A Comprehensive Analysis of Machine Learning Models for Real Time Anomaly Detection in Internet of Things
S.L. Sanjith1 , E George Dharma Prakash Raj2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-11 , Page no. 932-937, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.932937
Online published on Nov 30, 2018
Copyright © S.L. Sanjith, E George Dharma Prakash Raj . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S.L. Sanjith, E George Dharma Prakash Raj, “A Comprehensive Analysis of Machine Learning Models for Real Time Anomaly Detection in Internet of Things,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.932-937, 2018.
MLA Style Citation: S.L. Sanjith, E George Dharma Prakash Raj "A Comprehensive Analysis of Machine Learning Models for Real Time Anomaly Detection in Internet of Things." International Journal of Computer Sciences and Engineering 6.11 (2018): 932-937.
APA Style Citation: S.L. Sanjith, E George Dharma Prakash Raj, (2018). A Comprehensive Analysis of Machine Learning Models for Real Time Anomaly Detection in Internet of Things. International Journal of Computer Sciences and Engineering, 6(11), 932-937.
BibTex Style Citation:
@article{Sanjith_2018,
author = {S.L. Sanjith, E George Dharma Prakash Raj},
title = {A Comprehensive Analysis of Machine Learning Models for Real Time Anomaly Detection in Internet of Things},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {932-937},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3270},
doi = {https://doi.org/10.26438/ijcse/v6i11.932937}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.932937}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3270
TI - A Comprehensive Analysis of Machine Learning Models for Real Time Anomaly Detection in Internet of Things
T2 - International Journal of Computer Sciences and Engineering
AU - S.L. Sanjith, E George Dharma Prakash Raj
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 932-937
IS - 11
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
523 | 452 downloads | 276 downloads |
Abstract
Anomaly detection is a major requirement of the current Internet of Things (IoT) and inter-networked communication environment. This work analyzes recent and prominent contributions in the domain of Anomaly detection. The analysis is performed especially in domains related to real time operations and IoT environment. The review is performed and results from most prominent models in literature are considered for analysis. This paper discusses the working mechanisms and the major issues in Anomaly detection such as data imbalance and noise especially in IoT domain and the methods used to handle these issues. Experiments were performed using the NSL-KDD benchmark data set. Precision, False Positive Rate and Accuracy are used to analyze the effectiveness of the models.
Key-Words / Index Term
Multi-Layered Clustering, Ensemble Models, Intrusion Detection, K-Means, SVM
References
[1] N. Mohamudally, M.Mahejabeen Peermamode, “Building an Anomaly Detection Engine (ADE) For IoT Smart Applications“. Procedia computer science, Vol. 134, pp.10-17, 2018
[2] S. Ahmad, L. Alexander, P. Scott, A. Zuha, “Unsupervised real-time anomaly detection for streaming data“, Neurocomputing, Vol. 262, pp.134-147, 2017
[3] Mahdavinejad, S. Mohammad, R. Mohammadreza, B. Mohammadamin, A. Peyman, B. Payam, P. Sheth, “Machine learning for Internet of Things data analysis: A survey“, Digital Communications and Networks, 2017.
[4] Hoque, Mohammad Sazzadul, Md Mukit, Md Bikas, and Abu Naser. "An implementation of intrusion detection system using genetic algorithm." arXiv preprint arXiv:1204.1336, 2012.
[5] Piyush Pareta, Manish Rai, Mohit Gangwar, "An Integrated approach for effective Intrusion Detection with Elasticsearch", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.13-17, 2018
[6] O.Y. Al-Jarrah, P.D. Yoo, S. Muhaidat, G.K. Karagiannidis, K. Taha, “Efficient machine learning for big data: a review“, Big Data Res. big Data, Analytics, and High-Performance Computing, Vol.2, Issue.3, pp.87–93 https://doi.org/10.1016/j.bdr.2015.04.001, 2015
[7] S. Abt, H. Baier, “A plea for utilising synthetic data when performing machine learning based cyber-security experiments“, in: Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, ACM, pp.37–45, 2014.
[8] Ramchandar Durgam and R.V.Krishnaiah, "Online Intrusion Alert Aggregation with Generative Data Stream Modeling", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.23-23, 2013
[9] S.M.H. Bamakan , H. Wang , T. Yingjie , Y. Shi , “An effective intrusion detec- tion framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization“, Neurocomputing, Vol.199, pp.90–102, 2016.
[10] S. Akila, and U.S. Reddy. “Data Imbalance: Effects and Solutions for Classification of Large and Highly Imbalanced Data“. Proceedings of ICRECT, Vol.16, pp.28-34, 2016.
[11] J. McHugh , “Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory“, ACM Trans. Inf. Syst. Secur. Vol.3, Issue. 4, pp.262–294, 2000 .
[12] P. Rutravigneshwaran, "A Study of Intrusion Detection System using Efficient Data Mining Techniques", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.5-8, 2017
[13] J.P. Brooks , “Support vector machines with the ramp loss and the hard margin loss“, Operat. Res. Vol.59, Issue.2, pp.467–479, 2011.
[14] A. Somasundaram, and U.S. Reddy. “Modelling a stable classifier for handling large scale data with noise and imbalance“. In Computational Intelligence in Data Science (ICCIDS), IEEE International Conference, pp. 1-6, 2017.
[15] Al-Jarrah, O.Y., Al-Hammdi, Y., Yoo, P.D., Muhaidat, S. and Al-Qutayri, M. “Semi-supervised Multi-Layered Clustering Model for Intrusion Detection“. Digital Communications and Networks. 2017
[16] S.M.H. Bamakan, H. Wang, and Y. Shi. “Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem“. Knowledge-Based Systems, Vol.126, pp.113-126, 2017.
[17] H. Wang, J. Gu, and S. Wang. “An effective intrusion detection framework based on SVM with feature augmentation“. Knowledge-Based Systems, Vol.136, pp.130-139, 2017.
[18] S. Roshan, Y. Miche, A. Akusok, and A. Lendasse. “Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines“. Journal of the Franklin Institute, Vol.355, Issue.4, pp.1752-1779, 2018.
[19] KDD Cup’99 intrusion detection data set, Available on: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, October 2007.
[20] M. Tavallaee, E. Bagheri, W. Lu, and A.A. Ghorbani,. “A detailed analysis of the KDD CUP 99 data set“. In Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium, pp. 1-6, July, 2009