Dynamic Anomaly Detection Using Robust Random Cut Forests in Resource-Constrained IoT Environments

被引:0
|
作者
Vashisth, Sristi [1 ]
Goyal, Anjali [1 ]
机构
[1] Sharda University, Department of Computer Science and Engineering, Greater Noida, India
来源
Informatica (Slovenia) | 2024年 / 48卷 / 23期
关键词
Anomaly detection - Network security - Spatio-temporal data;
D O I
10.31449/inf.v48i23.6862
中图分类号
学科分类号
摘要
This paper investigates dynamic anomaly detection in resource-constrained environments by leveraging Robust Random Cut Forests (RRCF). Anomaly detection is crucial for maintaining the integrity and security of data streams in Internet of Things (IoT) environments, where data is continuously generated and often subject to noise and fluctuations. We begin with a comprehensive exploration of resilient random cut data structures tailored for analyzing incoming data streams, highlighting their effectiveness in adapting to the dynamic nature of IoT.Our methodology encompasses extensive experimentation with diverse datasets, including real-time Arduino data and benchmark datasets such as IoT-23 and CIC-IoT. Through this approach, we assess the performance of the RRCF algorithm under various scenarios, focusing on its capability to accurately identify trends and anomalies over time. Notably, we achieve significant performance improvements, with an average Area Under the Curve (AUC) of 95.6 and an F1 score of 0.86, demonstrating RRCF’s effectiveness in real-time anomaly detection.To further enhance detection accuracy, we introduce dynamic thresholds that adapt to changing data characteristics, allowing our model to maintain robust performance even in the presence of noise. Detailed evaluations reveal that our approach consistently outperforms existing state-of-the-art methods, particularly in terms of handling noisy data and ensuring computational efficiency under resource constraints.The findings underscore the potential of RRCF as a powerful tool for real-time applications within IoT systems, providing a solid theoretical foundation for future advancements in dynamic anomaly detection. By investigating non-parametric anomalies and analyzing the influence of external factors on data integrity, we uncover hidden patterns amidst dynamic fluctuations. This research emphasizes the need for adaptive strategies in evolving data landscapes, laying the groundwork for enhanced resilience and accuracy in anomaly detection methodologies. In summary, this study presents a novel approach that integrates theoretical insights, updating strategies, and empirical experimentation, making a valuable contribution to the field of anomaly detection in resource-constrained environments. The implications of our work extend beyond theoretical foundations, offering practical solutions for real-time monitoring and anomaly detection in complex, dynamic systems. © 2024 Slovene Society Informatika. All rights reserved.
引用
收藏
页码:107 / 120
相关论文
共 50 条
  • [21] Implementing Anomaly-Based Intrusion Detection for Resource-Constrained Devices in IoMT Networks
    Zachos, Georgios
    Mantas, Georgios
    Porfyrakis, Kyriakos
    Rodriguez, Jonathan
    SENSORS, 2025, 25 (04)
  • [22] Privacy Preservation in Resource-Constrained IoT Devices Using Blockchain-A Survey
    Iftikhar, Zainab
    Javed, Yasir
    Zaidi, Syed Yawar Abbas
    Shah, Munam Ali
    Khan, Zafar Iqbal
    Mussadiq, Shafaq
    Abbasi, Kamran
    ELECTRONICS, 2021, 10 (14)
  • [23] Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
    Fatima, Mahawish
    Rehman, Osama
    Rahman, Ibrahim M. H.
    Ajmal, Aisha
    Park, Simon Jigwan
    FUTURE INTERNET, 2024, 16 (10)
  • [24] A Novel Distributed Online Anomaly Detection Method in Resource-Constrained Wireless Sensor Networks
    Ding, Zhiguo
    Wang, Haikuan
    Fei, Minrui
    Du, Dajun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [25] RETRACTED: Vision Sensor-Based Real-Time Fire Detection in Resource-Constrained IoT Environments (Retracted Article)
    Yar, Hikmat
    Hussain, Tanveer
    Khan, Zulfiqar Ahmad
    Koundal, Deepika
    Lee, Mi Young
    Baik, Sung Wook
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2021, 2021
  • [26] Obfuscated Memory Malware Detection in Resource-Constrained IoT Devices for Smart City Applications
    Shafin, Sakib Shahriar
    Karmakar, Gour
    Mareels, Iven
    SENSORS, 2023, 23 (11)
  • [27] Fake Audio Detection in Resource-constrained Settings using Microfeatures
    Dhamyal, Hira
    Ali, Ayesha
    Qazi, Ihsan Ayyub
    Raza, Agha Ali
    INTERSPEECH 2021, 2021, : 4149 - 4153
  • [28] Dynamic Web-Page Generation in Resource-Constrained Environments - The Kertasarie Server Pages
    Hochberger, Christian
    Meusel, Christian
    2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 192 - 197
  • [29] Hardware-Assisted Machine Learning in Resource-Constrained IoT Environments for Security: Review and Future Prospective
    Kornaros, Georgios
    IEEE ACCESS, 2022, 10 : 58603 - 58622
  • [30] Dynamic Group Key Agreement for Resource-constrained Devices Using Blockchains
    Tacyildiz, Yasar Berkay
    Ermis, Orhan
    Gur, Gurkan
    Alagoz, Fatih
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 58 - 76