Enhancing IOT Security Threat Detection with Big-Data Analytics and Localized Clustered Anomaly Detection

Authors

  • Vinny Sukhija Research Scholar, Department of Computer Science & Applications, Baba Mastnath University, Asthal Bohar, Rohtak, INDIA.
  • Dr. Brij Mohan Goel Assistant Professor, Department of Computer Science & Applications, Baba Mastnath University, Asthal Bohar, Rohtak, INDIA.

DOI:

https://doi.org/10.55544/sjmars.4.1.3

Keywords:

IoT Security, IOT Anomaly Detection, Behavioural IOT Model, Hybrid IOT Security, Secure IOT Networks, Scalable IOT Security

Abstract

IoT devices have unlocked new opportunities for automation & connectivity across industries like never before. But this growth has also added significant security challenges, such as data breaches, unauthorized access, and malware attacks. Static security mechanisms frequently overlook the adaptive characteristics of these attacks, resulting in elevated false positive rates and latency of response. This work presents an improved threat detection framework for the IoT that effectively employs Big Data Analytics and localized anomaly detection techniques to improve the accuracy and efficiency of IoT security. The proposed system also discusses the behavioural model processing of IOT devices locally that significantly reduces server load and response delay and provides a scalable solution for large-scale IoT networks.

References

[1] "State of IoT 2024: Key Trends and Statistics," IoT Analytics, 2024. [Online]. Available: https://www.iot-analytics.com/state-of-iot-2024. Accessed: Oct. 2024.

[2] Zscaler Threat Labz, "IoT Malware Report: 400% Year-over-Year Increase in Attacks," Zscaler, 2024. [Online]. Available: https://www.zscaler.com/threatlabz/ iot-malware-report-2024. Accessed: Oct. 2024.

[3] M. H. Miraz, M. Ali, P. S. Excell, and R. Picking, "A Review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT)," in Proceedings of the 2015 Internet Technologies and Applications (ITA), Wrexham, UK, 2015, pp. 219–224. doi: 10.1109/ITechA.2015.7317398.

[4] H. Wang, S. Guo, and J. Ma, "Security and Privacy Challenges in IoT: A Survey," Future Gener. Comput. Syst., vol. 96, pp. 26–45, 2019.

[5] M. A. Ferrag, L. Maglaras, A. Derhab, and M. Janicke, "Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-Preserving Schemes," J. Netw. Comput. Appl., vol. 101, pp. 55–82, 2018.

[6] L. Wu, F. Bigi, and K. M. Gillett, "Machine Learning Approaches for Cybersecurity Intrusion Detection: A Review," IEEE Access, vol. 8, pp. 104543–104562, 2020.

[7] D. E. Denning, "An Intrusion-Detection Model," IEEE Trans. Softw. Eng., vol. SE-13, no. 2, pp. 222–232, 1987.

[8] Y. Zhang, C. Xu, and K. Wang, "Real-Time IoT Security Analytics Using Big Data Processing," IEEE Trans. Cloud Comput., vol. 9, no. 2, pp. 241–252, 2021.

[9] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A Survey on Internet of Things: Architecture, Enabling Technologies, Security, and Privacy," IEEE Internet Things J., vol. 4, no. 5, pp. 1125–1142, 2017.

[10] S. Shi, V. K. Lau, and R. W. Yeung, "Edge Computing: Vision and Challenges," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, Oct. 2016. doi:10.1109/JIOT.2016. 2579198.

[11] M. M. Fouad, A. Y. Al-Dubai, and I. Romdhani, "A Blockchain-Based Framework for Secure IoT Communications," IEEE Trans. Netw. Serv. Manag., vol. 17, no. 3, pp. 1830–1842, 2020.

[12] S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in Embedded Systems: Design Challenges," ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 461–491, 2004.

[13] R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things," IEEE Comput., vol. 44, no. 4, pp. 51–58, 2011. doi:10.1109/MC.2011.7.

[14] S. Axelsson, "Technical Report on Intrusion Detection Systems – A Survey and Taxonomy," Dept. Comput. Eng., Chalmers Univ. Technol., 2000.

[15] S. Singh and N. Singh, "Big Data Analytics," in Proc. Int. Conf. Commun., Inf. Comp. Technol. (ICCICT), 2012, pp.1–4.

Downloads

Published

2025-02-26

How to Cite

Sukhija, V., & Goel, B. M. (2025). Enhancing IOT Security Threat Detection with Big-Data Analytics and Localized Clustered Anomaly Detection. Stallion Journal for Multidisciplinary Associated Research Studies, 4(1), 16–21. https://doi.org/10.55544/sjmars.4.1.3

Similar Articles

<< < 1 2 3 4 > >> 

You may also start an advanced similarity search for this article.