The 2nd XoveTIC Conference (XoveTIC 2019) 2019
DOI: 10.3390/proceedings2019021004
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection in IoT: Methods, Techniques and Tools

Abstract: Nowadays, the Internet of things (IoT) network, as system of interrelated computing devices with the ability to transfer data over a network, is present in many scenarios of everyday life. Understanding how traffic behaves can be done more easily if the real environment is replicated to a virtualized environment. In this paper, we propose a methodology to develop a systematic approach to dataset analysis for detecting traffic anomalies in an IoT network. The reader will become familiar with the specific techni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…As previously anticipated, considering previous works on the topic, different custom datasets are build and adopted to design protection systems, by also considering the MQTT protocol. Particularly, in literature, data of DHT11 temperature sensors connected to MQTT public services are adopted [ 38 ], as well as temperature, inRow and coolant sensors [ 39 ]. Although such works are promising, related datasets are not publicly available.…”
Section: Related Workmentioning
confidence: 99%
“…As previously anticipated, considering previous works on the topic, different custom datasets are build and adopted to design protection systems, by also considering the MQTT protocol. Particularly, in literature, data of DHT11 temperature sensors connected to MQTT public services are adopted [ 38 ], as well as temperature, inRow and coolant sensors [ 39 ]. Although such works are promising, related datasets are not publicly available.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, the performance of the proposed system was evaluated based on the Anomaly Detection Rate (ADR) metric, which identifies the rate of abnormal events and observations in a period of time [ 57 ]. This metric is considered to be one of most important metrics, since the main problem in wireless networks is the integrity of exchanged data.…”
Section: Evaluation and Resultsmentioning
confidence: 99%
“…The received data is classified based on SVM algorithm. Compared to rule-based processing, machine learning algorithms have the ability to detect new forms of attacks in addition to the known ones [ 57 ], since a model is build to recognize normal data, and any deviation from such pattern is detected as abnormal data. When an attack is detected, IDC publishes notifications to be received by subscribed users.…”
Section: Ads For Smart Hospital Iot Systemsmentioning
confidence: 99%
“…In addition to the classification of the outlier detection techniques, authors in [27] proposed a methodology for outlier detection in IoT through a systematic analysis of the data set based on five stages. The first stage is to define a scenario of generating a labelled dataset using mathematical modelling on a real IoT system.…”
Section: Outlier Detection Techniques In Iotmentioning
confidence: 99%