Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach

Senthilraja P,Kanmani Palaniappan,Brindha Duraipandi,Uma Maheswari Balasubramanian
DOI: https://doi.org/10.1007/s12083-024-01694-y
IF: 3.488
2024-05-23
Peer-to-Peer Networking and Applications
Abstract:In an era characterized by the proliferation of the Internet of Things (IoT), the seamless interconnection of diverse devices has revolutionized various sectors. However, this rapid expansion has brought forth significant security concerns, making effective anomaly detection crucial for safeguarding IoT networks. This research introduces a pioneering framework for dynamic behavioral profiling and anomaly detection in Software-Defined IoT Networks (SD-IoT). By leveraging the inherent advantages of SDN, this framework enhances the security and resilience of IoT ecosystems. Through a meticulous step-by-step process, dynamic profiles of IoT devices' behavior are generated to capture evolving attributes over time. Machine learning-based anomaly detection algorithms analyzed profiles to identify deviations from normal behavior and to effectively detect potential security threats. Anomalies detected trigger real-time policy adaptations that contain and mitigate their impact. The SDN controller enforces these adapted policies, preventing anomaly propagation and ensuring network integrity. To evaluate the framework's efficacy, extensive experiments are conducted using a comprehensive datasets in the simulated IoT environment. The results demonstrated the accuracy of dynamic behavioral profiling, the adaptability of the policy adjustments, and the efficiency of the anomaly detection algorithm. The proposed framework holds immense promise in fortifying IoT networks against emerging threats, contributing to the security and stability of our increasingly interconnected world. The comparative analyses in the performance validation showed that the proposed model attained better anomaly detection performances than other existing models.
computer science, information systems,telecommunications
What problem does this paper attempt to address?