Using Machine Learning Techniques to Solve the IoT Security Problem

The scale and complexity of networks supporting IoT will quickly outstrip human capabilities to defend them. Devices can be elusive; they will hide behind gateways and roaming arrangements. The challenge is how to monitor and learn the behavior of the different classes of devices. IoT devices are like flocks of birds: they move in large groups in the same direction; when one deviates, usually the rest of the group deviates. We can use unsupervised machine learning techniques with a 5-step process to help solve the IoT Security problem. 1. Observe; 2. Cluster; 3. Detect Anomalies; 4. Root Cause Analysis; 5. Remediate.
In this video, DCS talks to ToffeeX at TechExGlobal 2025.
Maria Mohr, Global Presales Sustainability Lead at Dell Technologies, and Sarwar Khan,...
In this video, DCS talks to Barbara at TechExGlobal 2025.
In this video, DCS talks to Edge Impulse at TechExGlobal 2025.
In this video, DCS talks to Nasuni at TechExGlobal 2025.
Vicky Critchley, CEO of Truly SMB, explains how this recently launched, forward-thinking tech...
James Hodge, GVP & Chief Strategy Advisor at Splunk and member of the TechUK AI Committee,...
Taggart Matthiesen, Chief Product Officer of LogicMonitor, discusses the findings of the...