Performance analysis of anomaly detection of different IoT datasets using cloud micro services

Although IoT has been around us for a while, it's a new leading edge in technology which has the ability to connect, communicate and remotely controlling devices via the internet. There is a transition happened from closed networks to the public Internet. Here comes the need of making people understand the need of security monitoring techniques in public network. IoT has been improved the quality of human life, but security of the data and systems is a major challenge. When we consider home automated systems each device has two or three modes of operation, but as technology advances people are adding intelligence to the machines, as a result the no of modes of operation increasing. As we develop some solutions based on IoT from a home automated systems to smart city problems, the data generated is huge, there comes the relevance of security monitoring at cloud level. If we didn't handle data at inceptive stage itself properly, it is prone to different types of attacks and vulnerabilities. This paper exposes and focuses on the anomaly detection performance analysis of different IoT data sets using Cloud micro services.

[1]  M. Sahani,et al.  Web-based online embedded door access control and home security system based on face recognition , 2015, 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015].

[2]  Cewu Lu,et al.  Abnormal Event Detection at 150 FPS in MATLAB , 2013, 2013 IEEE International Conference on Computer Vision.

[3]  Junping Wang,et al.  An Online Anomaly Learning and Forecasting Model for Large-Scale Service of Internet of Things , 2014, 2014 International Conference on Identification, Information and Knowledge in the Internet of Things.

[4]  Arif Sari,et al.  A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications , 2015 .

[5]  Nitin Rakesh,et al.  Enhancement of Speech Compression Based on Various Wavelet Transform, Run length Encoding and Thresholding , 2015 .

[6]  M. Varasundar,et al.  Web-Based Online Embedded Door Access Control and Home Security System Based on Face Recognition , 2016 .

[7]  Kangfeng Zheng,et al.  An intrusion detection scheme based on anomaly mining in Internet of Things , 2011 .

[8]  Burak Kantarci,et al.  Anomaly detection and privacy preservation in cloud-centric Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[9]  Anang Hudaya Muhamad Amin,et al.  Cloudlet-based cyber foraging framework for distributed video surveillance provisioning , 2014, 2014 4th World Congress on Information and Communication Technologies (WICT 2014).

[10]  Anindya Maiti,et al.  Cloud controlled intrusion detection and burglary prevention stratagems in home automation systems , 2012, 2012 2nd Baltic Congress on Future Internet Communications.

[11]  Salvatore J. Stolfo,et al.  Anomaly Detection in Computer Security and an Application to File System Accesses , 2005, ISMIS.