Edge Mining on IoT Devices Using Anomaly Detection

With continuous monitoring and sensing, millions of Internet of Things sensors all over the world generate tremendous amounts of data every minute. As a result, recent studies start to raise the question as whether to send all the sensing data directly to the cloud (i.e., direct transmission), or to preprocess such data at the network edge and only send necessary data to the cloud (i.e., preprocessing at the edge). Anomaly detection is particularly useful as an edge mining technique to reduce the transmission overhead in such a context when the frequently monitored activities contain only a sparse set of anomalies. This paper analyzes the potential overhead-savings of machine learning based anomaly detection models on the edge in three different IoT scenarios. Our experimental results prove that by choosing the appropriate anomaly detection models, we are able to effectively reduce the total amount of transmission energy as well as minimize required cloud storage. We prove that Random Forest, Multilayer Perceptron, and Discriminant Analysis models can viably save time and energy on the edge device during data transmission. K-Nearest Neighbors, although reliable in terms of prediction accuracy, demands exorbitant overhead and results in net time and energy loss on the edge device. In addition to presenting our model results for the different IoT scenarios, we provide guidelines for potential model selections through analysis of involved tradeoffs such as training overhead, prediction overhead, and classification accuracy.

[1]  Rajeev Kumar Kanth,et al.  Distributed internal anomaly detection system for Internet-of-Things , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[2]  Yaxin Bi,et al.  KNN Model-Based Approach in Classification , 2003, OTM.

[3]  Ali Dehghantanha,et al.  A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[4]  Tie Luo,et al.  Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT , 2018, 2018 IEEE International Conference on Communications (ICC).

[5]  Rakesh Kumar Mishra,et al.  Aspects of Network Architecture for Remote Healthcare Systems , 2016, 2016 2nd International Conference on Computational Intelligence and Networks (CINE).

[6]  Gilles Louppe,et al.  Understanding Random Forests: From Theory to Practice , 2014, 1407.7502.

[7]  Zahir Tari,et al.  On the Move to Meaningful Internet Systems. OTM 2018 Conferences , 2018, Lecture Notes in Computer Science.

[8]  Gareth Halfacree,et al.  Raspberry Pi User Guide , 2012 .

[9]  Cong Li,et al.  Robust Distributed Anomaly Detection Using Optimal Weighted One-Class Random Forests , 2018, 2018 IEEE International Conference on Data Mining (ICDM).

[10]  Distributed K-Nearest Neighbors , 2016 .

[11]  Burak Kantarci,et al.  Anomaly detection and privacy preservation in cloud-centric Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[12]  Deris Stiawan,et al.  Anomaly detection and monitoring in Internet of Things communication , 2016, 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE).

[13]  Ehud D. Karnin,et al.  A simple procedure for pruning back-propagation trained neural networks , 1990, IEEE Trans. Neural Networks.

[14]  James Brusey,et al.  Edge Mining the Internet of Things , 2013, IEEE Sensors Journal.

[15]  Marimuthu Palaniswami,et al.  Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering , 2017, IEEE Internet of Things Journal.

[16]  G. V. Puskorius,et al.  Truncated backpropagation through time and Kalman filter training for neurocontrol , 1994, Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94).

[17]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[18]  Yuji Sekiya,et al.  Unsupervised Scanning Behavior Detection Based on Distribution of Network Traffic Features Using Robust Autoencoders , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).

[19]  Abbas Javed,et al.  Intelligent Intrusion Detection in Low-Power IoTs , 2016, ACM Trans. Internet Techn..

[20]  Behnam Dezfouli,et al.  EMPIOT: An Energy Measurement Platform for Wireless IoT Devices , 2018, J. Netw. Comput. Appl..

[21]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[22]  S. Imandoust,et al.  Application of K-Nearest Neighbor (KNN) Approach for Predicting Economic Events: Theoretical Background , 2013 .

[23]  Tarik Taleb,et al.  An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.

[24]  Stephen M. Omohundro,et al.  Five Balltree Construction Algorithms , 2009 .

[25]  Stepan Ivanov,et al.  Collaborative Edge Mining for predicting heat stress in dairy cattle , 2016, 2016 Wireless Days (WD).

[26]  Yu Chen,et al.  Ultra-lightweight deep packet anomaly detection for Internet of Things devices , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).

[27]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[28]  Marco Mancini,et al.  Anomaly Detection Models for IoT Time Series Data , 2018, ArXiv.

[29]  Vern Paxson,et al.  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.

[30]  Soma Bandyopadhyay,et al.  IoT Healthcare Analytics: The Importance of Anomaly Detection , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[31]  Xiangyu Wang,et al.  A Direct Approach for Sparse Quadratic Discriminant Analysis , 2015, J. Mach. Learn. Res..

[32]  Mohammad Zulkernine,et al.  Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.

[33]  A. Ganapathiraju,et al.  LINEAR DISCRIMINANT ANALYSIS - A BRIEF TUTORIAL , 1995 .

[34]  Shadi A. Aljawarneh,et al.  GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things , 2018, The Journal of Supercomputing.

[35]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[36]  Shen Bin,et al.  Research on data mining models for the internet of things , 2010, 2010 International Conference on Image Analysis and Signal Processing.

[37]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[38]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.