Decentralized Time-Window Based Real-Time Anomaly Detection Mechanism (DTRAD) in Iot
S L Sanjith1, E. George Dharma Prakash Raj2 

1S L Sanjith, Indian Institute of Management Tiruchirappalli, Tiruchirappalli, India.
2E. George Dharma Prakash Raj, Bharathidasan University, Tiruchirappalli, India.

Manuscript received on 03 March 2019 | Revised Manuscript received on 08 March 2019 | Manuscript published on 30 July 2019 | PP: 1619-1625 | Volume-8 Issue-2, July 2019 | Retrieval Number: B2350078219/19©BEIESP | DOI: 10.35940/ijrte.B2350.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Detecting intrusions has become a mandatory service in IoT environments. This is due to the power and resource con-strained nature of the networks. This paper presents a Decentralized Time-Window based Anomaly Detection (DTRAD) model for cost and time effective intrusion detection in IoT environments. The proposed model is composed of time win-dow based training data selection module, which enables better detection and reduced bias. Training data are selected based on their temporal significance and the bag creation process is also temporally performed such that data with similar temporal signatures are grouped into same bags. The ensemble model is created and weighted voting is performed to ena-ble better results. The data reinforcement module enables new data to be appended to the training data, hence maintaining the recency of the data. Further, the entire process is decentralized, hence enabling data processing at appropriate nodes. This keeps the size of the training data low, hence reducing the computational complexity of the model to a large extent. Experiments were performed with benchmark data and comparisons were performed with recent models. Results indicate high performance of the proposed models.
Index Terms: Intrusion Detection, Temporal Data Selection, Ensemble, Bagging, Decentralization.

Scope of the Article: Data Mining