Journal of Machine and Computing


Adaptive Approach to Anomaly Detection in Internet of Things using Autoencoders and Dynamic Thresholds



Journal of Machine and Computing

Received On : 10 May 2023

Revised On : 20 August 2023

Accepted On : 24 September 2023

Published On : 05 January 2024

Volume 04, Issue 01

Pages : 001-010


Abstract


The Internet of Things (IoT) represents a vast network of interconnected devices, from simple sensors to intricate machines, which collect and share data across sectors like healthcare, agriculture, and home automation. This interconnectivity has brought convenience and efficiency but also introduced significant security concerns. Many IoT devices, built for specific functions, may lack robust security, making them vulnerable to cyberattacks, especially during device-to-device communications. Traditional security approaches often fall short in the vast and varied IoT landscape, underscoring the need for advanced Anomaly Detection (AD), which identifies unusual data patterns to warn against potential threats. Recently, a range of methods, from statistical to Deep Learning (DL), have been employed for AD. However, they face challenges in the unique IoT environment due to the massive volume of data, its evolving nature, and the limitations of some IoT devices. Addressing these challenges, the proposed research recommends using autoencoders with a dynamic threshold mechanism. This adaptive method continuously recalibrates, ensuring relevant and precise AD. Through extensive testing and comparisons, the study seeks to demonstrate the efficiency and adaptability of this approach in ensuring secure IoT communications.


Keywords


Internet of Things, Anomaly Detection, Cyber Attacks, Autoencoders, Security, Accuracy.


  1. S. Sengan, O. I. Khalaf, Vidya Sagar P., D. K. Sharma, Arokia Jesu Prabhu L., and A. A. Hamad, “Secured and Privacy-Based IDS for Healthcare Systems on E-Medical Data Using Machine Learning Approach,” International Journal of Reliable and Quality E-Healthcare, vol. 11, no. 3, pp. 1–11, Oct. 2021, doi: 10.4018/ijrqeh.289175.
  2. P. Sharma, N. R. Moparthi, S. Namasudra, V. Shanmuganathan, and C. Hsu, “Blockchain‐based IoT architecture to secure healthcare system using identity‐based encryption,” Expert Systems, vol. 39, no. 10, Dec. 2021, doi: 10.1111/exsy.12915.
  3. S. Rajasoundaran et al., “Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks,” Computer Communications, vol. 187, pp. 71–82, Apr. 2022, doi: 10.1016/j.comcom.2022.02.004.
  4. S. Gali and V. Nidumolu, “An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things,” Cluster Computing, vol. 25, no. 3, pp. 1779–1789, Nov. 2021, doi: 10.1007/s10586-021-03473-3.
  5. A. D. Jadhav and V. Pellakuri, “Highly accurate and efficient two phase-intrusion detection system (TP-IDS) using distributed processing of HADOOP and machine learning techniques,” Journal of Big Data, vol. 8, no. 1, Oct. 2021, doi: 10.1186/s40537-021-00521-y.
  6. “Optimal Ensemble Learning Based on Distinctive Feature Selection by Univariate ANOVA-F Statistics for IDS,” International Journal of Electronics and Telecommunications, Jul. 2023, doi: 10.24425/ijet.2021.135975.
  7. N. Satheesh et al., “Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network,” Microprocessors and Microsystems, vol. 79, p. 103285, Nov. 2020, doi: 10.1016/j.micpro.2020.103285.
  8. G. Rekha, S. Malik, A. K. Tyagi, and M. M. Nair, “Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security,” Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 3, pp. 72–81, 2020, doi: 10.25046/aj050310.
  9. A. Madhuri, V. E. Jyothi, S. P. Praveen, S. Sindhura, V. S. Srinivas, and D. L. S. Kumar, “A New Multi-Level Semi-Supervised Learning Approach for Network Intrusion Detection System Based on the ‘GOA,’” Journal of Interconnection Networks, Jan. 2022, doi: 10.1142/s0219265921430477.
  10. R. Ganeshan and P. Rodrigues, “Crow-AFL: Crow Based Adaptive Fractional Lion Optimization Approach for the Intrusion Detection,” Wireless Personal Communications, vol. 111, no. 4, pp. 2065–2089, Nov. 2019, doi: 10.1007/s11277-019-06972-0.
  11. D. B. Dasari, G. Edamadaka, Ch. S. Chowdary, and M. Sobhana, “Anomaly-based network intrusion detection with ensemble classifiers and meta-heuristic scale (ECMHS) in traffic flow streams,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 10, pp. 9241–9268, Nov. 2020, doi: 10.1007/s12652-020-02628-1.
  12. P. G. Om Prakash, B. Maram, G. Nalinipriya, and R. Cristin, “Harmony search Hawks optimization-based Deep reinforcement learning for intrusion detection in IoT using nonnegative matrix factorization,” International Journal of Wavelets, Multiresolution and Information Processing, vol. 19, no. 04, p. 2050093, Jan. 2021, doi: 10.1142/s0219691320500939.
  13. R. Srilakshmi and J. Muthukuru, “Intrusion detection in mobile ad-hoc network using Hybrid Reactive Search and Bat algorithm,” International Journal of Intelligent Unmanned Systems, vol. 10, no. 1, pp. 65–85, Feb. 2021, doi: 10.1108/ijius-09-2020-0049.
  14. M. M. V., B. RM, H. K Mewada, R. BR, and B. D, “Hybrid machine learning approach based intrusion detection in cloud: A metaheuristic assisted model,” Multiagent and Grid Systems, vol. 18, no. 1, pp. 21–43, May 2022, doi: 10.3233/mgs-220360.
  15. K. Singamaneni, K. N. Reddy, N. Yamsani, K. Sarada, and K. Saikumar, “Exploration of Convolutional Neural Network With Node - Centred Intrusion Detection Structure Plan for Green Cloud,” Journal of Green Engineering, vol. 10, no. 11, pp. 10781–10792, 2020.
  16. R. Gangula, M. M. V, and R. K. M, “Network intrusion detection system for Internet of Things based on enhanced flower pollination algorithm and ensemble classifier,” Concurrency and Computation: Practice and Experience, vol. 34, no. 21, Jul. 2022, doi: 10.1002/cpe.7103.
  17. M. K. Chandol and M. K. Rao, “Border Collie Cat Optimization for Intrusion Detection System in Healthcare IoT Network Using Deep Recurrent Neural Network,” The Computer Journal, vol. 65, no. 12, pp. 3181–3198, Nov. 2021, doi: 10.1093/comjnl/bxab136.
  18. B. Samatha, T. Syamsundararao, and N. Karyemsetty, “Deep Learning Based Intrusion Prevention System in Vehicular Network,” Review of Computer Engineering Research, vol. 9, no. 3, pp. 169–180, Sep. 2022, doi: 10.18488/76.v9i3.3145.
  19. N. Narisetty, G. R. Kancherla, B. Bobba, and K. Swathi, “Hybrid Intrusion Detection Method Based on Constraints Optimized SAE and Grid Search Based SVM-RBF on Cloud,” International Journal of Computer Networks and Applications, vol. 8, no. 6, p. 776, Dec. 2021, doi: 10.22247/ijcna/2021/210725.
  20. A. D. Jadhav and V. Pellakuri, “Efficient Intrusion Detection Systems Using Machine Learning Approach for Sustainable IT Development,” Journal of Green Engineering, vol. 10, no. 10, pp. 8298–8310, 2020.
  21. Y. P. Kumar and B. V. Babu, “Stabbing of Intrusion with Learning Framework Using Auto Encoder Based Intellectual Enhanced Linear Support Vector Machine for Feature Dimensionality Reduction,” Revue d’Intelligence Artificielle, vol. 36, no. 5, pp. 737–743, Dec. 2022, doi: 10.18280/ria.360511.
  22. P. Chellammal, S. K. Malarchelvi, K. Reka, and G. Raja, “Fast and Effective Intrusion Detection Using Multi-Layered Deep Learning Networks,” International Journal of Web Services Research, vol. 19, no. 1, pp. 1–16, Nov. 2022, doi: 10.4018/ijwsr.310057.
  23. K. Vamsi Krishna, K. Swathi, P. Rama Koteswara Rao, and B. Basaveswara Rao, ‘TSC: A Two-Stage Classifier for Network Intrusion Detection System on Green Cloud’, Journal of Green Engineering, vol. 11, no. 2, pp. 1500–1510, 2021.
  24. M. B. Tamboli and Dr. N. R. Moparthi, “Deep Learning Model for Intrusion Identification,” Journal of Advanced Research in Dynamical and Control Systems, vol. 12, no. 5, pp. 388–395, May 2020, doi: 10.5373/jardcs/v12i5/20201726.
  25. S. Kumar, A. Jain, S. Rani, H. Alshazly, S. Ahmed Idris, and S. Bourouis, “Deep Neural Network Based Vehicle Detection and Classification of Aerial Images,” Intelligent Automation & Soft Computing, vol. 34, no. 1, pp. 119–131, 2022, doi: 10.32604/iasc.2022.024812.

Acknowledgements


The authors would like to thank to the reviewers for nice comments on the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Nayer Tumi Figueroa E, Vishnu Priya A, Selvanayaki Kolandapalayam Shanmugam, Kiran Kumar V, Sudhakar Sengan and Alexandra Melgarejo Bolivar C, “Adaptive Approach to Anomaly Detection in Internet of Things Using Autoencoders and Dynamic Thresholds”, Journal of Machine and Computing, pp. 001-010, January 2024. doi: 10.53759/7669/jmc202404001.


Copyright


© 2024 Nayer Tumi Figueroa E, Vishnu Priya A, Selvanayaki Kolandapalayam Shanmugam, Kiran Kumar V, Sudhakar Sengan and Alexandra Melgarejo Bolivar C. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.