Dynamic Anomaly Detection Using Robust Random Cut Forests in Resource-Constrained IoT Environments

被引:0
|
作者
Vashisth, Sristi [1 ]
Goyal, Anjali [1 ]
机构
[1] Sharda University, Department of Computer Science and Engineering, Greater Noida, India
来源
Informatica (Slovenia) | 2024年 / 48卷 / 23期
关键词
Anomaly detection - Network security - Spatio-temporal data;
D O I
10.31449/inf.v48i23.6862
中图分类号
学科分类号
摘要
This paper investigates dynamic anomaly detection in resource-constrained environments by leveraging Robust Random Cut Forests (RRCF). Anomaly detection is crucial for maintaining the integrity and security of data streams in Internet of Things (IoT) environments, where data is continuously generated and often subject to noise and fluctuations. We begin with a comprehensive exploration of resilient random cut data structures tailored for analyzing incoming data streams, highlighting their effectiveness in adapting to the dynamic nature of IoT.Our methodology encompasses extensive experimentation with diverse datasets, including real-time Arduino data and benchmark datasets such as IoT-23 and CIC-IoT. Through this approach, we assess the performance of the RRCF algorithm under various scenarios, focusing on its capability to accurately identify trends and anomalies over time. Notably, we achieve significant performance improvements, with an average Area Under the Curve (AUC) of 95.6 and an F1 score of 0.86, demonstrating RRCF’s effectiveness in real-time anomaly detection.To further enhance detection accuracy, we introduce dynamic thresholds that adapt to changing data characteristics, allowing our model to maintain robust performance even in the presence of noise. Detailed evaluations reveal that our approach consistently outperforms existing state-of-the-art methods, particularly in terms of handling noisy data and ensuring computational efficiency under resource constraints.The findings underscore the potential of RRCF as a powerful tool for real-time applications within IoT systems, providing a solid theoretical foundation for future advancements in dynamic anomaly detection. By investigating non-parametric anomalies and analyzing the influence of external factors on data integrity, we uncover hidden patterns amidst dynamic fluctuations. This research emphasizes the need for adaptive strategies in evolving data landscapes, laying the groundwork for enhanced resilience and accuracy in anomaly detection methodologies. In summary, this study presents a novel approach that integrates theoretical insights, updating strategies, and empirical experimentation, making a valuable contribution to the field of anomaly detection in resource-constrained environments. The implications of our work extend beyond theoretical foundations, offering practical solutions for real-time monitoring and anomaly detection in complex, dynamic systems. © 2024 Slovene Society Informatika. All rights reserved.
引用
收藏
页码:107 / 120
相关论文
共 50 条
  • [41] A bi-objective Model for Robust Resource-constrained Project Scheduling Problem with Random Activity Durations
    Zhang, Jingwen
    Qiao, Chuanzhuo
    2015 IEEE 12th International Conference on Networking, Sensing and Control (ICNSC), 2015, : 28 - 32
  • [42] Automated Creation of Topological Maps in Unknown Environments Using a Swarm of Resource-Constrained Robots
    Ramaithitima, Rattanachai
    Whitzer, Michael
    Bhattacharya, Subhrajit
    Kumar, Vijay
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2016, 1 (02): : 746 - 753
  • [43] Behavioural Approach to Network Anomaly Detection for Resource-Constrained System - Presentation of the Novel Solution - Preliminary Study
    Pelc, Mariusz
    Galus, Dawid
    Zolubak, Magda
    Ozana, Stepan
    Chlewicki, Wojciech
    Cichon, Katarzyna
    Podpora, Michal
    Kawala-Sterniuk, Aleksandra
    IFAC PAPERSONLINE, 2019, 52 (27): : 121 - 126
  • [44] Predicting Solar-Harvested Energy for Resource-Constrained IoT Devices Using Machine Learning
    Khamitov, Rakhat
    Orel, Daniil
    Zorbas, Dimitrios
    2024 20TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SMART SYSTEMS AND THE INTERNET OF THINGS, DCOSS-IOT 2024, 2024, : 661 - 668
  • [45] A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT
    Noguchi, Taku
    Nakagawa, Masato
    Yoshida, Masami
    Ramonet, Alberto Gallegos
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 147 - +
  • [46] Efficient Federated Learning using Random Pruning in Resource-Constrained Edge Intelligence Networks
    Chen, Chao
    Jiang, Bohang
    Liu, Shengli
    Li, Chuanhuang
    Wu, Celimuge
    Yin, Rui
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 5244 - 5249
  • [47] A Concept of Decision Support for Robust Resource-Constrained Scheduling Problems Using Hybrid Approach
    Sitek, Pawel
    Wikarek, Jaroslaw
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT I, 2017, 521 : 67 - 77
  • [48] Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks
    Chauhan, Jagmohan
    Seneviratne, Suranga
    Hu, Yining
    Misra, Archan
    Seneviratne, Aruna
    Lee, Youngki
    COMPUTER, 2018, 51 (05) : 60 - 67
  • [49] Efficient Edge-AI Models for Robust ECG Abnormality Detection on Resource-Constrained Hardware
    Huang, Zhaojing
    Contreras, Luis Fernando Herbozo
    Leung, Wing Hang
    Yu, Leping
    Truong, Nhan Duy
    Nikpour, Armin
    Kavehei, Omid
    JOURNAL OF CARDIOVASCULAR TRANSLATIONAL RESEARCH, 2024, 17 (04) : 879 - 892
  • [50] Planet Optimization with Deep Convolutional Neural Network for Lightweight Intrusion Detection in Resource-Constrained IoT Networks
    Alissa, Khalid A.
    Alrayes, Fatma S.
    Tarmissi, Khaled
    Yafoz, Ayman
    Alsini, Raed
    Alghushairy, Omar
    Othman, Mahmoud
    Motwakel, Abdelwahed
    APPLIED SCIENCES-BASEL, 2022, 12 (17):