2020
DOI: 10.1111/exsy.12556
|View full text |Cite
|
Sign up to set email alerts
|

A machine learning approach for imputation and anomaly detection in IoT environment

Abstract: The problem of anomaly and attack detection in IoT environment is one of the prime challenges in the domain of internet of things that requires an immediate concern. For example, anomalies and attacks in IoT environment such as scan, malicious operation, denial of service, spying, data type probing, wrong setup, malicious control can lead to failure of an IoT system. Datasets generated in an IoT environment usually have missing values. The presence of missing values makes the classifier unsuitable for classifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(12 citation statements)
references
References 44 publications
0
12
0
Order By: Relevance
“…The proposal divides WSN nodes into different clusters, with each cluster head using the MAS method to separate legitimate traffic from phishing scams. The authors in [ 20 , 46 ] improved the k-means clustering scheme for finding DDoS and misdirection attacks. To detect attacks in a home WSN, the authors of [ 47 ] used user-behaviors learning analysis.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The proposal divides WSN nodes into different clusters, with each cluster head using the MAS method to separate legitimate traffic from phishing scams. The authors in [ 20 , 46 ] improved the k-means clustering scheme for finding DDoS and misdirection attacks. To detect attacks in a home WSN, the authors of [ 47 ] used user-behaviors learning analysis.…”
Section: Background and Related Workmentioning
confidence: 99%
“…We can express the formulation based on the three observations such as i − 1, n − j − i − 1, and j − 1 which are below x j and within the range from x i to x n−j and from x n−j to x n , respectively. L and M are two variables, as shown in Equations ( 9) and (10).…”
Section: Probability Density Of Rmentioning
confidence: 99%
“…With existing deep learning and machine learning algorithms, one can find outliers from a dataset [7][8][9]. However, due to lack of hardware resources such as processor and memory, an IoT device may face severe difficulty [10]. Further, depicting a point anomaly from a very small-size dataset makes the whole process questionable [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…Anomalies or outliers are uncommon, but they can still be important in the event of a credit card transaction; for example, the aberrant conduct of credit card transactions may suggest that a credit card is stolen, whereas strange network traffic patterns can indicate that illegal network access is available [14]. According to the 2019 threat report SonicWALL, in 2018 in Gatlan (2019), more than 327 million threats from the Internet of Things (IoT) were detected globally [15]. As a consequence, assaults on and detection of abnormalities in IoT infrastructure in the IoT industry become an increasing cause of concern [16].…”
Section: Introductionmentioning
confidence: 99%