{"title":"An Analysis Of Anomaly Detection Techniques for IoT Devices: A Review","authors":"Shivam Bindra, Aruna Malik","doi":"10.1109/ICSCCC58608.2023.10176388","DOIUrl":null,"url":null,"abstract":"There is an increasing demand for effective intrusion detection systems to protect the privacy and security of IoT devices and the data they collect and transmit. IoT devices are susceptible to a broad spectrum of security risks, such as unauthorised access, assaults, and breaches, which can put in danger the network's integrity, confidentiality, and availability. This study investigates the various methodologies used in IoT device anomaly detection. The paper discusses possible solutions, such as using lightweight algorithms, distributed intrusion detection systems, and adaptive security mechanisms. Some of the frameworks reviewed in this paper are BFA-PDBSCAN, B-Stacking, Two stream neural network and Hybrid (Anomaly-based +Specification-based) detection. Effective anomaly detection in IoT devices requires a multi-layered security approach that incorporates various intrusion detection techniques and best practises in order to protect the confidentiality and anonymity of IoT devices or the collected and transmitted data.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCCC58608.2023.10176388","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
There is an increasing demand for effective intrusion detection systems to protect the privacy and security of IoT devices and the data they collect and transmit. IoT devices are susceptible to a broad spectrum of security risks, such as unauthorised access, assaults, and breaches, which can put in danger the network's integrity, confidentiality, and availability. This study investigates the various methodologies used in IoT device anomaly detection. The paper discusses possible solutions, such as using lightweight algorithms, distributed intrusion detection systems, and adaptive security mechanisms. Some of the frameworks reviewed in this paper are BFA-PDBSCAN, B-Stacking, Two stream neural network and Hybrid (Anomaly-based +Specification-based) detection. Effective anomaly detection in IoT devices requires a multi-layered security approach that incorporates various intrusion detection techniques and best practises in order to protect the confidentiality and anonymity of IoT devices or the collected and transmitted data.