Anomaly classification in IIoT edge devices
DOI:
https://doi.org/10.17533/udea.redin.20250368Keywords:
Anomaly detection, anomaly classification, neural networks, Industrial Internet of Things.Abstract
An early Industrial Internet of Things (IIoT) Anomaly Detection reduces maintenance costs, minimizes machine downtime, increases safety, and improves product quality. A multi-class classifier that detects events, failures, or attacks is much more efficient than a simple binary classifier, as it relieves a human operator of the task of identifying anomaly causes, thereby avoiding wasted time that could compromise process performance and security. With these issues in mind, this paper aims to determine whether it can differentiate between a failure that generates a temperature increase in an IIoT device processor, a denial-of-service attack on an MQTT broker, and an event caused by an application executing on the IIoT edge device. Data used to perform the classification comes from a Raspberry Pi 3, specifically from its CPU (e.g., temperature, load,
free memory, Wi-Fi sent and received packets). A k-nearest neighbors (KNN), random forest (RF), support vector machine (SVM), and Multilayer Perceptron (MLP) algorithms were trained. Considering metrics such as false positive rate, false negative rate, accuracy, F1-score, and execution time, we concluded that SVM and MLP were the best methods for the case study because of their accuracy (78.6 and 76.1, respectively) and low execution time (17.3ms and 0.35ms).
Downloads
References
S. Alexandra and M. Vitaliy, “Approaches for data
collection and process standardization in smart
manufacturing: systematic literature review,” Journal
of Industrial Information Integration, p. 100578, 2024.
A. Angelopoulos, E. T. Michailidis, N. Nomikos,
P. Trakadas, A. Hatziefremidis, S. Voliotis, and
T. Zahariadis, “Tackling faults in the industry 4.0 era—a
survey of machine-learning solutions and key aspects,”
Sensors, vol. 20, no. 1, p. 109, 2019.
C. Ni and S. C. Li, “Machine learning enabled industrial
iot security: Challenges, trends and solutions,” Journal of
Industrial Information Integration, p. 100549, 2024.
E. Luján, A. Otero, S. Valenzuela, E. Mocskos, L. A.
Steffenel, and S. Nesmachnow, “An integrated platform for
smart energy management: the cc-sem project,” Revista
Facultad de Ingeniería Universidad de Antioquia, no. 97,
pp. 41–55, 2020.
M. Chen, S. Mao, and Y. Liu, “Big data: A survey,” Mobile
networks and applications, vol. 19, no. 2, pp. 171–209, 2014.
A. Karkouch, H. Mousannif, H. Al Moatassime, and
T. Noel, “Data quality in internet of things: A
state-of-the-art survey,” Journal of Network and Computer
Applications, vol. 73, pp. 57–81, 2016.
N. Ghosh, K. Maity, R. Paul, and S. Maity, “Outlier
detection in sensor data using machine learning techniques
for iot framework and wireless sensor networks: A brief
study,” in 2019 International Conference on Applied
Machine Learning (ICAML). IEEE, 2019, pp. 187–190.
N. Mohamudally and M. Peermamode-Mohaboob,
“Building an anomaly detection engine (ade) for iot
smart applications,” Procedia computer science, vol. 134,
pp. 10–17, 2018.
S. Afroz, S. A. Islam, S. N. Rafa, and M. Islam, “A two layer
machine learning system for intrusion detection based on
random forest and support vector machine,” in 2020 IEEE
International Women in Engineering (WIE) Conference
on Electrical and Computer Engineering (WIECON-ECE).
IEEE, 2020, pp. 300–303.
N. Moustafa, N. Koroniotis, M. Keshk, A. Y. Zomaya, and
Z. Tari, “Explainable intrusion detection for cyber defences
in the internet of things: Opportunities and solutions,”
IEEE Communications Surveys & Tutorials, 2023.
Y. Wang, M. Perry, D. Whitlock, and J. W. Sutherland,
“Detecting anomalies in time series data from a
manufacturing system using recurrent neural networks,”
Journal of Manufacturing Systems, 2020.
G. Tertytchny, N. Nicolaou, and M. K. Michael,
“Classifying network abnormalities into faults and attacks
in iot-based cyber physical systems using machine learning,”
Microprocessors and Microsystems, vol. 77, p. 103121,
M. Rodríguez, D. P. Tobón, and D. Múnera, “Anomaly
classification in industrial internet of things: A review,”
Intelligent Systems with Applications, p. 200232, 2023.
Z.-X. Guo and P.-L. Shui, “Anomaly based sea-surface small
target detection using k-nearest neighbor classification,”
IEEE Transactions on Aerospace and Electronic Systems,
vol. 56, no. 6, pp. 4947–4964, 2020.
S. Rani, K. Tripathi, Y. Arora, and A. Kumar, “Analysis
of anomaly detection of malware using knn,” in 2022
nd International Conference on Innovative Practices in
Technology and Management (ICIPTM), vol. 2. IEEE,
, pp. 774–779.
A. Abid, A. Kachouri, A. B. F. Guiloufi, A. Mahfoudhi,
N. Nasri, and M. Abid, “Centralized knn anomaly
detector for wsn,” in 2015 IEEE 12th International
Multi-Conference on Systems, Signals & Devices (SSD15).
IEEE, 2015, pp. 1–4.
P. Naraei, A. Abhari, and A. Sadeghian, “Application of
multilayer perceptron neural networks and support vector
machines in classification of healthcare data,” in 2016
Future Technologies Conference (FTC). IEEE, 2016, pp.
–852.
S. Shakya and S. Sigdel, “An approach to develop a hybrid
algorithm based on support vector machine and naive bayes
for anomaly detection,” in 2017 International Conference
on Computing, Communication and Automation (ICCCA).
IEEE, 2017, pp. 323–327.
Scikit-Learn, “sklearn.svm.SVC,” https://scikit-learn.org/
stable/modules/generated/sklearn.svm.SVC.html, 2022,
[Online; accessed 10-August-2022].
T.-H. Lin and J.-R. Jiang, “Anomaly detection with
autoencoder and random forest,” in 2020 International
Computer Symposium (ICS). IEEE, 2020, pp. 96–99.
K. Bhuva, K. Srivastava et al., “Comparative study of the
machine learning techniques for predicting the employee
attrition,” IJRAR-International Journal of Research and
Analytical Reviews (IJRAR), vol. 5, no. 3, pp. 568–577,
R. Porteiro, L. Hernández-Callejo, and S. Nesmachnow,
“Electricity demand forecasting in industrial and residential
facilities using ensemble machine learning,” Revista
Facultad de Ingeniería Universidad de Antioquia, no. 102,
pp. 9–25, 2022.
Y.-C. Lai, K.-Z. Zhou, S.-R. Lin, and N.-W. Lo,
“F1ow-based anomaly detection using multilayer
perceptron in software defined networks,” in 2019
nd International Convention on Information
and Communication Technology, Electronics and
Microelectronics (MIPRO). IEEE, 2019, pp. 1154–1158.
H. Zhang, S. Shen, and Y. Shen, “Power system transient
stability evaluation based on multilayer perceptron neural
network,” in 2021 China Automation Congress (CAC).
IEEE, 2021, pp. 3313–3316.
T. Huuhtanen and A. Jung, “Anomaly location detection
with electrical impedance tomography using multilayer
perceptrons,” in 2020 IEEE 30th International Workshop
on Machine Learning for Signal Processing (MLSP).
IEEE, 2020, pp. 1–6.
L. Van Efferen and A. M. Ali-Eldin, “A multi-layer
perceptron approach for flow-based anomaly detection,” in
international symposium on networks, computers and
communications (ISNCC). IEEE, 2017, pp. 1–6.
S. Ranjeeth, V. A. K. Kandimalla et al., “Predicting
diabetes using outlier detection and multilayer perceptron
with optimal stochastic gradient descent,” in 2020
IEEE India Council International Subsections Conference
(INDISCON). IEEE, 2020, pp. 51–56.
X.-J. Shen, Y. Dong, J.-P. Gou, Y.-Z. Zhan, and J. Fan,
“Least squares kernel ensemble regression in reproducing
kernel hilbert space,” Neurocomputing, vol. 311, pp.
–244, 2018.
B. B. Hazarika, D. Gupta, and P. Borah, “An
intuitionistic fuzzy kernel ridge regression classifier for
binary classification,” Applied Soft Computing, vol. 112, p.
, 2021.
S. Akila and U. S. Reddy, “Credit card fraud detection
using non-overlapped risk based bagging ensemble (nrbe),”
in 2017 IEEE international conference on computational
intelligence and computing research (ICCIC). IEEE, 2017,
pp. 1–4.
Y. Zahid, M. A. Tahir, and M. N. Durrani, “Ensemble
learning using bagging and inception-v3 for anomaly
detection in surveillance videos,” in 2020 IEEE
International Conference on Image Processing (ICIP).
IEEE, 2020, pp. 588–592.
X. Berger, “RPi-Monitor,” https://xavierberger.github.
io/RPi-Monitor-docs/index.html, 2018, [Online; accessed
-August-2022].
Y. Lu, S. Chai, Y. Suo, F. Yao, and C. Zhang, “Intrusion
detection for industrial internet of things based on deep
learning,” Neurocomputing, vol. 564, p. 126886, 2024.
Scikit-Learn, “sklearn-linear model Ridge,” https:
//scikit-learn.org/stable/modules/generated/sklearn.
linear_model.Ridge.html, 2022, [Online; accessed
-August-2022].
——, “Sklearn.ensemble.BaggingClassifier,” https:
//scikit-learn.org/stable/modules/generated/sklearn.
ensemble.BaggingClassifier.html, 2022, [Online; accessed
-August-2022].
RStudioCloud, “RStudio Cloud,” https://rstudio.cloud/,
, [Online; accessed 10-July-2022].
G. Prashanth, V. Prashanth, P. Jayashree, and
N. Srinivasan, “Using random forests for network-based
anomaly detection at active routers,” in 2008 International
Conference on Signal Processing, Communications and
Networking. IEEE, 2008, pp. 93–96
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Revista Facultad de Ingeniería Universidad de Antioquia

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Revista Facultad de Ingeniería, Universidad de Antioquia is licensed under the Creative Commons Attribution BY-NC-SA 4.0 license. https://creativecommons.org/licenses/by-nc-sa/4.0/deed.en
You are free to:
Share — copy and redistribute the material in any medium or format
Adapt — remix, transform, and build upon the material
Under the following terms:
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
The material published in the journal can be distributed, copied and exhibited by third parties if the respective credits are given to the journal. No commercial benefit can be obtained and derivative works must be under the same license terms as the original work.