Anomaly Identification in IoT-Networks Using Artificial Intelligence-Based Data-Driven Techniques in Cloud Environmen

Authors

  • Dinesh Rajendran Coimbatore Institute of Technology, MSC. Software Engineering. Author
  • Venkata Deepak Namburi University of Central Missouri, Department of Computer Science. Author
  • Aniruddha Arjun Singh Singh ADP, Sr. Implementation Project Manager. Author
  • Vetrivelan Tamilmani Principal Consultant (SAP), Infosys Ltd. Author
  • Vaibhav Maniar Oklahoma City University, MBA / Product Management. Author
  • Rami Reddy Kothamaram California University of management and science, MS in Computer Information systems. Author

DOI:

https://doi.org/10.63282/3050-9246.IJETCSIT-V2I2P110

Keywords:

Cybersecurity, Cloud, IOT, Anomaly Intrusion Detection, Machine Learning, Deep learning

Abstract

In the dynamic and ever-evolving realm of computer networks, cloud computing has emerged as a major player. Cloud networks provide on-demand access to pooled resources, but anomalies can compromise their security and integrity. Recognizing anomalies in network traffic is crucial for data security in modern networked systems including the Internet of Things (IoT). This research introduces a novel anomaly detection technique that utilizes the CICIDS-2017 dataset, the Random Forest (RF) classifier, and machine learning (ML). Using the Synthetic Minority Over-Sampling Technique (SMOTE), class balancing is accomplished.  Some of the data pre-processing procedures included in the suggested methodology are one-hot encoding, feature selection, handling missing data, and z-score normalization. Two datasets are created from the processed data: one for training and another for testing. Using the Random Forest model, both normal and harmful traffic patterns can be identified. The experimental findings demonstrate that the model achieves a high level of resilience and reliability in detecting anomalies. It obtains an AUC of 1.00, an F1-score of 99.65%, a recall of 99.31%, a precision of 99.99%, and an accuracy of 99.65%. The proposed system offers adequate management of imbalanced and high-dimensional network data, making it applicable in real-world IoT settings. It provides scalability, flexibility, and high detection rates

Downloads

Download data is not yet available.

References

[1] Gopi, “Zero Trust Security Architectures for Large-Scale Cloud Workloads,” Int. J. Res. Anal. Rev., vol. 5, no. 2, pp. 960–965, 2018.

[2] S. S. S. Neeli, “Serverless Databases: A Cost-Effective and Scalable Solution,” Int. J. Innov. Res. Eng. Multidiscip. Phys. Sci., vol. 7, no. 6, p. 7, 2019.

[3] H. Chen, M. Hu, H. Yan, and P. Yu, “Research on industrial internet of things security architecture and protection strategy,” in Proceedings - 2019 International Conference on Virtual Reality and Intelligent Systems, ICVRIS 2019, 2019. doi: 10.1109/ICVRIS.2019.00095.

[4] Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, “Rule Generation for Signature Based Detection Systems of Cyber Attacks in IoT Environments,” Bull. Networking, Comput. Syst. Softw., vol. 8, 2019.

[5] S. S. S. Neeli, “The Significance of NoSQL Databases : Strategic Business Approaches and Management Techniques,” J. Adv. Dev. Res., vol. 10, no. 1, p. 11, 2019.

[6] M. Antonini, M. Vecchio, F. Antonelli, P. Ducange, and C. Perera, “Smart Audio Sensors in the Internet of Things Edge for Anomaly Detection,” IEEE Access, vol. 6, pp. 67594–67610, 2018, doi: 10.1109/ACCESS.2018.2877523.

[7] A. R. Wani, Q. P. Rana, U. Saxena, and N. Pandey, “Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques,” in Proceedings - 2019 Amity International Conference on Artificial Intelligence, AICAI 2019, 2019. doi: 10.1109/AICAI.2019.8701238.

[8] S. Garg, K. Kaur, N. Kumar, G. Kaddoum, A. Y. Zomaya, and R. Ranjan, “A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks,” IEEE Trans. Netw. Serv. Manag., vol. 16, no. 3, pp. 924–935, 2019, doi: 10.1109/TNSM.2019.2927886.

[9] I. Kotenko, I. Saenko, and S. Ageev, “Applying intelligent agents for anomaly detection of network traffic in internet of things networks,” in Proceedings - 2018 IEEE International Conference on Internet of Things and Intelligence System, IOTAIS 2018, 2018. doi: 10.1109/IOTAIS.2018.8600867.

[10] I. Dutt, S. Borah, and I. Maitra, “A Proposed Machine Learning based Scheme for Intrusion Detection,” in 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), IEEE, Mar. 2018, pp. 479–483. doi: 10.1109/ICECA.2018.8474803.

[11] T. Salman, D. Bhamare, A. Erbad, R. Jain, and M. Samaka, “Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments,” in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), IEEE, Jun. 2017, pp. 97–103. doi: 10.1109/CSCloud.2017.15.

[12] T. Mehmood and H. B. M. Rais, “SVM for network anomaly detection using ACO feature subset,” in 2015 International Symposium on Mathematical Sciences and Computing Research, iSMSC 2015 - Proceedings, 2016. doi: 10.1109/ISMSC.2015.7594039.

[13] S. D. D. Anton, S. Sinha, and H. Dieter Schotten, “Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests,” in 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), IEEE, Sep. 2019, pp. 1–6. doi: 10.23919/SOFTCOM.2019.8903672.

[14] S. H. Kok, A. Abdullah, N. Z. Jhanjhi, and M. Supramaniam, “A review of intrusion detection system using machine learning approach,” Int. J. Eng. Res. Technol., vol. 12, no. 1, pp. 8–15, 2019.

[15] R. R. Palle, “Hybrid Multi-Objective Deep Learning Model for Anomaly Detection in Cloud Computing Environment,” Int. J. Sci. Res. Sci. Eng. Technol., vol. 1, no. 3, pp. 440–456, 2015.

[16] J. Alsamiri and A. Khalid, “Internet of things cyber attacks detection using machine learning,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 12, p. 627, 2019, doi: 10.14569/ijacsa.2019.0101280.

Published

2021-06-30

Issue

Section

Articles

How to Cite

1.
Rajendran D, Namburi VD, Arjun Singh Singh A, Tamilmani V, Maniar V, Kothamaram RR. Anomaly Identification in IoT-Networks Using Artificial Intelligence-Based Data-Driven Techniques in Cloud Environmen. IJETCSIT [Internet]. 2021 Jun. 30 [cited 2025 Oct. 30];2(2):83-91. Available from: https://www.ijetcsit.org/index.php/ijetcsit/article/view/437

Similar Articles

1-10 of 272

You may also start an advanced similarity search for this article.