Book Details

ANOMALY DETECTION IN IOT NETWORKS USING SEMISUPERVISED ML TECHNIQUES

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

The rapid proliferation of Internet of Things (IoT) networks has led to unprecedented growth in connected devices, enabling smarter environments but also exposing networks to a myriad of security threats. Anomaly detection is a critical aspect of securing IoT networks, as traditional security measures often fail to adapt to the dynamic and heterogeneous nature of these systems. This paper investigates the application of semi-supervised machine learning (ML) techniques for detecting anomalies in IoT networks. Semi-supervised approaches leverage both labeled and unlabeled data, addressing the challenge of limited labeled datasets, which is common in IoT scenarios. We explore various semi-supervised algorithms, including Autoencoders, one-class SVMs, and graph-based models, to detect deviations from normal network behavior. The proposed methodology involves feature extraction from IoT traffic data, preprocessing for noise reduction, and the application of semi-supervised models trained on mixed data. Performance evaluation metrics, such as precision, recall, F1-score, and area under the receiver operating characteristic (ROC) curve, are employed to assess the effectiveness of the models. The results demonstrate that semi-supervised techniques can achieve high detection rates while minimizing false positives, even in the presence of diverse IoT protocols and device behaviors. The study further discusses the scalability of these models to handle large-scale IoT networks and their adaptability to evolving attack patterns. Our findings highlight the potential of semi-supervised ML as a robust solution for proactive anomaly detection in IoT environments, paving the way for more secure and resilient IoT deployments.

References

[1] Buczak, Anna L., and Erhan Guven. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, vol. 18, no. 2, 2016, pp. 1153–1176, doi:10.1109/COMST.2015.2494502.

[2] Singh, S., Verma, A., and Sharma, P. Machine Learning for Cyber Security: A Comprehensive Guide to Building Intelligent Cyber Defense Systems. Springer, 2021.

[3] Das, Kaushik, and Naik, Nagesh. Artificial Intelligence for Cybersecurity: Techniques, Challenges, and Applications. CRC Press, 2022.

[4] Moustafa, Nour, et al. "Anomaly Detection in IoT Cybersecurity Using Machine Learning Algorithms." IEEE Internet of Things Journal, vol. 6, no. 5, 2019, pp. 7650–7659, doi:10.1109/JIOT.2019.2926361.

[5] Hady, Mohamed F., et al. "A Semi-Supervised Approach for Anomaly Detection in IoT Networks." Journal of Network and Computer Applications, vol. 156, 2020, p. 102531, doi:10.1016/j.jnca.2020.102531.

[6] Kumar, R., et al. "Deep Learning-Based Anomaly Detection for IoT Networks: A Survey." IEEE Access, vol. 8, 2020, pp. 132820–132841, doi:10.1109/ACCESS.2020.3012250.

[7] Sultana, Shamim, et al. "Advances in Anomaly Detection in IoT: Machine Learning-Based Approaches." ACM
Computing Surveys, vol. 54, no. 7, 2021, pp. 1-35, doi: 10.1145/3469850.

[8] Ravi, S., et al. "Real-Time AI-Based Threat Detection for IoT Networks." Proceedings of the IEEE International Conference on Cybersecurity and Resilience (ICCR), 2022.

[9] Almseidin, Mohammad, et al. "Evaluation of Machine Learning Algorithms for Intrusion Detection in IoT Networks." Proceedings of the 2018 IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2018, doi:10.1109/CyberSecPODS.2018.85606

[10] AI-Powered Cybersecurity: How Machine Learning is Revolutionizing IoT Anomaly Detection. Gartner Research, 2023.

[11] Rajkumar, V., and V. Maniraj. "HYBRID TRAFFIC ALLOCATION USING APPLICATION-AWARE ALLOCATION OF RESOURCES IN CELLULAR NETWORKS." Shodhsamhita (ISSN: 2277-7067) 12.8 (2021).

[12] Ambika, G., and P. Srivaramangai. "REVIEW ON SECURITY IN THE INTERNET OF THINGS." International Journal of Advanced Research in Computer Science 9.1 (2018).

[13] Rosy, C. Premila, and R. Ponnusamy. "Evaluating and forecasting room demand in tourist spot using Holt-Winters method." International Journal of Computer Applications 975 (2017): 8887.

[14] D.Ragupathi, N.Jayaveeran, “The Design & Implementation of Transportation Procedure using Migration Techiques,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.273-278, 2017.

[15] Rajkumar, V., and V. Maniraj. "RL-ROUTING: A DEEP REINFORCEMENT LEARNING SDN ROUTING ALGORITHM." JOURNAL OF EDUCATION: RABINDRABHARATI UNIVERSITY (ISSN: 0972-7175) 24.12 (2021).

[16] Ambika, G., and P. Srivaramangai. "A study on data security in Internet of Things." Int. J. Comput. Trends Technol. 5.2 (2017): 464-469.

[17] C.Senthil Selvi, Dr. N. Vetrivelan, “Medical Search Engine Based On Enhanced Best First Search International Journal Of Research And Analytical Reviews (IJRAR.ORG) 2019, Volume 6, Issue 2, Page No: 248-250.

[18] Rajkumar, V., and V. Maniraj. "Software-Defined Networking's Study with Impact on Network Security." Design Engineering (ISSN: 0011-9342) 8 (2021).

[19] Ambika, G., and D. P. Srivaramangai. "A study on security in the Internet of Things." Int. J. Sci. Res. Comput. Sci. Eng. Inform. Technol 5.2 (2017): 12-21.

[20] K.U. Malar, D. Ragupathi, G.M. Prabhu, “The Hadoop Dispersed File system: Balancing Movability and Performance”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.166-177, 2014.

[21] D. Ragupathi , S.Sivaranjani, “Performance Enhanced Live Migration of Virtual Machines in the Cloud,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.94-99, 2015.

[22] Rosy, C. P. R. O. M., and R. Ponnusamy. "A Study on Hotel Reservation Trends of Mobile App Via Smartphone." IOSR Journal of Computer Engineering (IOSR-JCE) 19.4 (2017): 01-08.

[23] Rajkumar, V., and V. Maniraj. "HCCLBA: Hop-By-Hop Consumption Conscious Load Balancing Architecture Using Programmable Data Planes." Webology (ISSN: 1735-188X) 18.2 (2021).

[24] Ambika, G., and P. Srivaramangai. "Encrypted Query Data Processing in Internet Of Things (IoTs): CryptDB and Trusted DB." (2018).

[25] Rajkumar, V., and V. Maniraj. "Dependency Aware Caching (Dac) For Software Defined Networks." Webology (ISSN: 1735-188X) 18.5 (2021).

[26] C.Senthil Selvi, Dr. N. Vetrivelan, “ An Efficient Information Retrieval In Mesh (Medical Subject Headings) Using Fuzzy”, Journal of Theoretical and Applied Information Technology 2019. ISSN: 1992-8645, Vol.97. No 9, Page No: 2561-2571.

[27] Rosy, C. Premila, and R. Ponnusamy. "Intelligent System to Support Judgmental Business Forecasting: The Case of Unconstraint Hotel RoomDemand in Hotel Advisory System." International Journal of Science and Research (IJSR) 4.1 (2015).

[28] C.Senthil Selvi, Dr. N. Vetrivelan, “Medical Search Engine Based On Enhanced Best First Search International Journal Of Research And Analytical Reviews (IJRAR.ORG) 2019, Volume 6, Issue 2, Page No: 248-250.

[29] D. Ragupathi and N. Jayaveeran, "Significant role of migration in virtual environment," 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), Pudukkottai, India, 2016, pp. 1-6, doi: 10.1109/ICETETS.2016.7603122.

[30] M. Dhivya, D. Ragupathi, V.R. Kumar, “Hadoop Mapreduce Outline in Big Figures Analytics,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.100-104, 2014.

Keywords

Semi-Supervised Learning, Anomaly Detection, IoT Security, Real-Time Monitoring, Scalability.

Image
  • Format Volume 13, Issue 1, No 02, 2025
  • Copyright All Rights Reserved ©2025
  • Year of Publication 2025
  • Author Dr.M.Florence Dayana, K.Asika
  • Reference IJCS-539
  • Page No 006-015

Copyright 2025 SK Research Group of Companies. All Rights Reserved.