Skip to main content

Abstract

Internet of Things (IoT) has demonstrated tremendous advantages in various industry and research fields. The IoT device number rapidly increased, followed by more serious safety hazard. These anomalies can influence the performance of system or even worse destroy the function of entire system. Anomaly detection methods are investigated to identify unusual states or malicious behaviors. This paper proposes a deep learning-based anomaly detection model to detect and classify anomalies in IoT. The proposed model is based on Residual Networks and Bi-directional GRU, which can fully utilize the spatial and temporal features of network traffic data. Moreover, attention mechanism is utilized to extract key features to improve the classification performance of the model. Experimental results show that the proposed model has better detection and classification performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Madakam, S., Lake, V., Lake, V., et al.: Internet of Things (IoT): a literature review. J. Comput. Commun. 3(05), 164 (2015)

    Article  Google Scholar 

  2. Kumar, S., Tiwari, P., Zymbler, M.: Internet of Things is a revolutionary approach for future technology enhancement: a review. J. Big Data 6(1), 1–21 (2019)

    Article  Google Scholar 

  3. The IoT in 2030: Which applications account for the biggest chunk of the $1.5 trillion opportunity? https://tinyurl.com/e267uwza. Accessed 21 Feb 2023

  4. Cauteruccio, F., Cinelli, L., Corradini, E., et al.: A framework for anomaly detection and classification in multiple IoT scenarios. Futur. Gener. Comput. Syst. 114, 322–335 (2021)

    Article  Google Scholar 

  5. Al‐Turjman, F., Zahmatkesh, H., Shahroze, R.: An overview of security and privacy in smart cities’ IoT communications. Trans. Emerg. Telecommun. Technol. 33(3), e3677 (2022)

    Google Scholar 

  6. Da Xu, L., Lu, Y., Li, L.: Embedding blockchain technology into IoT for security: a survey. IEEE Internet Things J. 8(13), 10452–10473 (2021)

    Article  Google Scholar 

  7. Ahmad, R., Alsmadi, I., Alhamdani, W., et al.: A comprehensive deep learning benchmark for IoT IDS. Comput. Secur. 114, 102588 (2022)

    Article  Google Scholar 

  8. Hawkins, D.: Identification of Outliers. Wiley, London (1994)

    Google Scholar 

  9. Fahim, M., Sillitti, A.: Anomaly detection, analysis and prediction techniques in IoT environment: a systematic literature review. IEEE Access 7, 81664–81681 (2019)

    Article  Google Scholar 

  10. Riyaz, A.A.H., Fariza, N., Abdullah, G., et al.: Real-time big data processing for anomaly detection: a Survey. Int. J. Inf. Manag. 45, 289–307 (2019)

    Article  Google Scholar 

  11. Qadri, Y.A., Nauman, A., Zikria, Y.B., et al.: The future of healthcare Internet of Things: a survey of emerging technologies. IEEE Commun. Surv. Tutor. 22(2), 1121–1167 (2020)

    Article  Google Scholar 

  12. Cook, A.A., Misirli, G., Fan, Z.: Anomaly detection for IoT time-series data: a survey. IEEE Internet Things J. 7(7), 6481–6494 (2020)

    Article  Google Scholar 

  13. Hasan, M., Islam, M.M., Zarif, M.I.I., et al.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 7, 100059 (2019)

    Article  Google Scholar 

  14. Thakkar, A., Lohiya, R.: A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges. Arch. Comput. Methods Eng. 28, 3211–3243 (2021)

    Article  Google Scholar 

  15. Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of Things (IoT): taxonomy of security attacks. In: 3rd International Conference on Electronic Design (ICED), pp. 321–326. IEEE (2016)

    Google Scholar 

  16. Saba, T., Rehman, A., Sadad, T., et al.: Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 99, 107810 (2022)

    Article  Google Scholar 

  17. Hussain, F., Abbas, S.G., Husnain, M., et al.: IoT DoS and DDoS attack detection using ResNet. In: 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1–6. IEEE (2020)

    Google Scholar 

  18. University of New Brunswick. CSE-CIC-IDS2018 on AWS. https://www.unb.ca/cic/datasets/ids-2018.html

  19. University of New Brunswick. CIC IoT Dataset (2023). https://www.unb.ca/cic/datasets/iotdataset-2023.html

Download references

Acknowledgement

The work is supported by NSFC project 61601264 and Shandong Province Statistical Research Project KT23079.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuo Bo Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dai, L.E., Wang, X., Xu, S.B. (2024). A Deep Learning Based Anomaly Detection Model for IoT Networks. In: Dong, J., Zhang, L., Cheng, D. (eds) Proceedings of the 2nd International Conference on Internet of Things, Communication and Intelligent Technology. IoTCIT 2023. Lecture Notes in Electrical Engineering, vol 1197. Springer, Singapore. https://doi.org/10.1007/978-981-97-2757-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-2757-5_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-2756-8

  • Online ISBN: 978-981-97-2757-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics