pp.221-246, 2018.
  • [3] W.H. Hassan, “Current research on Internet of Things (IoT)IoT devices using machine learning techniques”, arXiv preprint arXiv:1709.04647, pp.1-13, 2017. security: A survey”, Computer Networks, Vol.148, pp.283-294, 2019.
  • [4] L. Xiao, X. Wan, X. Lu, Y. Zhang and D. Wu, “IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?”, IEEE Signal Processing Magazine, Vol.35, No.5, pp.41-49, 2018.
  • [5] L. Deng, D. Li, X. Yao, D. Cox and H. Wang, “Mobile network intrusion detection for IoT system based on transfer learning algorithm”, Cluster Computing, Vol.22, No.4, pp.9889-9904, 2019.
  • [6] A.A. Diro and N. Chilamkurti, “Distributed attack detection scheme using deep learning approach for Internet of Things”, Future Generation Computer Systems, Vol.82, pp.761-768, 2018.
  • [7] Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N.O. Tippenhauer, J.D. Guarnizo, and Y. Elovici, “Detection of unauthorized
  • [8] B.A. Tama and K. H. Rhee, “Attack classification analysis of IoT network via deep learning approach”, Research Briefs on Information & Communication Technology Evolution (ReBICTE), Vol.3, pp.1-9, 2017.
  • [9] H.H. Pajouh, R. Javidan, R. Khayami, D. Ali and K.K.R. Choo, “A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks”, IEEE Transactions on Emerging Topics in Computing, Vol.7, No.2, pp.314-323, 2019.
  • [10] E. Hodo, X. Bellekens, A. Hamilton, P.L. Dubouilh, E. Iorkyase, C. Tachtatzis and R. Atkinson, “Threat analysis of IoT networks using artificial neural network intrusion detection system” 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia, pp.1-6, May 11-13, 2016.
  • [11] K. Veeramachaneni, I. Arnaldo, V. Korrapati, C. Bassias and K. Li, “ AI2: training a big data machine to defend” 2016 IEEE ˆ 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA, pp. 49-54,9-10 April 2016.
  • [12] G. D’angelo, F. Palmieri, M. Ficco and S. Rampone, “An uncertainty-managing batch relevance-based approach to network anomaly detection”, Applied Soft Computing, Vol. 36, pp.408- 418, 2015.
  • [13] H. S. Ham, H. H. Kim, M. S. Kim and M. J. Choi, “Linear SVM-based android malware detection for reliable IoT services”, Journal of Applied Mathematics, Vol.2014, pp. 1-11, 2014.
  • [14] DS2OS traffic traces, IoT traffic traces gathered in a the DS2OS IoT environment, kaggle, 2018
  • [15] T. Hastie, S. Rosset, J. Zhu and H. Zou, “Multi-class adaboost”, Statistics and its Interface, Vol.2, No.3, pp. 349-360, 2009.
There are 15 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Pandit Byomakesha Dash This is me

K. Srinivasa Rao This is me

Publication Date September 1, 2020
Published in Issue Year 2020 Volume: 9 Issue: 3

Cite

IEEE P. B. Dash and K. S. Rao, “Anomaly Detection in IoT Network by using Multi-class Adaptive Boosting Classifier”, IJISS, vol. 9, no. 3, pp. 164–171, 2020.