Skip to main content
Log in

Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Cyber-surveillance and connected devices can be misused to monitor, harass, isolate, and otherwise, harm individuals. In particular, these devices gather high volumes of personal data such as account details with shared passwords, person’s behavior and preferences, movements by GPS, and audio-video recordings which can be maneuvered. It is therefore imperative to define approaches that help mitigate the Internet of things (IoT)-based real-time abuse in a pro-active, reactive, or predictive manner. The key objective of this research is to outline and categorize such approaches. Further, to comprehend predictive analytics as a potential solution to mitigate technology abuse, we propose an anomaly detection methodology (MFEW_Bagging) to classify normal and abnormal use pattern categories in an Intrusion Detection System (IDS) for IoT system. A hybrid feature selection technique based on an ensemble of multiple filter–based techniques and a wrapper algorithm is firstly used as search method for finding an optimal feature subset. Further, ensemble learning technique, namely bagging, is used for final classification into normal and abnormal use pattern categories. The use of ensemble feature selection removes biasness of individual feature selection method during ensemble and identifies the optimal subset with non-redundant and relevant features. The proposed methodology is evaluated on publicly available real-time IDS dataset. The research persuades the need of designing robust and lightweight IDS for IoT-based smart environments which understand the cyber-security risks in a proactive predictive manner as it the best way to defend networks and systems with the growing IoT complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Blum RW, Nelson-Mmari K (2004) The health of young people in a global context. J Adolesc Health 35(5):402–418

    Article  PubMed  Google Scholar 

  2. Mercy, J. A., Hillis, S. D., Butchart, A., Bellis, M. A., Ward, C. L., Fang, X., & Rosenberg, M. L. (2017). Interpersonal violence: global impact and paths to prevention.

    Google Scholar 

  3. Pramod M, Bhaskar CVU, Shikha K (2018) IOT wearable device for the safety and security of women and girl child. Int J Mech Eng Technol 9(1):83–88

    Google Scholar 

  4. Ye L, Ferdinando H, Seppänen T, Alasaarela E (2014) Physical violence detection for preventing school bullying. Adv Artif Intell 2014(2014):1–9

  5. Vartak GG (2020) Smart security system for women and children using IoT. Adv Innov Res 131

  6. Kumar A, Garg G (2019) Sentiment analysis of multimodal twitter data. Multimed Tools Appl 78(17):24103–24119

    Article  Google Scholar 

  7. Kumar A, Sachdeva N (2021) Multimodal cyberbullying detection using capsule network with dynamic routing and deep convolutional neural network. Multimedia Systems. https://doi.org/10.1007/s00530-020-00747-5

  8. Kumar A, Sachdeva N (2020) Multi-input integrative learning using deep neural networks and transfer learning for cyberbullying detection in real-time code-mix data. Multimedia Systems:1–15

  9. Khan S, Gani A, Wahab AWA, Shiraz M, Ahmad I (2016) Network forensics: review, taxonomy, and open challenges. J Netw Comput Appl 66:214–235

    Article  Google Scholar 

  10. Visoottiviseth V, Akarasiriwong P, Chaiyasart S, & Chotivatunyu S (2017) PENTOS: penetration testing tool for Internet of thing devices. In TENCON 2017-2017 IEEE Region 10 Conference (pp. 2279-2284). IEEE.

  11. Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tut 21(3):2671–2701

    Article  Google Scholar 

  12. Buczak AL, Guven E (2015) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tut 18(2):1153–1176

    Article  Google Scholar 

  13. Sajith PJ, Nagarajan G (2021) Optimized Intrusion Detection System using computational intelligent algorithm, In: Advances in electronics, communication and computing (pp. 633-639). Springer, Singapore

    Book  Google Scholar 

  14. Gendreau AA, Moorman M (2016) Survey of intrusion detection systems towards an end to end secure Internet of things. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, Vienna, pp 84–90

    Chapter  Google Scholar 

  15. Sangwan SR, Bhatia MPS (2020) Denigration bullying resolution using wolf search optimized online reputation rumour detection. Procedia Comput Sci 173:305–314

    Article  Google Scholar 

  16. Jain DK, Kumar A, Sangwan SR, Nguyen GN, Tiwari P (2019) A particle swarm optimized learning model of fault classification in Web-Apps. IEEE Access 7:18480–18489

    Article  Google Scholar 

  17. Ebrahimpour MK, Eftekhari M (2017) Ensemble of feature selection methods: a hesitant fuzzy sets approach. Appl Soft Comput 50:300–312

    Article  Google Scholar 

  18. Kumar A, Jaiswal A (2019) Swarm intelligence based optimal feature selection for enhanced predictive sentiment accuracy on twitter. Multimed Tools Appl 78(20):29529–29553

    Article  Google Scholar 

  19. Kumar A, Jaiswal A (2020) A deep swarm-optimized model for leveraging industrial data analytics in cognitive manufacturing. IEEE Trans Ind Informat 17(4):2938–2946

    Article  Google Scholar 

  20. Yang Y, & Pedersen JO (1997). A comparative study on feature selection in text categorization. In Icml (Vol. 97, No. 412-420, p. 35).

  21. Omar N, Jusoh F, Ibrahim R, Othman MS (2013) Review of feature selection for solving classification problems. J Inf Syst Res Innov 3:64–70

    Google Scholar 

  22. Kononenko I (1994) Estimating attributes: analysis and extensions of RELIEF. In European conference on machine learning (pp. 171-182). Springer, Berlin, Heidelberg.

  23. Sangwan SR, Bhatia MPS (2020) D-BullyRumbler: a safety rumble strip to resolve online denigration bullying using a hybrid filter-wrapper approach. Multimedia Systems:1–17

  24. Dorigo M (1992) Optimization, learning and natural algorithms. PhD Thesis, Politecnico di Milano. Kononenko, I. (1994, April).

  25. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1-6). IEEE.

  26. Ahmim A, Derdour M, Ferrag MA (2018) An intrusion detection system based on combining probability predictions of a tree of classifiers. Int J Commun Syst 31(9):e3547

    Article  Google Scholar 

  27. Xiaofeng Z, & Xiaohong H (2017) Research on intrusion detection based on improved combination of K-means and multi-level SVM. In: 2017 IEEE 17th international conference on communication technology (ICCT) (pp. 2042-2045). IEEE.

  28. Omar S, Ngadi A, Jebur HH (2013) Machine learning techniques for anomaly detection: an overview. Int J Comput Appl 79(2):33–41

    Google Scholar 

  29. Chkirbene Z, Erbad A, Hamila R, Mohamed A, Guizani M, Hamdi M (2020) TIDCS: a dynamic intrusion detection and classification system based feature selection. IEEE Access 8:95864–95877

    Article  Google Scholar 

  30. Xiao Y, Xing C, Zhang T, Zhao Z (2019) An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7:42210–42219

    Article  Google Scholar 

  31. Kasongo SM, Sun Y (2019) A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access 7:38597–38607

    Article  Google Scholar 

  32. Osanaiye O, Cai H, Choo KKR, Dehghantanha A, Xu Z, Dlodlo M (2016) Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP J Wirel Commun Netw 2016(1):1–10

    Article  Google Scholar 

  33. Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247

    Article  Google Scholar 

  34. Breiman L (1996) Bagging predictors. Mach Learn 24(2):123–140

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saurabh Raj Sangwan.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhatia, M.P.S., Sangwan, S.R. Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse. Pers Ubiquit Comput 28, 123–133 (2024). https://doi.org/10.1007/s00779-021-01567-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-021-01567-8

Keywords

Navigation