{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:11:10Z","timestamp":1772118670200,"version":"3.50.1"},"reference-count":10,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T00:00:00Z","timestamp":1736294400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Recently, due to their application nature, devices in the Internet of Things (IoT) networks also need to be involved in the cloud. IoT devices generally work on top of the Internet, whereas today, the Internet is called a cloud because it provides an uncountable number of services to the public. Software, Platform, Infrastructure, and Service are the base classes of cloud services that support IoT devices. It is well known that the security level of the cloud is deficient because anyone can access it from anywhere at any strategy. Like the cloud, IoT networks also permit any device to join anytime from anywhere. This vulnerability of IoT networks is a cause for concern, and various conventional and optimisation methods have proposed multiple algorithms for increasing the IoT Cloud's security level, which have been developed for particular applications. This problem is solved by thoroughly examining the IoT devices, user information, and meta\u2010information to detect anomalies in the cloud applications, ensuring the validity and effectiveness of our proposed solution. The IoT network is analyzed using an NS2 simulator, and machine learning algorithms carry out the data analytics to select the best one that outperforms the others in anomaly detection. The machine learning algorithms were implemented in Python and experimented with it to check their efficiency.<\/jats:p>","DOI":"10.1002\/itl2.642","type":"journal-article","created":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T01:48:36Z","timestamp":1736387316000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection System for Users and Devices Involved in Internet of Things Integrated Cloud Applications Using Machine Algorithms"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4235-3164","authenticated-orcid":false,"given":"S.","family":"Mirdula","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Faculty of Engineering and Technology SRM Institute of Science and Technology  Chennai Tamil Nadu India"}]},{"given":"M.","family":"Roopa","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Faculty of Engineering and Technology SRM Institute of Science and Technology  Chennai Tamil Nadu India"}]}],"member":"311","published-online":{"date-parts":[[2025,1,8]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-021-00298-7"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3325929"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23198286"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/s24061968"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01567-8"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101063"},{"key":"e_1_2_7_8_1","doi-asserted-by":"crossref","unstructured":"D.Kwon K.Natarajan S. C.Suh H.Kim andJ.Kim \u201cAn Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks \u201d2018In2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)(pp. 1595\u20131598). IEEE.","DOI":"10.1109\/ICDCS.2018.00178"},{"key":"e_1_2_7_9_1","doi-asserted-by":"crossref","unstructured":"Q.Schueller K.Basu M.Younas M.Patel andF.Ball \u201cA Hierarchical Intrusion Detection System Using Support Vector Machine for SDN Network in Cloud Data Center \u201d2018In2018 28th International Telecommunication Networks and Applications Conference (ITNAC)(pp. 1\u20136). IEEE.","DOI":"10.1109\/ATNAC.2018.8615255"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19112451"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6343705"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T12:19:54Z","timestamp":1762777194000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,8]]},"references-count":10,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/itl2.642"],"URL":"https:\/\/doi.org\/10.1002\/itl2.642","archive":["Portico"],"relation":{"has-review":[{"id-type":"doi","id":"10.1002\/ITL2.642\/v1\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.642\/v1\/review2","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.642\/v2\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.642\/v1\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.642\/v2\/review2","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.642\/v2\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.642\/v2\/response1","asserted-by":"object"}]},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"value":"2476-1508","type":"print"},{"value":"2476-1508","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,8]]},"assertion":[{"value":"2024-07-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e642"}}