Developing Anomaly Detection on IoT Devices Using Machine Learning (ML)
Abstract
Many experts have explored the risks posed by Internet of Things (IoT) devices to large corporationsand smart cities. Because of the rapid acceptance of IoT andthe nature of these devices, their inherent mobility, and the limits imposed by standardization, sophisticated systems capable of detecting suspicious movement on IoT devices connected to a network are necessary. As the number of Internet of Things devices connected to the Internet increased, so did the capacity of Internet traffic. As a result of this change, typical methods and traditional data processing approaches for detecting attacks are no longer valid and should be avoided.
Because of the increased volume of network data, detecting assaults in the Internet of Things (IoT) and identifying malicious activity in its early stages is a particularly tough problem to tackle. This article proposes and offers evidence for an approach for identifying malicious network traffic. For identifying malicious network traffic, the framework employs three commonly used classification-based approaches. The Support Vector Machine (SVM), Random Forest (RF), and logistic regression (LR) algorithms all execute with 100% accuracy. The dataset Botnet-IoT was employed in the model creation used in this study framework, and the results in terms of training, specificity, and accuracy were compared.
Keyword: IoT, LR, SVM, RF, Botnet-IoT
Full Text:
PDFReferences
Harb, H.; Mansour, A.; Nasser, A.; Cruz, E.M.; Diez, I.D.L.T. A Sensor-Based Data Analytics for Patient Monitoring in Connected Healthcare Applications. IEEE Sens. J. 2021, 21, 974984. [CrossRef]
Haider, I.; Khan, K.B.; Haider, M.A.; Saeed, A.; Nisar, K. Automated Robotic System for Assistance of Isolated Patients of Coronavirus (COVID-19). In Proceedings of the 2020 IEEE 23rd International Multitopic Conference (INMIC), Bahawalpur, Pakistan, 57 November 2020; pp. 16.
Sarkar, N.I.; Kuang, A.X.-M.; Nisar, K.; Amphawan, A.; Sarkar, N.I. Performance Studies of Integrated Network Scenarios in a Hospital Environment. Int. J. Inf. Commun. Technol. Hum. Dev. 2014, 6, 3568. [CrossRef]
Chowdhry, B.; Shah, A.A.; Harris, N.; Hussain, T.; Nisar, K. Development of a Smart Instrumentation for Analyzing Railway Track Health Monitoring Using Forced Vibration. In Proceedings of the 2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT), Tashkent, Uzbekistan, 79 October 2020; pp. 15.
Haque, M.R.; Tan, S.C.; Yusoff, Z.; Nisar, K.; Lee, C.K.; Chowdhry, B.; Ali, S.; Memona, S.K.; Kaspin, R. SDN Architecture for UAVs and EVs using Satellite: A Hypothetical Model and New Challenges for Future. In Proceedings of the 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 912 January 2021; pp. 16.
Ahmad, F.; Ahmad, Z.; Kerrache, C.A.; Kurugollu, F.; Adnane, A.; Barka, E. Blockchain in Internet-of-Things: Architecture, Applications and Research Directions. In Proceedings of the 2019 International Conference on Computer and Information Sciences (ICCIS), Aljouf, Saudi Arabia, 34 April 2019; pp. 16.
Mehmood, Y.; Ahmad, F.; Yaqoob, I.; Adnane, A.; Imran, M.; Guizani, S. Internet-of-Things-Based Smart Cities: Recent Advances and Challenges. IEEE Commun. Mag. 2017, 55, 1624. [CrossRef]
Ahmad, Z.; Khan, A.S.; Shiang, C.W.; Abdullah, J.; Ahmad, F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 2021, 32, 4150. [CrossRef]
Apruzzese, G.; Andreolini, M.; Marchetti, M.; Colacino, V.G.; Russo, G. AppCon: Mitigating Evasion Attacks to ML Cyber Detectors. Symmetry 2020, 12, 653. [CrossRef]
Xiaolong, H.; Huiqi, Z.; Lunchao, Z.; Nazir, S.; Jun, D.; Shahid Khan, A. Soft Computing and Decision Support System for Software Process Improvement: A Systematic Literature Review. Sci. Program. 2021, 2021, 7295627.
Maikol, S.O.; Khan, A.S.; Javed, Y.; Bunsu, A.L.; Petrus, C.; George, H.; Jau, S. A novel authentication and key agreement scheme for countering MITM and impersonation attack in medical facilities. Int. J. Integr. Eng. 2020, 13, 127135.
Haque, M.R.; Tan, S.C.; Yusoff, Z.; Lee, C.K.; Kaspin, R. DDoS Attack Monitoring using Smart Controller Placement in Software Defined Networking Architecture. In Lecture Notes in Electrical Engineering; Springer Science and Business Media LLC: Singapore, 2018; Volume 481, pp. 195203.
Nisar, K.; Jimson, E.R.; Hijazi, M.H.A.; Memon, S.K. A survey: Architecture, security threats and application of SDN. J. Ind. Electron. Technol. Appl. 2019, 2, 6469.
Bovenzi, G.; Aceto, G.; Ciuonzo, D.; Persico, V.; Pescape, A. A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios. In Proceedings of the GLOBECOM 20202020 IEEE Global Communications Conference, Taipei, Taiwan, 711 December 2020; pp. 17.
Khan, A.S.; Javed, Y.; Abdullah, J.; Zen, K. Trust-based lightweight security protocol for device-to-device multihop cellular communication (TLwS). J. Ambient. Intell. Humaniz. Comput. 2021, 12, 118. [CrossRef]
Harada, S.; Yan, Z.; Park, Y.-J.; Nisar, K.; Ibrahim, A.A.A. Data aggregation in named data networking. In Proceedings of the TENCON 20172017 IEEE Region 10 Conference, Penang, Malaysia, 58 November 2017; pp. 18391842.
Nisar, K.; Amphawan, A.; Hassan, S.; Sarkar, N.I. A comprehensive survey on scheduler for VoIP over WLAN. J. Netw. Comput. Appl. 2013, 36, 933948. [CrossRef]
Chaudhary, S.; Amphawan, A.; Nisar, K. Realization of free space optics with OFDM under atmospheric turbulence. Optik 2014,125, 51965198. [CrossRef]
Abbasi, I.A.; Khan, A.S.; Ali, S. Dynamic Multiple Junction Selection Based Routing protocol for VANETs in city environment. Appl. Sci. 2018, 8, 687. [CrossRef]
Li, J.; Qu, Y.; Chao, F.; Shum, H.P.H.; Ho, E.S.L.; Yang, L. Machine Learning Algorithms for Network Intrusion Detection. In Intelligent Systems Reference Library; Springer: Berlin/Heidelberg, Germany, 2018; pp. 151179. [CrossRef]
Prasad, R.; Rohokale, V. Artificial Intelligence and Machine Learning in Cyber Security. In Industrial Internet of Things; Springer Science and Business Media LLC: Berlin/Heidelberg, Germany, 2019; pp. 231247.
Chan, K.Y.; Abdullah, J.; Khan, A.S. A framework for traceable and transparent supply chain management for the agri-food sector in Malaysia using blockchain technology. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 149156. [CrossRef]
Zhipeng Liu, Niraj Thapa, Addison Shaver, Kaushik Roy, Xiaohong Yuan & Sajad Khorsandroo (2020). Anomaly Detection on IoT Network Intrusion Using Machine Learning. [CrossRef]
Zhiyuan Chen and Bing Liu. 2018. Lifelong machine learning. Synthesis Lectures on Artificial Intelligence and Machine Learning 12,3 (2018), 1207.
Zhiyuan Chen, Nianzu Ma, and Bing Liu. 2018. Lifelong learning for sentiment classification. arXivpreprint arXiv:1801.02808 (2018).
MohammadNoor Injadat, Abdallah Moubayed & Abdallah Shami (2019). Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach. [CrossRef]
Satish Pokhrel, Robert Abbas, Bhulok Aryal (2021). IoT Security: Botnet detection in IoT using machine learning. [CrossRef]
Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019, 100, 779796. [CrossRef]
Abebe Diro, Naveen Chilamkurti, Van-Doan Nguyen, and Will Heyne (2021). A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms. [CrossRef]
Khan, A.S.; Ahmad, Z.; Abdullah, J.; Ahmad, F. A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network. IEEE Access 2021, 9, 8707987093. [CrossRef]
Maryam Anwer, Muhammad Umer Farooq, Shariq Mahmood Khan & Waseemullah (2021). Attack Detection in IoT using Machine Learning. [CrossRef]
Panigrahi, R. and Borah, S. (2018). A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems. International Journal of Engineering & Technology, [online] 7(3.24), pp.479482. [CrossRef]
Maci-Fernndez, G., Camacho, J., Magn-Carrin, R., Garca-Teodoro, P. and Thern, R. (2018). UGR16: A new dataset for the evaluation of cyclostationarity-based network IDSs. Computers & Security, 73, pp.411424. [CrossRef]
Ullah, I.; Mahmoud, Q.H. A Technique for Generating a Botnet Dataset for Anomalous Activity Detection in IoT Networks. In Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics SMC, Toronto, ON, Canada, 1114 October 2020; pp. 134140. [CrossRef]
Saleem, M.A.; Alyas, T.; Asfandayar; Ahmad, R.; Farooq, A.; Ali, K.; Idrees, M.; Khan, A.S. Systematic literature review of identifying issues in software cost estimation techniques. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 341346. [CrossRef]
Kirill Eremenko (2022), Deep Learning A-Z: Hands-On Artificial Neural Networks. [CrossRef]
Li, J., Cheng, K., Wang, S., Morstatter, F., Trevino, R.P., Tang, J. and Liu, H. (2018). Feature Selection. ACM Computing Surveys, 50(6), pp.145. [CrossRef]
Venkatesh, B. and Anuradha, J. (2019). A Review of Feature Selection and Its Methods. Cybernetics and Information Technologies, [online] 19(1), pp.326. [CrossRef]
Neda Abdelhamid, Fadi Thabtah, Hussein Abdel-jaber (2017). Phishing detection: A recent intelligent machine learning comparison based on model content and features. [CrossRef]
Kurtis Pykes (2020). Oversampling and Undersampling A technique for Imbalanced Classification. [CrossRef]
Lazy Programmer (2022). Tensorflow 2.0: Deep Learning and Artificial Intelligence. [CrossRef]
Bisong, E. Google Colaboratory. In Building Machine Learning and Deep Learning Models on Google Cloud Platform; Apress: Berkeley, CA, USA, 2019; pp. 5964.
Aniruddha Bhandari. 2020. AUC-ROC Curve in Machine Learning Clearly Explained. [CrossRef]
Brereton, R.G. and Lloyd, G.R. (2010). Support Vector Machines for classification and regression. The Analyst, 135(2), pp.230267. [CrossRef]
Vanajakshi, L. and Rilett, L.R. (2004). A comparison of the performance of artificial. neural networks and support vector machines for the prediction of traffic speed. IEEE Intelligent Vehicles Symposium, 2004. [CrossRef]
Zhou, J., Gandomi, A.H., Chen, F. and Holzinger, A. (2021). Evaluating the Quality of Machine Learning Explanations: A Survey on Methods and Metrics. Electronics, [online] 10(5), p.593. [CrossRef]
Jindal, M., Gupta, J., and Bhushan, B. (2019). Machine learning methods for IoT and their Future Applications. [online] IEEE Xplore. [CrossRef]
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Journal of Electrical Engineering, Electronics, Control and Computer Science

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.