Anomaly Detection Techniques Using Deep Learning in IoT A Survey
Anomaly Detection Techniques Using Deep Learning in IoT A Survey
Abstract—IoT technologies is improving life quality by computation at the device or the edge to solve some of the
enhancing several real-life smart applications. IoT includes issues of network security and delay in computation.
large number of devices generating huge amount of data which
needs large computation. Anomaly detection and security is the
major concern in the IoT domain. This survey paper provides II. ANOMALY DETECTION IN IOT
an overview of anomaly detection using machine learning and
deep learning methods in IoT applications. Machine learning A. Anomalies and sources of anomalies
and deep learning are powerful tools for analyzing normal and
abnormal behavior of IoT components and devices. In this In real-world data-sets there are instances which are
paper we outline key issues in research and challenges using dissimilar to all others instances and are known as anomalies.
deep anomaly detection techniques for resource constrained The anomaly detection is to detect such patterns whose
devices in real-world problems of IoT. Fog computing move the behavior is considered abnormal as compared to normal
computation at the device or the edge to solve some of the issues nodes. Different sources of anomalies are Intrusion detection
of network security and delay in computation. system, Fraud detection and Data leakage. Anomaly
detection is used in variety of areas in IoT domain as shown
Keywords—Anomaly Detection, Machine Learning, Deep
in Table I.
learning, Fog Computing, CNN, DNN
TABLE I. AREAS OF ANOMALY
I. INTRODUCTION
IoT is going through the phase of rapid growth Areas Anomaly Description Benefits
nowadays. Application specific systems designed for specific Prevent water
Water leakage
purposes requires less time for computation but it has limited waste
flexibility. IoT demands application, product and service Maintenance time
Smart Light bulb broken
platforms which can capture, communicate, store, access and reduced
Cities
share the data from the physical world. IoT is connecting all Electricity leakage To save energy
the devices referred to as ‘Things’ with internet and it has Gas leakage To save fuel
Health detection Life saving
been growing trend in decades. IoT deals with
Network Intrusion detection, fraud
sensors/actuators, RFID tags and communication To secure data
Security detection, DDoS attacks
technologies. RFID technology is transmitting the Surface inspection of To remove defect
identification information from the microchip to the reader Industries
device on device
through wireless communication. Other IoT devices and
technology such as barcode, smart phones and cloud
computing are used to form network. For information Intrusion detection: IoT devices are connected to the internet
exchange, processing and communication in IoT technical and remains vulnerable to security-related attacks. Heavy
standards specification needs to be designed for high quality damage to IoT network is caused by attacks such as Denial-
services. Standardization of the technologies will lead to of-service (DoS) attacks and distributed denial-of-service
success of IoT[1][2][3]. Layers of IoT are perception layer, (DDoS) attacks. Detection and prevention from those attacks
network layer and business layer. is the major issue in IoT applications.
Machine learning and deep learning techniques have
been used extensively for a many task including Fraud detection: IoT networks remain susceptible to stealing
classification, regression and in IoT application areas such as credit card information, bank account details, or other
intrusion detection system, computer vision, recommender sensitive information during logins or online payments.
system. Deep learning facilitates the analysis on fast and real
data streams to extract features and predict future in IoT
Data Leakage: Sensitive information from databases, file
domain. DL is considered better than traditional machine
servers and other information sources can leak to any external
learning as some features that might not be viewed to a
entity which results in not only the loss of information, but
human can be easily extracted and thus improve the accuracy
also creates threat that can destroy confidential information
[4]. In this paper review of different machine learning and
from the system. Proper encryption mechanisms can prevent
deep learning techniques for anomaly detection are described
such leaks.
for the IoT applications. Fog computing move the
146
Authorized licensed use limited to: University of Guelph. Downloaded on May 09,2024 at 21:53:43 UTC from IEEE Xplore. Restrictions apply.
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE
147
Authorized licensed use limited to: University of Guelph. Downloaded on May 09,2024 at 21:53:43 UTC from IEEE Xplore. Restrictions apply.
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE
sources. The data source includes different types of attacks V. KEY ISSUES AND CHALLENGES IN ANOMALY
including DoS, the system is trained on one dataset and tested DETECTION
on another datasets. Experiments show that concatenating Missing data points: Due to external environment data
time windows of variable length increases effectiveness and is lost which is difficult to detect.
addition of computing resources decreases the time required
Data corruption: External factors or device
to train the ELM classifier.
malfunctioning corrupts the data and makes it difficult to
Rare events are detected using IRESE deployed on edge
differentiate anomaly and corrupted data.
device which continuously process the data and apply
Encrypted data: to detect anomaly on encrypted data is
machine learning techniques [27]. Data collected by IoT
difficult.
devices is buffered for few seconds and then send to data
framing where it is divided into smaller frames for feature Sensor fusion: It is difficult to collect data from different
extraction techniques and then rare event detection strategy is sensors and then aggregate for the results.
applied in two stages. At the first stage BIRCH Micro Real time detection: Real time anomaly detection
clustering technique is applied at the edge device to cluster involves high speed streaming data and thus require faster
high-speed incoming data in real time. At second stage response.
Agglomerative macro clustering is applied to get macro Noisy data: Electronic transmission generates noisy data
clusters from the clusters formed at first stage based on and thus is required to remove that from edge computing
Euclidean distance between clusters which finally divides into devices in IoT before forwarding it to cloud.
rare event and normal cluster. Experiment is conducted on Traffic surge: Huge amount of data can overload
audio data which include gunshot, siren, glass break and anomaly detection task.
scream and results show that optimal value of threshold is Multivariate data: Frequent change in data should also
selected where the all three values precision, recall and F1 is be considered.
highest altogether.
148
Authorized licensed use limited to: University of Guelph. Downloaded on May 09,2024 at 21:53:43 UTC from IEEE Xplore. Restrictions apply.
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE
VI. CONCLUSIONS [13] Alguliyev, R. M., Aliguliyev, R. M., Imamverdiyev, Y. N., &
Sukhostat, L. V. “An Anomaly Detection Based on Optimization”.
In this paper several deep learning and machine International Journal of Intelligent Systems and Applications, 9(12),
learning techniques are described for the anomaly detection 87–96, 2017.
over the past few years in IoT. This review provides new [14] Thamilarasu, G., & Chawla, S. “Towards Deep-Learning-Driven
Intrusion Detection for the Internet of Things”. Sensors (Basel,
insight to the researchers in the field of anomaly detection Switzerland), 19(9). 2019.
in IoT. Everyday a new unknown attack is discovered and [15] Lloret, J., Tomas, J., Canovas, A., & Parra, L. “An Integrated IoT
thus there is need of new algorithms to detect the attack. IoT Architecture for Smart Metering”. IEEE Communications
includes large number of devices and generate huge amount Magazine, 54(12), 50–57, 2016.
of data and thus large computation is needed. There is a need [16] M.-O. Pahl , F.-X. Aubet , “All eyes on you: distributed multi-
of feature extraction to faster the speed of computation. dimensional IoT microservice anomaly detection”, in: Proceedings
of the 2018 Fourteenth International Conference on Network and
Anomaly detection at edge devices will provide faster Service Management (CNSM)(CNSM 2018), 2018 . Rome, Italy
response and greater quality of service in IoT. Real time [17] Moustafa, N., Slay, J.: “The evaluation of network anomaly
data streaming in IoT needs real time anomaly detection. It detection systems: statistical analysis of the UNSW-NB15 ata set
is challenging and costly to detect anomaly using deep and the comparison with the KDD99 data set”. Inf. Secur. J. 25(1–
learning which requires high computing on resource 3), 18–31 (2016)
constrained IoT devices. [18] ] H. H. Pajouh, R. Javidan, R. Khayami, D. Ali, and K.-K. R. Choo,
"A two-layer dimension reduction and two-tier classification model
for anomaly-based intrusion detection in IoT backbone networks,"
REFERENCES IEEE Transactions on Emerging Topics in Computing, 2016.
[1] Xu, L. Da, Member, S., He, W., & Li, S. “Internet of Things in [19] R. Kozik , M. Chora ´s , M. Ficco , F. Palmieri , “A scalable
Industries : A Survey”. 10(4), 2233–2243. 2014 distributed machine learning approach for attack detection in edge
[2] Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. “A computing environments”, J. Parallel Distrib. Comput. 119 (2018)
Survey on Internet of Things :Architecture , Enabling Technologies 18–26.
, Security and Privacy , and Applications”. 4(5), 1125–1142, 2017. [20] A. Ayad, M. Shaban, and W. Gabriel, 2017. [Online]. Available:
[3] Al-fuqaha, A., Member, S., Guizani, M., Mohammadi, M., & https://github.com/xtarx/ “Unsupervised-Anomaly-Detection-with-
Member, S. “Internet of Things: A Survey on Enabling Generative-Adversarial-Netw,” 2017.
Technologies, Protocols, and Applications”. 17(4), 2347–2376, [21] M. Haselmann and D. Gruber, “Supervised machine learning based
2015. surface inspection by synthetizing arti- ficial defects,” in 2017 16th
[4] Chalapathy, R., & Chawla, S. “Deep Learning for Anomaly IEEE International Confer- ence on Machine Learning and
Detection: A Survey”. 1–50, 2019. Applications (ICMLA). IEEE, 2017, pp. 390–395.
[5] Mohammadi, M., Member, G. S., Al-fuqaha, A., & Member, S. [22] Moh, M., & Raju, R. “Machine Learning Techniques for Security of
(n.d.). “Deep Learning for IoT Big Data and Streaming Analytics : Internet of Things ( IoT ) and Fog Computing Systems”. 2018
A Survey”. X(X), 1–40 International Conference on High Performance Computing &
[6] Mohamudally, N., & Peermamode-Mohaboob, M. “Building An Simulation (HPCS), 709–715, 2018.
Anomaly Detection Engine (ADE) for IoT Smart Applications”. [23] Diro, A. A., & Chilamkurti, N. “ Distributed attack detection scheme
Procedia Computer Science, 134, 10–17,2018. using deep learning approach for Internet of Things”. Future
[7] Haselmann, M., Gruber, D. P., & Tabatabai, P. “Anomaly Detection Generation Computer Systems, 82, 761–76, 2018.
Using Deep Learning Based Image Completion”. Proceedings - 17th [24] Dourado, C. M. J. M., Pires, S., Silva, P., Victor, R., Nóbrega, M.,
IEEE International Conference on Machine Learning and Carlos, A., … Albuquerque, H. C. De. “Deep learning IoT system
Applications, ICMLA 2018, 1237–1242, 2019. for online stroke detection in skull computed tomography images”.
[8] Zhang, C., Song, D., Chen, Y., Feng, X., Lumezanu, C., Cheng, W., Computer Networks, 152, 25–39, 2019.
… Chawla, N. V. “A Deep Neural Network for Unsupervised [25] Li, D., Deng, L., Lee, M., & Wang, H. (2019). International Journal
Anomaly Detection and Diagnosis in Multivariate Time Series Data, of Information Management “IoT data feature extraction and
“2018. intrusion detection system for smart cities based on deep migration
[9] Mahfuz, S., Isah, H., Zulkernine, F., & Nicholls, P. “Detecting learning”. International Journal of Information Management,
Irregular Patterns in IoT Streaming Data for Fall Detection.” 2018 (March), 0–1. 2019
IEEE 9th Annual Information Technology, Electronics and Mobile [26] Comput, J. P. D., Kozik, R., Choraś, M., Ficco, M., & Palmieri, F.
Communication Conference, IEMCON 2018, 588–594, 2019. (2018). “A scalable distributed machine learning approach for attack
[10] Rajesh, G., Mangathayaru, N., & Narsimha, G. CLAPP : “A self- detection in edge computing environments”. J. Parallel Distrib.
constructing feature clustering approach for anomaly detection”. Comput., 119, 18–26, 2018.
Future Generation Computer Systems, 74, 417–429, 2017. [27] Haider, Z., Vecchio, M., Antonini, M., & Antonelli, F. (2019).
[11] Thanigaivelan, N. K., Nigussie, E., Virtanen, S., & Isoaho, J. Engineering Applications of Artificial Intelligence “IRESE : An
“Hybrid Internal Anomaly Detection System for IoT: Reactive intelligent rare-event detection system using unsupervised learning
Nodes with Cross-Layer Operation”. Security and Communication on the IoT edge”. Engineering Applications of Artificial
Networks, 2018, 1–15, 2018 Intelligence, 84(September 2018), 41–50.
[12] A. Ukil , S. Bandyoapdhyay , C. Puri , A. Pal. “Iot healthcare
analytics: The importance of anomaly detection”, in: Proceedings of
the 2016 IEEE 30th International Conference on Advanced
Information Networking and Applications (AINA), IEEE, 2016, pp.
994–997.
149
Authorized licensed use limited to: University of Guelph. Downloaded on May 09,2024 at 21:53:43 UTC from IEEE Xplore. Restrictions apply.