Network Attack and Anomaly Detection in IoT Devices

Authors

  • V. S. Chaithra Assistant Professor, Department of CSE-AIML, Sapthagiri NPS University, Bangalore, India
  • M. S. Vikas Assistant Professor, Department of CSE-AIML, Sambhram Institute of Technology, Bangalore, India
  • N. S. Sowmya Assistant Professor, Department of CSE-AIML, Sapthagiri NPS University, Bangalore, India
  • B. Pankaja Assistant Professor, Department of CSE-AIML, Sapthagiri NPS University, Bangalore, India

Abstract

In recent years, there has been a significant increase in the use of Internet of Things (IoT) devices in Australia, ranging from simple household appliances like smart furniture and lighting systems to complex machinery and industrial equipment. With the proliferation of IoT, network attacks and anomalies have increasingly come under scrutiny. Especially, the recent network security incidents involving Australian companies have highlighted the importance of attack or anomaly detection. The IoT refers to a network of physical devices, vehicles, and home appliances embedded with sensors, software, and connectivity capabilities, which can collect and exchange data without direct human intervention and communicate through the internet or other networks. With the development of IoT, fog computing has emerged as an important concept, providing computing and storage services at the edge of the network. Fog computing processes data close to the data source, reducing the burden on centralized cloud computing and enhancing the speed and efficiency of data processing. This is particularly applicable to real-time data analysis and processing, playing a significant role in data management and security monitoring within IoT environments.

Downloads

Download data is not yet available.

Downloads

Published

15-08-2025

Issue

Section

Articles

How to Cite

[1]
V. S. Chaithra, M. S. Vikas, N. S. Sowmya, and B. Pankaja, “Network Attack and Anomaly Detection in IoT Devices”, IJRESM, vol. 8, no. 8, pp. 15–19, Aug. 2025, Accessed: Aug. 19, 2025. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/3332