{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T11:29:21Z","timestamp":1768822161847,"version":"3.49.0"},"reference-count":17,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDT"],"published-print":{"date-parts":[[2024,9,16]]},"abstract":"<jats:p>Anomaly detection in Intrusion Detection System (IDS) data refers to the process of identifying and flagging unusual or abnormal behavior within a network or system. In the context of IoT, anomaly detection helps in identifying any abnormal or unexpected behavior in the data generated by connected devices. Existing methods often struggle with accurately detecting anomalies amidst massive data volumes and diverse attack patterns. This paper proposes a novel approach, KDE-KL Anomaly Detection with Random Forest Integration (KRF-AD), which combines Kernel Density Estimation (KDE) and Kullback-Leibler (KL) divergence with Random Forest (RF) for effective anomaly detection. Additionally, Random Forest (RF) integration enables classification of data points as anomalies or normal based on features and anomaly scores. The combination of statistical divergence measurement and density estimation enhances the detection accuracy and robustness, contributing to more effective network security. Experimental results demonstrate that KRF-AD achieves 96% accuracy and outperforms other machine learning models in detecting anomalies, offering significant potential for enhancing network security.<\/jats:p>","DOI":"10.3233\/idt-240628","type":"journal-article","created":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T14:34:32Z","timestamp":1726842872000},"page":"2275-2287","source":"Crossref","is-referenced-by-count":0,"title":["KRF-AD: Innovating anomaly detection with KDE-KL and random forest fusion"],"prefix":"10.1177","volume":"18","author":[{"given":"G.","family":"Aarthi","sequence":"first","affiliation":[]},{"given":"S. Sharon","family":"Priya","sequence":"additional","affiliation":[]},{"given":"W. Aisha","family":"Banu","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"issue":"15","key":"10.3233\/IDT-240628_ref1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Computer Networks."},{"key":"10.3233\/IDT-240628_ref2","first-page":"100721","article-title":"Accident detection using Automotive Smart Black-Box based Monitoring system","volume":"27","author":"Josephinshermila","year":"2023","journal-title":"Measurement: Sensors."},{"issue":"1","key":"10.3233\/IDT-240628_ref3","doi-asserted-by":"crossref","first-page":"32","DOI":"10.26636\/jtit.2018.108916","article-title":"Ganging of resources via fuzzy Manhattan distance similarity with priority tasks scheduling in cloud computing","author":"Priya","year":"2018","journal-title":"Journal of Telecommunications and Information Technology."},{"issue":"3","key":"10.3233\/IDT-240628_ref5","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1108\/IJCS-09-2019-0024","article-title":"An anomaly detection method to improve the intelligent level of smart articles based on multiple group correlation probability models","volume":"3","author":"Lu","year":"2019","journal-title":"International Journal of Crowd Science."},{"key":"10.3233\/IDT-240628_ref8","first-page":"100754","article-title":"Learning impact of recent ICT advances based on virtual reality IoT sensors in a metaverse environment","volume":"27","author":"Brahma","year":"2023","journal-title":"Measurement: Sensors."},{"key":"10.3233\/IDT-240628_ref10","doi-asserted-by":"crossref","first-page":"103705","DOI":"10.1016\/j.cose.2024.103705","article-title":"Anomaly detection for space information networks: A survey of challenges, techniques, and future directions","volume":"139","author":"Diro","year":"2024","journal-title":"Computers & Security."},{"issue":"8","key":"10.3233\/IDT-240628_ref11","doi-asserted-by":"crossref","first-page":"2850","DOI":"10.1109\/TFUZZ.2021.3076265","article-title":"Detection and classification of anomalies in large datasets on the basis of information granules","volume":"30","author":"Kiersztyn","year":"2021","journal-title":"IEEE Transactions on Fuzzy Systems"},{"issue":"1","key":"10.3233\/IDT-240628_ref12","first-page":"012021","article-title":"Anomaly detection using machine learning techniques in wireless sensor networks","volume":"1743","author":"Ifzarne","year":"2021","journal-title":"In Journal of Physics: Conference Series."},{"key":"10.3233\/IDT-240628_ref14","doi-asserted-by":"crossref","first-page":"105659","DOI":"10.1016\/j.knosys.2020.105659","article-title":"K-Means-based isolation forest","volume":"195","author":"Karczmarek","year":"2020","journal-title":"Knowledge-Based Systems."},{"issue":"2","key":"10.3233\/IDT-240628_ref15","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/s10044-019-00809-z","article-title":"DBSCAN-like clustering method for various data densities","volume":"23","author":"Scitovski","year":"2020","journal-title":"Pattern Analysis and Applications."},{"key":"10.3233\/IDT-240628_ref17","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s12083-014-0321-z","article-title":"A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card","volume":"9","author":"Mishra","year":"2016","journal-title":"Peer-To-Peer Networking and Applications."},{"issue":"1","key":"10.3233\/IDT-240628_ref18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJAEC.2018010101","article-title":"Efficient golden-ball algorithm-based clustering to solve the multi-depot VRP with time windows","volume":"9","author":"Guezouli","year":"2018","journal-title":"International Journal of Applied Evolutionary Computation (IJAEC)."},{"key":"10.3233\/IDT-240628_ref19","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.procir.2022.09.065","article-title":"Extended kernel density estimation for anomaly detection in streaming data","volume":"112","author":"Rosenberger","year":"2022","journal-title":"Procedia CIRP."},{"issue":"11","key":"10.3233\/IDT-240628_ref20","doi-asserted-by":"crossref","first-page":"3985","DOI":"10.1016\/j.net.2022.06.028","article-title":"Using machine learning for anomaly detection on a system-on-chip under gamma radiation","volume":"54","author":"W\u00e4chter","year":"2022","journal-title":"Nuclear Engineering and Technology."},{"key":"10.3233\/IDT-240628_ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-020-00320-x","article-title":"A comprehensive survey of anomaly detection techniques for high dimensional big data","volume":"7","author":"Thudumu","year":"2020","journal-title":"Journal of Big Data."},{"issue":"3","key":"10.3233\/IDT-240628_ref22","first-page":"118","article-title":"A review on statistical approaches for anomaly detection in DDoS attacks","volume":"29","author":"Nooribakhsh","year":"2020","journal-title":"Information Security Journal: A Global Perspective."},{"key":"10.3233\/IDT-240628_ref23","doi-asserted-by":"crossref","first-page":"81664","DOI":"10.1109\/ACCESS.2019.2921912","article-title":"Anomaly detection, analysis and prediction techniques in iot environment: A systematic literature review","volume":"7","author":"Fahim","year":"2019","journal-title":"IEEE Access."}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDT-240628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T07:08:44Z","timestamp":1741676924000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDT-240628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,16]]},"references-count":17,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/idt-240628","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"value":"1872-4981","type":"print"},{"value":"1875-8843","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,16]]}}}