Behavioral Anomaly Detection in IoT Networks Using Artificial Intelligence

Prepared By Editor-in-Chief

International Journal of Innovative Solutions in Engineering is published semi-annually.

ISSN: 3029-3200

Citations (Crossref, OpenAlex):
Karla Fišić* , Mila Matijević and Matej Kvesić

Full text:

This article belongs to Vol. 2 No. 2, 2026

K. Fišić, M. Matijević, and M. Kvesić, “Behavioral Anomaly Detection in IoT Networks Using Artificial Intelligence,” International Journal of Innovative Solutions in Engineering, vol. 2, no. 2, pp. 27–37, doi: 10.47960/3029-3200.2026.2.2.27.

pages 27-37

Download a citation file:

Preview and download a citation file in BibTex format that can be imported by citation management software, including Mendeley, EndNote, ProCite, RefWorks, and Reference Manager.

This article is archived in Zenodo

Zenodo Archive DOI: 10.5281/zenodo.20177814

Abstract

Keywords

ijise ID

Publication Date

References

  1. Statista, “Number of Internet of Things (IoT) connected devices worldwide from 2019 to 2030”, 2025. Accessed: Jan. 05, 2026. [Online]. Available: https://www.statista.com/topics/2637/internet-of-things/
  2. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications,” IEEE Commun. Surv. Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015, doi: https://doi.org/10.1109/COMST.2015.2444095.
  3. M. Antonakakis et al., “Understanding the Mirai Botnet”, in Proceedings of the 26th USENIX Security Symposium, 2017, pp. 1093-1110. Accessed: Jan. 05, 2026. [Online]. Available: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
  4. D. Bank, N. Koenigstein, and R. Giryes, “Autoencoders,” 2020, arXiv. doi: https://doi.org/10.48550/ARXIV.2003.05991.
  5. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet Things J., vol. 4, no. 5, pp. 1125–1142, Oct. 2017, doi: https://doi.org/10.1109/JIOT.2017.2683200.
  6. A. Banks and R. Gupta, “MQTT Version 3.1.1”, OASIS Standard, 2014. Accessed: Jan. 06, 2026. [Online]. Available: https://docs.oasis-open.org/mqtt/mqtt/v3.1.1/mqtt-v3.1.1.pdf
  7. A. Sivanathan et al., “Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics,” IEEE Trans. on Mobile Comput., vol. 18, no. 8, pp. 1745–1759, Aug. 2019, doi: https://doi.org/10.1109/TMC.2018.2866249.
  8. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM Comput. Surv., vol. 41, no. 3, pp. 1–58, Jul. 2009, doi: https://doi.org/10.1145/1541880.1541882.
  9. M. Ahmed, A. Naser Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19–31, Jan. 2016, doi: https://doi.org/10.1016/j.jnca.2015.11.016.
  10. R. Sommer and V. Paxson, “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection,” in 2010 IEEE Symposium on Security and Privacy, May 2010, pp. 305–316. doi: https://doi.org/10.1109/SP.2010.25.
  11. C. Zhou and R. C. Paffenroth, “Anomaly Detection with Robust Deep Autoencoders,” in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax NS Canada: ACM, Aug. 2017, pp. 665–674. doi: https://doi.org/10.1145/3097983.3098052.
  12. G. E. Hinton and R. R. Salakhutdinov, “Reducing the Dimensionality of Data with Neural Networks,” Science, vol. 313, no. 5786, pp. 504–507, Jul. 2006, doi: https://doi.org/10.1126/science.1127647.
  13. M. Sakurada and T. Yairi, “Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction,” in Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis, Gold Coast Australia QLD Australia: ACM, Dec. 2014, pp. 4–11. doi: https://doi.org/10.1145/2689746.2689747.
  14. D. P. Kingma and M. Welling, “Auto-Encoding Variational Bayes,” 2013, arXiv. doi: https://doi.org/10.48550/ARXIV.1312.6114.
  15. P. Malhotra, A. Ramakrishnan, G. Anand, L. Vig, P. Agarwal, and G. Shroff, “LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection,” 2016, arXiv. doi: https://doi.org/10.48550/ARXIV.1607.00148.
  16. N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A Deep Learning Approach to Network Intrusion Detection,” IEEE Trans. Emerg. Top. Comput. Intell., vol. 2, no. 1, pp. 41–50, Feb. 2018, doi: https://doi.org/10.1109/TETCI.2017.2772792.
  17. H. Hindy, C. Tachtatzis, R. Atkinson, E. Bayne and X. Bellekens, “MQTT-IoT-IDS2020: MQTT Internet of Things Intrusion Detection Dataset”, IEEE DataPort, Jun. 23, 2020, doi: 10.21227/bhxy-ep04 Accessed: Dec. 02, 2025. [Online]. Available: https://ieee-dataport.org/open-access/mqtt-iot-ids2020-mqtt-internet-things-intrusion-detection-dataset
  18. D. Dinculeană and X. Cheng, “Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices,” Applied Sciences, vol. 9, no. 5, p. 848, Feb. 2019, doi: https://doi.org/10.3390/app9050848.
  19. F. T. Liu, K. M. Ting, and Z.-H. Zhou, “Isolation Forest,” in 2008 Eighth IEEE International Conference on Data Mining, Dec. 2008, pp. 413–422. doi: https://doi.org/10.1109/ICDM.2008.17.
  20. B. Schölkopf, R. C. Williamson, A. J. Smola, J. Shawe-Taylor, and J. C. Platt, “Support Vector Method for Novelty Detection”, in Advances in Neural Information Processing Systems (NIPS 1999), pp. 582-588, 1999. Accessed: Apr. 06, 2026. [Online]. Available: https://papers.nips.cc/paper_files/paper/1999/hash/8725fb777f25776ffa9076e44fcfd776-Abstract.html
  21. Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, “Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection,” 2018, arXiv. doi: https://doi.org/10.48550/ARXIV.1802.09089.
  22. S. Chesney and K. Roy, “AI Empowered Intrusion Detection for MQTT Networks,” in 2022 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa: IEEE, Aug. 2022, pp. 1–6. doi: https://doi.org/10.1109/icABCD54961.2022.9856124.
  23. M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network Anomaly Detection: Methods, Systems and Tools,” IEEE Commun. Surv. Tutorials, vol. 16, no. 1, pp. 303–336, 2014, doi: https://doi.org/10.1109/SURV.2013.052213.00046.