[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3603781.3604223acmotherconferencesArticle/Chapter ViewAbstractPublication PagescniotConference Proceedingsconference-collections
research-article

Anomaly Detection in Internet of Things Based on Logs Using Machine Learning and Deep Learning Techniques

Published: 27 July 2023 Publication History

Abstract

Engineers (developers or operators) can comprehend the condition of the system and spot odd behaviors like malware attacks and system failures by using log data that records critical events and system status. However, in the 4.0 era, IoT devices are expected to explode in number, and a large amount of data is generated from IoT devices. If something goes wrong, engineers will spend a lot of time manually processing expansive sums of log information. Therefore, it is vital to develop automated methods for for log-based anomaly detection, machine learning, and deep learning applications. However, with IoT device log data, how compelling are straightforward deep learning and machine learning models, and which approach will be more reasonable? This work is for research and evaluation of machine learning and deep learning models with two actual log datasets. The machine learning algorithms like RF, kNN, XGBoost models are trained on two actual log datasets based on the log parsers. Ensemble classifier, XGBoost got the best results with Accuracy, precision, and F1-score best at 99.9%, 99.8%, and 99.9%, respectively. We expect that the discoveries of our think about will be very beneficial for both professionals and analysts seeking after this interesting field.

References

[1]
“41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025, Truy cp: https://www.helpnetsecurity.com/2019/06/21/connected-iot-devices-forecast/. Ngày truy cp: 10/3/2022.”
[2]
“Singh, S., Sheng, Q. Z., Benkhelifa, E., & Lloret, J. (2020). Guest Editorial: Energy Management, Protocols, and Security for the Next-Generation Networks and Internet of Things. IEEE Trans. Ind. Informatics, 16(5), 3515-3520.”
[3]
“Mi, H., Wang, H., Zhou, Y., Lyu, M. R. T., & Cai, H. (2013). Toward fine-grained, unsupervised, scalable performance diagnosis for production cloud computing systems. IEEE Transactions on Parallel and Distributed Systems, 24(6), 1245-1255.”
[4]
“Zhu, J., He, S., Liu, J., He, P., Xie, Q., Zheng, Z., & Lyu, M. R. (2019, May). Tools and benchmarks for automated log parsing. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (pp. 121-130). IEEE.”
[5]
“Shu, X., Smiy, J., Yao, D. D., & Lin, H. (2013, December). Massive distributed and parallel log analysis for organizational security. In 2013 IEEE Globecom Workshops (GC Wkshps) (pp. 194-199). IEEE.”
[6]
“W. Meng, Y. Liu, Y. Zhu, S. Zhang, D. Pei, Y. Liu, Y. Chen, R. Zhang, S. Tao, P. Sun, and R. Zhou, ‘Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs,’ in IJCAI. ijcai.org, 2019, pp. 4739–4745.”
[7]
“Zhang, X., Xu, Y., Lin, Q., Qiao, B., Zhang, H., Dang, Y., ... & Zhang, D. (2019, August). Robust log-based anomaly detection on unstable log data. In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 807-817).”
[8]
“Q. Lin, H. Zhang, J. Lou, Y. Zhang, and X. Chen, ‘Log clustering based problem identification for online service systems,’ in ICSE (Companion Volume). ACM, 2016, pp. 102–111.”
[9]
“W. Meng, Y. Liu, Y. Zhu, S. Zhang, D. Pei, Y. Liu, Y. Chen, R. Zhang, S. Tao, P. Sun, and R. Zhou, ‘Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs,’ in IJCAI. ijcai.org, 2019, pp. 4739–4745.”
[10]
“Han, S., Wu, Q., & Yang, Y. (2022). Machine learning for Internet of things anomaly detection under low-quality data. International Journal of Distributed Sensor Networks, 18(10), 15501329221133765.”
[11]
“Granlund, O. (2019). Unsupervised anomaly detection on log-based time series data (Dissertation). Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-265534.”
[12]
“Yadav, R. B., Kumar, P. S., & Dhavale, S. V. (2020, June). A survey on log anomaly detection using deep learning. In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1215-1220). IEEE.”
[13]
“Chalapathy, R., & Chawla, S. (2019). Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407.”
[14]
“Du, M., Li, F., Zheng, G., & Srikumar, V. (2017, October). Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 1285-1298).”
[15]
“Meng, W., Liu, Y., Zhu, Y., Zhang, S., Pei, D., Liu, Y., ... & Zhou, R. (2019, August). LogAnomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs. In IJCAI (Vol. 19, No. 7, pp. 4739-4745).”
[16]
“Le, V. H., & Zhang, H. (2021, November). Log-based anomaly detection without log parsing. In 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (pp. 492-504). IEEE.”
[17]
Protogerou, A., Papadopoulos, S., Drosou, A., Tzovaras, D., & Refanidis, I. (2021). A graph neural network method for distributed anomaly detection in IoT. Evolving Systems, 12, 19-36.”
[18]
“Wang, J., Tang, Y., He, S., Zhao, C., Sharma, P. K., Alfarraj, O., & Tolba, A. (2020). LogEvent2vec: LogEvent-to-vector based anomaly detection for large-scale logs in internet of things. Sensors, 20(9), 2451.”
[19]
“Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., ... & Wang, C. (2018). Machine learning and deep learning methods for cybersecurity. Ieee access, 6, 35365-35381.”
[20]
“A. Oliner and J. Stearley, ‘What supercomputers say: A study of five system logs,’ in 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’07). IEEE, 2007, pp. 575– 584.”
[21]
“He, P., Zhu, J., Zheng, Z., & Lyu, M. R. (2017, June). Drain: An online log parsing approach with fixed depth tree. In 2017 IEEE international conference on web services (ICWS) (pp. 33-40). IEEE.”

Cited By

View all
  • (2024)Towards an Approach for Representing Log Event in Anomaly Detection2024 International Conference on Expert Clouds and Applications (ICOECA)10.1109/ICOECA62351.2024.00030(96-101)Online publication date: 18-Apr-2024
  • (2024)Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection MethodsIEEE Access10.1109/ACCESS.2024.338728712(78193-78218)Online publication date: 2024

Index Terms

  1. Anomaly Detection in Internet of Things Based on Logs Using Machine Learning and Deep Learning Techniques
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CNIOT '23: Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things
    May 2023
    1025 pages
    ISBN:9798400700705
    DOI:10.1145/3603781
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 July 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Anomaly Detection
    2. Deep Learning
    3. Internet of Things (IoT)
    4. Logs Analysis
    5. Machine Learning

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CNIOT'23

    Acceptance Rates

    Overall Acceptance Rate 39 of 82 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)75
    • Downloads (Last 6 weeks)10
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Towards an Approach for Representing Log Event in Anomaly Detection2024 International Conference on Expert Clouds and Applications (ICOECA)10.1109/ICOECA62351.2024.00030(96-101)Online publication date: 18-Apr-2024
    • (2024)Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection MethodsIEEE Access10.1109/ACCESS.2024.338728712(78193-78218)Online publication date: 2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media