Abstract
The emergence of various smart services delivered by heterogeneous Internet of Things (IoT) devices has made daily human-life easy and comfortable. IoT devices have brought enormous convenience to various applications, no matter the IoT systems include homogeneous devices like in most sensor networks or heterogeneous devices like in smart homes or smart business applications. However, several known communication infrastructures of IoT systems are at risk to various security attacks and threats. The practice of discovering uncommon occurrences of conventional behaviors is known as anomaly detection. It is an essential tool for detecting fraud as well as network intrusion. In this work, we provide an anomaly-based model on the Extended Isolation Forest method. In our work, the available dataset ’UNSW_2018_IoT_Botnet_Final_10_best_Testing’ has been used for the experiment. Performance indicators, including accuracy, precision, recall, and F1-Score, are used to validate the performance of our suggested system. We get an Accuracy Score of 93% and F1-Score of 96% through the experiment. In addition, the most important top 12 features have a more substantial impact on correct prediction for anomaly identification and have also been identified in this study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alaidaros, H., Mahmuddin, M., Al Mazari, A.: An overview of flow-based and packet-based intrusion detection performance in high speed networks. In: Proceedings of the International Arab Conference on Information Technology, pp. 1–9 (2011)
Aljuhani, A.: Machine learning approaches for combating distributed denial of service attacks in modern networking environments. IEEE Access 9, 42236–42264 (2021)
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1–58 (2009)
Das, S., Venugopal, D., Shiva, S.: A holistic approach for detecting DDoS attacks by using ensemble unsupervised machine learning. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FICC 2020. AISC, vol. 1130, pp. 721–738. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-39442-4_53
Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for internet of things. Future Gen. Comput. Syst. 82, 761–768 (2018)
Doshi, R., Apthorpe, N., Feamster, N.: Machine learning DDoS detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 29–35. IEEE (2018)
Hariri, S., Kind, M.C., Brunner, R.J.: Extended isolation forest. IEEE Trans. Knowl. Data Eng. 33(4), 1479–1489 (2019)
Hussain, F., Hussain, R., Hassan, S.A., Hossain, E.: Machine learning in IoT security: current solutions and future challenges. IEEE Commun. Surv. Tutorials 22(3), 1686–1721 (2020)
Jyoti, N., Behal, S.: A meta-evaluation of machine learning techniques for detection of DDoS attacks. In: 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), pp. 522–526. IEEE (2021)
Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gen. Comput. Syst. 100, 779–796 (2019)
Lu, J., et al.: Integrating traffics with network device logs for anomaly detection. Secur. Commun. Netw. (2019)
Nakahara, M., Okui, N., Kobayashi, Y., Miyake, Y.: Machine learning based malware traffic detection on IoT devices using summarized packet data. In: IoTBDS, pp. 78–87 (2020)
Nakahara, M., Okui, N., Kobayashi, Y., Miyake, Y.: Malware detection for IoT devices using automatically generated white list and isolation forest. In: IoTBDS, pp. 38–47 (2021)
Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., Choo, K.K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in iot backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314–323 (2016)
Panja, S., Chattopadhyay, A.K., Nag, A.: A review of risks and threats on IoT layers. In: Balas, V.E., Hassanien, A.E., Chakrabarti, S., Mandal, L. (eds.) Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing. LNDECT, vol. 62, pp. 735–747. Springer, Singapore (2021). https://doi.org/10.1007/978-981-33-4968-1_57
Sattar, M.A., Anwaruddin, M., Ali, M.A.: A review on Internet of Things-protocols issues. Int. J. Innov. Res. Electr. Electr. Instrum. Control Eng. 5(2), 9–17 (2017)
Seifousadati, A., Ghasemshirazi, S., Fathian, M.: A machine learning approach for DDOS detection on IoT devices. arXiv preprint arXiv:2110.14911 (2021)
Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors 19(9), 1977 (2019)
Timčenko, V., Gajin, S.: Machine learning based network anomaly detection for IoT environments. In: ICIST-2018 Conference (2018)
Tyagi, H., Kumar, R.: Attack and anomaly detection in IoT networks using supervised machine learning approaches. Rev. d’Intelligence Artif. 35(1), 11–21 (2021)
Vishwakarma, R., Jain, A.K.: A honeypot with machine learning based detection framework for defending IoT based botnet DDOS attacks. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1019–1024. IEEE (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Panja, S., Patowary, N., Saha, S., Nag, A. (2022). Anomaly Detection in IoT Using Extended Isolation Forest. In: Sk, A.A., Turki, T., Ghosh, T.K., Joardar, S., Barman, S. (eds) Artificial Intelligence. ISAI 2022. Communications in Computer and Information Science, vol 1695. Springer, Cham. https://doi.org/10.1007/978-3-031-22485-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-22485-0_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-22484-3
Online ISBN: 978-3-031-22485-0
eBook Packages: Computer ScienceComputer Science (R0)