Abstract
Background & Objective: The next generation of the internet where physical things or
objects are going to interact with each other without human interventions is called the Internet of
Things (IoT). Its presence can improve the quality of human lives in different domains and environments
such as agriculture, smart homes, intelligent transportation systems, and smart grids.
In the lowest layer of the IoT architecture (i.e., the perception layer), there are a variety of sensors
which are responsible for gathering data from their environment to provide service for customers.
However, these collected data are not always accurate and may be infected with anomalies for
some reasons such as limited sensor’s resources and environmental influences.
Accordingly, anomaly detection can be used as a preprocessing phase to prevent sending inappropriate
data for the processing.
Methods: Since distributed characteristic and its heterogeneous elements complicate the application
of anomaly detection techniques, in this paper, a cluster-based ensemble classification approach
has been presented.
Results & Conclusion: Will possessing low complexity, the proposed method has high accuracy
in detecting anomalies. This method has been tested on the data collected from sensors in the Intel
Berkley research laboratory which is one of the free and available datasets in the domain of IoT.
The results indicated that the proposed technique could achieve an accuracy of 99.9186%, a positive
detection rate of 99.7459%, while reducing false positive rate and misclassification rate to
0.0025% and 0.0813% respectively.
Keywords:
Anomaly detection, k-means clustering, ensemble classifiers, abnormal data, IoT, intel berkley research laboratory.
Graphical Abstract
[1]
Li S, Da Xu L, Zhao S. The internet of things: a survey. Springer Information Systems Frontiers 2014; pp. 1-17.
[2]
Al-Fuqaha A. AL-FA-Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Comm Surv and Tutor 2013; 1(2): 78-95.
[3]
Yang Z, Yue Y, Yang Y, Peng Y, Wang X, Liu W. Study and application on the architecture and key technologies for IOT International Conference Multimedia Technology. ICMT 2011; pp. 747-51.
[5]
Fu R, Zheng K, Zhang D, Yang Y. An intrusion detection scheme based on anomaly mining in internet of things. 4th IET International Conference Wireless Mobile Multimedia Network. 315-20.
[7]
Haq NF, Onik AR, Hridoy MAK, Rafni M, Shah FM, Farid DM. Application of machine learning approaches in intrusion detection system: a survey. Int J Adv Res Artif Intellig 2015; 4(3): 9-18.
[9]
Shrivas AK, Dewangan AK. An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set. Int J Comput Appl 2014; 99(15): 975-8887.
[12]
Muniyandi A P, Rajeswari R, Rajaram R. Network anomaly detection by cascading k-Means clustering and C4.5 decision tree algorithm in Procedia Engr 2011; 30(2011): 174-82..
[15]
Sheikhan M, Bostani H. A hybrid intrusion detection system for internet of things. 8th Symp Telecomm. 2395-4396.
[17]
Kodinariya TM, Makwana PR. Review on determining number of cluster in K-Means clustering. Int J Adv Res Comput Sci Manag Stud 2013; 1(6): 2321-7782.
[18]
Jayasimhan A, Gadge J. Anomaly detection using a clustering technique. Int J Appl Inf Syst 2012; 2(8): 5-9.
[20]
Yassin W, Udzir NI, Muda Z. Anomaly-based intrusion detection through K-Means clustering and naives Bayes classification. Proc 4th Int Conf Comput Inform (ICOCI). 298-303.