Skip to main content

Anomaly Detection in Cellular IoT with Machine Learning

  • Conference paper
  • First Online:
Smart Objects and Technologies for Social Good (GOODTECHS 2021)


The number of Internet of Things (IoT) devices used in eldercare are increasing day by day and bringing big security challenges especially for health care organizations, IoT service providers and most seriously for the elderly users. Attackers launch many attacks using compromised IoT devices such as Distributed Denial of Services (DDoS), among others. To detect and prevent these types of attacks on IoT devices connected to the cellular network, it is essential to have a proper overview of the existing threats and vulnerabilities. The main objective of this work is to present and compare different machine learning algorithms for anomaly detection in the cellular IoT scenario. Five supervised machine learning algorithms, namely KNN, Naïve Bayes, Decision Tree and Logistic Regression are used and evaluated by their performance. We see that, for both normal (using a local test dataset) and attack traffic (CICDDoS2019 (CICDDoS2019 Dataset: datasets, the accuracy and precision of the models are in average above 90%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions


  1. 1.


  2. 2.

    Secure 5G4IoT Lab:

  3. 3.

    CICDDoS2019 Dataset:

  4. 4.


  5. 5.



  1. Patel, K.K., Patel, S.M., et al.: Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5), 6122–6131 (2016)

    Google Scholar 

  2. Chen, S., et al.: A vision of IoT: applications, challenges, and opportunities with china perspective. IEEE Internet Things J. 1(4), 349–359 (2014)

    Article  Google Scholar 

  3. Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horizons 58(4), 431–440 (2015)

    Article  Google Scholar 

  4. Rawat, P., Singh, K.D., Bonnin, J.M.: Cognitive radio for M2M and Internet of Things: a survey. Comput. Commun. 94, 1–29 (2016)

    Article  Google Scholar 

  5. Ericsson: IoT connections outlook.

  6. Jejdling, F. (Ericsson): Ericsson Mobility Report.

  7. Stackpole, B.: Symantec Security Summary, June 2020. COVID-19 attacks continue and new threats on the rise.

  8. Khoi, N.M., et al.: IReHMo: an efficient IoT-based remote health monitoring system for smart regions. In: 2015 17th International Conference on E-health Networking, Application and Services (Health-Com), pp. 563–568. IEEE (2015)

    Google Scholar 

  9. Gope, P., Hwang, T.: BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 16(5), 1368–1376 (2015)

    Article  Google Scholar 

  10. Heer, T., et al.: Security challenges in the IP-based Internet of Things. Wirel. Pers. Commun. 61, 527–542 (2011)

    Article  Google Scholar 

  11. Van der Elzen, I., van Heugten, J.: Techniques for detecting compromised IoT devices. University of Amsterdam (2017)

    Google Scholar 

  12. Saqlain, J.: IoT and 5G: history evolution and its architecture their compatibility and future (2018)

    Google Scholar 

  13. Zhou, W., et al.: The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J. 6(2), 1606–1616 (2018)

    Article  Google Scholar 

  14. Copos, B., et al.: Is anybody home? Inferring activity from smart home network traffic. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 245–251. IEEE (2016)

    Google Scholar 

  15. Noorman, J., et al.: Sancus: low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In: 22nd fUSENIXg Security Symposium (fUSENIXg Security 2013), pp. 479–498 (2013)

    Google Scholar 

  16. Xiao, L., et al.: IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018)

    Article  Google Scholar 

  17. He, Z., Zhang, T., Lee, R.B.: Machine learning based DDoS attack detection from source side in cloud. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 114–120. IEEE (2017)

    Google Scholar 

  18. Bakker, J.: Intelligent traffic classification for detecting DDoS attacks using SDN/OpenFlow (2017)

    Google Scholar 

  19. Bediako, P.K.: Long short-term memory recurrent neural network for detecting DDoS flooding attacks within TensorFlow implementation framework (2017)

    Google Scholar 

  20. Adeniyi, D.A., Wei, Z., Yongquan, Y.: Automated web usage data mining and recommendation system using K-Nearest Neighbor (KNN) classification method. Appl. Comput. Inform. 12(1), 90–108 (2016)

    Article  Google Scholar 

  21. Tian, F., et al.: Research on flight phase division based on decision tree classifier. In: 2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA), pp. 372–375. IEEE (2017)

    Google Scholar 

  22. Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)

    MATH  Google Scholar 

  23. Patil, T.R., Sherekar, S.S.: Performance analysis of Naive Bayes and J48 classification algorithm for data classification. J. Comput. Sci. Appl. 6(2), 256–261 (2013)

    Google Scholar 

  24. Wikipedia: Logistic regression.

  25. Oo, T.T., Phyu, T.: Analysis of DDoS detection system based on anomaly detection system. In: International Conference on Advances in Engineering and Technology (ICAET 2014), Singapore (2014)

    Google Scholar 

  26. Doshi, R., Apthorpe, N., Feamster, N.: Machine learning DDoS detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 29–35. IEEE (2018)

    Google Scholar 

  27. Cross-industry standard process for data mining.

Download references


This paper is a result of the H2020 Concordia project ( which has received funding from the EU H2020 programme under grant agreement No 830927. The CONCORDIA consortium includes 23 partners from industry and other organizations such as Telenor, Telefonica, Telecom Italia, Ericsson, Siemens, Airbus, etc. and 23 partners from academia such as CODE, university of Twente, OsloMet, etc.

Author information

Authors and Affiliations


Corresponding author

Correspondence to Bernardo Santos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Santos, B. et al. (2021). Anomaly Detection in Cellular IoT with Machine Learning. In: Pires, I.M., Spinsante, S., Zdravevski, E., Lameski, P. (eds) Smart Objects and Technologies for Social Good. GOODTECHS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 401. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91420-2

  • Online ISBN: 978-3-030-91421-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics