scholarly journals Analysis of Machine Learning Techniques for Anomaly Detection in the Internet of Things

Author(s):  
Shane Brady ◽  
Damien Magoni ◽  
John Murphy ◽  
Haytham Assem ◽  
A. Omar Portillo-Dominguez
Agronomy ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 181 ◽  
Author(s):  
Giuliano Vitali ◽  
Matteo Francia ◽  
Matteo Golfarelli ◽  
Maurizio Canavari

In this study, we analyze how crop management will benefit from the Internet of Things (IoT) by providing an overview of its architecture and components from agronomic and technological perspectives. The present analysis highlights that IoT is a mature enabling technology with articulated hardware and software components. Cheap networked devices can sense crop fields at a finer grain to give timeliness warnings on the presence of stress conditions and diseases to a wider range of farmers. Cloud computing allows reliable storage, access to heterogeneous data, and machine-learning techniques for developing and deploying farm services. From this study, it emerges that the Internet of Things will draw attention to sensor quality and placement protocols, while machine learning should be oriented to produce understandable knowledge, which is also useful to enhance cropping system simulation systems.


Author(s):  
Saad Hikmat Haji ◽  
Siddeeq Y. Ameen

The Internet of Things (IoT) is one of today's most rapidly growing technologies. It is a technology that allows billions of smart devices or objects known as "Things" to collect different types of data about themselves and their surroundings using various sensors. They may then share it with the authorized parties for various purposes, including controlling and monitoring industrial services or increasing business services or functions. However, the Internet of Things currently faces more security threats than ever before. Machine Learning (ML) has observed a critical technological breakthrough, which has opened several new research avenues to solve current and future IoT challenges. However, Machine Learning is a powerful technology to identify threats and suspected activities in intelligent devices and networks. In this paper, various ML algorithms have been compared in terms of attack detection and anomaly detection, following a thorough literature review on Machine Learning methods and the significance of IoT security in the context of various types of potential attacks. Furthermore, possible ML-based IoT protection technologies have been introduced.


Author(s):  
Vusi Sithole ◽  
Linda Marshall

<span lang="EN-US">Patterns for the internet of things (IoT) which represent proven solutions used to solve design problems in the IoT are numerous. Similar to object-oriented design patterns, these IoT patterns contain multiple mutual heterogeneous relationships. However, these pattern relationships are hidden and virtually unidentified in most documents. In this paper, we use machine learning techniques to automatically mine knowledge graphs to map these relationships between several IoT patterns. The end result is a semantic knowledge graph database which outlines patterns as vertices and their relations as edges. We have identified four main relationships between the IoT patterns-a pattern is similar to another pattern if it addresses the same use case problem, a large-scale pattern uses a small- scale pattern in a lower level layer, a large pattern is composed of multiple smaller scale patterns underneath it, and patterns complement and combine with each other to resolve a given use case problem. Our results show some promising prospects towards the use of machine learning techniques to generate an automated repository to organise the IoT patterns, which are usually extracted at various levels of abstraction and granularity.</span>


2021 ◽  
Vol 22 (1) ◽  
pp. 13-28
Author(s):  
Mir Shahnawaz Ahmad ◽  
Shahid Mehraj Shah

The interconnection of large number of smart devices and sensors for critical information gathering and analysis over the internet has given rise to the Internet of Things (IoT) network. In recent times, IoT has emerged as a prime field for solving diverse real-life problems by providing a smart and affordable solutions. The IoT network has various constraints like: limited computational capacity of sensors, heterogeneity of devices, limited energy resource and bandwidth etc. These constraints restrict the use of high-end security mechanisms, thus making these type of networks more vulnerable to various security attacks including malicious insider attacks. Also, it is very difficult to detect such malicious insiders in the network due to their unpredictable behaviour and the ubiquitous nature of IoT network makes the task more difficult. To solve such problems machine learning techniques can be used as they have the ability to learn the behaviour of the system and predict the particular anomaly in the system. So, in this paper we have discussed various security requirements and challenges in the IoT network. We have also applied various supervised machine learning techniques on available IoT dataset to deduce which among them is best suited to detect the malicious insider attacks in the IoT network.


Electronics ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 880
Author(s):  
Imran ◽  
Zeba Ghaffar ◽  
Abdullah Alshahrani ◽  
Muhammad Fayaz ◽  
Ahmed Mohammed Alghamdi ◽  
...  

In recent years, rapid development has been made to the Internet of Things communication technologies, infrastructure, and physical resources management. These developments and research trends address challenges such as heterogeneous communication, quality of service requirements, unpredictable network conditions, and a massive influx of data. One major contribution to the research world is in the form of software-defined networking applications, which aim to deploy rule-based management to control and add intelligence to the network using high-level policies to have integral control of the network without knowing issues related to low-level configurations. Machine learning techniques coupled with software-defined networking can make the networking decision more intelligent and robust. The Internet of Things application has recently adopted virtualization of resources and network control with software-defined networking policies to make the traffic more controlled and maintainable. However, the requirements of software-defined networking and the Internet of Things must be aligned to make the adaptations possible. This paper aims to discuss the possible ways to make software-defined networking enabled Internet of Things application and discusses the challenges solved using the Internet of Things leveraging the software-defined network. We provide a topical survey of the application and impact of software-defined networking on the Internet of things networks. We also study the impact of machine learning techniques applied to software-defined networking and its application perspective. The study is carried out from the different perspectives of software-based Internet of Things networks, including wide-area networks, edge networks, and access networks. Machine learning techniques are presented from the perspective of network resources management, security, classification of traffic, quality of experience, and quality of service prediction. Finally, we discuss challenges and issues in adopting machine learning and software-defined networking for the Internet of Things applications.


Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 232 ◽  
Author(s):  
Yitong Ren ◽  
Zhaojun Gu ◽  
Zhi Wang ◽  
Zhihong Tian ◽  
Chunbo Liu ◽  
...  

With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one of the core components of Hadoop, which is used to process files that are divided into data blocks distributed in the cluster. Once the distributed log data are abnormal, it will cause serious losses. When using machine learning algorithms for system log anomaly detection, the output of threshold-based classification models are only normal or abnormal simple predictions. This paper used the statistical learning method of conformity measure to calculate the similarity between test data and past experience. Compared with detection methods based on static threshold, the statistical learning method of the conformity measure can dynamically adapt to the changing log data. By adjusting the maximum fault tolerance, a system administrator can better manage and monitor the system logs. In addition, the computational efficiency of the statistical learning method for conformity measurement was improved. This paper implemented an intranet anomaly detection model based on log analysis, and conducted trial detection on HDFS data sets quickly and efficiently.


2021 ◽  
Vol 3 (3) ◽  
pp. 128-145
Author(s):  
R. Valanarasu

Recently, IoT is referred as a descriptive term for the idea that everything in the world should be connected to the internet. Healthcare and social goods, industrial automation, and energy are just a few of the areas where the Internet of Things applications are widely used. Applications are becoming smarter and linked devices are enabling their exploitation in every element of the Internet of Things [IoT]. Machine Learning (ML) methods are used to improve an application's intelligence and capabilities by analysing the large amounts of data. ML and IoT have been used for smart transportation, which has gained the increasing research interest. This research covers a range of Internet of Things (IoT) applications that use suitable machine learning techniques to enhance efficiency and reliability in the intelligent automation sector. Furthermore, this research article examines and identifies various applications such as energy, high-quality sensors associated, and G-map associated appropriate applications for IoT. In addition to that, the proposed research work includes comparisons and tabulations of several different machine learning algorithms for IoT applications.


Author(s):  
Ritu Chauhan ◽  
Sandhya Avasthi ◽  
Bhavya Alankar ◽  
Harleen Kaur

The IoT or the internet of things started as a technology to connect everyday objects over the internet, which has evolved into something big and invaded into every single aspect of our lives. As technology is gaining momentum, IoT-based smart devices usage among users is expanding, which generates massive data at our disposal across various domains. The authors have systematically studied the taxonomy of data analytics and the benefits of using advanced machine learning techniques in converting data into valuable assets. In the studies, they have identified and did due diligence on different smart home systems, their features, and configuration. During this course of study, they have also identified the vulnerability of such a system and threats associated with these vulnerabilities in a secure smart home environment.


Sign in / Sign up

Export Citation Format

Share Document