Performance Comparison of Autoencoders for Anomaly Detection in IoT, Robotics, Unmanned Vehicles in Oil Industry Systems
DOI:
https://doi.org/10.62486/978-9915-9851-0-7_202640Keywords:
Traditional Autoencoders, Quantized Autoencoders, Anomaly Detection, Robotics, Unmanned vehicles, Oil industryAbstract
Autoencoder-based models have gained popularity over the past few years due to their ability to learn effective representations of data using unsupervised learning. Traditional AEs, while being universally successful in many applications, tend to involve huge computational and memory requirements and are therefore not scal-able and cannot be deployed in real-life IoT systems. In a bid to overcome these challenges, the present study compares the Quantized Autoencoder (QAE-2024) model with a Sparse Autoencoder–Random Forest (SAE-RF) hybrid model for the purpose of improving computational efficiency and anomaly detection capabili-ties. The QAE-2024 model uses quantization methods to make the model compli-cated and compact and retain high reconstruction accuracy and powerful feature learning. The hybrid SAE-RF model brings in integration of sparse representation learning into robust classification power of Random Forests for improved accuracy and interpretability. Experimental evaluation was performed using the CIC-IoT 2023 benchmark dataset, which includes varied IoT network traffic patterns repre-sentative of smart and connected spaces, like those relevant to advanced material systems and robotic control. Results show that the SAE-RF model provides en-hanced classification precision, whereas the QAE-2024 model provides better computational efficiency and memory optimization. These results imply that au-toencoder hybrid and quantized structures provide viable solutions for real-time anomaly detection and optimization for IoT-based and Unamanned vechicles in oil industry and Robotic Systems, where precision, reliability, and effective data management are of utmost importance.
References
1. McHugh, John. 2000. "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laborato-ry." ACM Transactions on Information and System Security (TISSEC) 3, no. 4: 262–94.
2. Tavallaee, Mahbod, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani. 2009. "A Detailed Analysis of the KDD CUP 99 Dataset." In 2009 IEEE Symposium on Computational Intel-ligence for Security and Defense Applications, 1–6.
3. Moustafa, Nour, and Jill Slay. 2015. "UNSW-NB15: A Comprehensive Dataset for Net-work Intrusion Detection Systems (UNSW-NB15 Network Data Set)." In 2015 Military Communications and Information Systems Conference (MilCIS), 1–6.
4. Sharafaldin, Iman, Arash Habibi Lashkari, and Ali A. Ghorbani. 2018. "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization." In Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), 108–16.
5. Koroniotis, Nikos, Nour Moustafa, Elena Sitnikova, and Jill Slay. 2019. "Towards the De-velopment of a Realistic Botnet Dataset in the Internet of Things for Network Forensic Ana-lytics: Bot-IoT Dataset." Future Generation Computer Systems 100: 779–96.
6. Garcia, Sebastian, A. Pechoucek, and M. J. Erquiaga. 2020. "IoT-23 Dataset: A Labeled Da-taset of Malware and Benign IoT Traffic." Stratosphere IPS.
7. Thudumu, Suresh, Peter Branch, Jin Jin, and Joseph Chicharo. 2020. "Estimation of Locally Relevant Subspace in High-Dimensional Data." In Proceedings of the Australasian Comput-er Science Week Multiconference, 1–6.
8. Yang, Lei, Nadjib Moubayed, and Abdallah Shami. 2021. "MTH-IDS: A Multitiered Hy-brid Intrusion Detection System for the Internet of Vehicles." IEEE Internet of Things Jour-nal 9, no. 1: 616–32.
9. Dutt, Indrajit, Sidhartha Borah, and Indranil Kumar Maitra. 2020. "Immune System-Based Intrusion Detection System (IS-IDS): A Proposed Model." IEEE Access 8: 34929–41.
10. Eskandari, Mohsen, Zubair H. Janjua, Massimo Vecchio, and others. 2020. "Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices." IEEE In-ternet of Things Journal 7, no. 8: 6882–97.
11. Shyla, Shashank, Vijay Bhatnagar, and Vishal Bali. 2022. "Optimization of Intrusion Detec-tion Systems Determined by Ameliorated HNADAM-SGD Algorithm." Electronics 11, no. 4: 507.
12. Ogundokun, Rasheed O., John B. Awotunde, Peter Sadiku, and others. 2021. "An En-hanced Intrusion Detection System Using Particle Swarm Optimization Feature Extraction Technique." Procedia Computer Science 193: 504–12.
13. Tang, Chao, Nursima Luktarhan, and Ying Zhao. 2020. "SAAE-DNN: Deep Learning Method on Intrusion Detection." Symmetry 12, no. 10: 1695.
14. Popoola, Sunday I., Babajide Adebisi, Madjid Hammoudeh, and others. 2020. "Hybrid Deep Learning for Botnet Attack Detection in Internet of Things Networks." IEEE Internet of Things Journal.
15. Zhang, Cheng, Jing Liu, Wei Chen, and others. 2021. "Unsupervised Anomaly Detection Based on Deep Autoencoding and Clustering." Security and Communication Networks.
16. Predić, Bojan, Uroš Vukić, and Marko Saračević. 2022. "The Possibility of Combining and Implementing Deep Neural Network Compression Methods." Axioms 11, no. 5: 229.
17. Otoum, Yaser, and Ashfaq Nayak. 2021. "AS-IDS: Anomaly and Signature-Based IDS for the Internet of Things." Journal of Network and Systems Management 29: 1–26.
18. Saba, Tanzila, Atif Rehman, Tarek Sadad, and others. 2022. "Anomaly-Based Intrusion De-tection System for IoT Networks Through a Deep Learning Model." Computers & Electrical Engineering 99: 107810.
19. Gong, Cheng, Yong Chen, and Yu Lu. 2020. "VecQ: Minimal Loss DNN Model Compres-sion with Vectorized Weight Quantization." IEEE Transactions on Computers 70, no. 5: 696–710.
20. Hu, Peng, Xiaolong Peng, Hong Zhu, and others. 2021. "Opq: Compressing Deep Neural Networks with One-Shot Pruning Quantization." In Proceedings of the AAAI Conference on Artificial Intelligence.
21. Anwar, Saeed, Kyung Hoon Hwang, and Wonyong Sung. 2017. "Structured Pruning of Deep Convolutional Neural Networks." ACM Journal on Emerging Technologies in Com-puting Systems (JETC) 13, no. 3: 1–18.
22. Zeng, Li, Shijun Chen, and Shengsheng Zeng. 2019. "An Efficient End-to-End Channel-Level Pruning Method for Deep Neural Networks Compression." In 2019 IEEE 10th Inter-national Conference on Software Engineering and Service Science (ICSESS), 43–46.
23. Fang, Xiaojing, Haoliang Liu, and Guoliang Xie. 2020. "Deep Neural Network Compres-sion Method Based on Product Quantization." In 2020 39th Chinese Control Conference (CCC), 7035–40.
24. Sharmila, B. S., and R. Nagapadma. 2023. "Quantized Autoencoder (QAE) Intrusion Detec-tion System for Anomaly Detection in Resource-Constrained IoT Devices Using RT-IoT2022 Dataset." Springer Open Cybersecurity 6: 41.
25. Neto, Euclides Carlos Pinto, Sajjad Dadkhah, Raphael Ferreira, Alireza Zohourian, Rongxing Lu, and Ali A. Ghorbani. "CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment." Sensors 23, no. 13 (2023): 5941.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 S Nethaji Naren Reddy, Manu Elappila, Cherukuri Ravindranath Chowdary, Christo Ananth, V.H. Abdullayev (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
The article is distributed under the Creative Commons Attribution 4.0 License. Unless otherwise stated, associated published material is distributed under the same licence.