Anomaly traffic detection in smart home using insight from exploratory data analysis

Apejoye, O ORCID logoORCID: https://orcid.org/0009-0008-3463-3320, Wali, A, Ma, X ORCID logoORCID: https://orcid.org/0000-0003-0074-4192, He, J ORCID logoORCID: https://orcid.org/0000-0002-5616-4691 and Ajienka, N ORCID logoORCID: https://orcid.org/0000-0002-8792-282X, 2025. Anomaly traffic detection in smart home using insight from exploratory data analysis. In: Jararweh, Y, Alsmirat, M and Lloret, J, eds., 2024 4th Intelligent Cybersecurity Conference (ICSC). IEEE, pp. 110-117. ISBN 9798350354782

[thumbnail of 2521503_Ma.pdf] Text
2521503_Ma.pdf - Post-print
Full-text access embargoed until 25 February 2027.

Download (510kB)

Abstract

The use of IoT devices is widespread across various industries. Yet, they often fall victim to cyberattacks such as creating botnets, hacked to obtain sensitive information about the lifestyle of the user, etc. To adequately safeguard them, understanding their behavioural patterns is crucial in detecting and preventing these attacks. This project utilises exploratory data analysis to analyse the network traffic of smart home IoT devices to gain insight into the fundamental network traffic characteristics and behavioural patterns of these devices. Several data visualisation methods were explored to present the result of the analysis. The insights from the EDA were used to inform the statistical attributes extracted from the network traffic to generate flow data. Three novelty detection models were trained using this data, with the Local Outlier Factor model being selected as the top performer, boasting a remarkable 99.87% overall accuracy and zero false negative rate. The main contributions of this study are threefold. Firstly, it provides valuable insights into the typical behavioural patterns of smart home network traffic. Secondly, it sheds light on the features that can be extracted from network traffic to build a robust machine learning or deep learning model for an intrusion detection system. Finally, it developed a novel detection model for intrusion detection systems.

Item Type: Chapter in book
Description: Paper presented at 4th Intelligent Cybersecurity Conference (ICSC), Valencia, Spain, 17-20 September 2024.
Creators: Apejoye, O., Wali, A., Ma, X., He, J. and Ajienka, N.
Publisher: IEEE
Date: 25 February 2025
ISBN: 9798350354782
Identifiers:
Number
Type
10.1109/icsc63108.2024.10894864
DOI
2521503
Other
Rights: © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Divisions: Schools > School of Science and Technology
Record created by: Laura Borcherds
Date Added: 28 Nov 2025 09:01
Last Modified: 28 Nov 2025 09:01
URI: https://irep.ntu.ac.uk/id/eprint/54819

Actions (login required)

Edit View Edit View

Statistics

Views

Views per month over past year

Downloads

Downloads per month over past year