A Framework for Detecting Multiple Cyberattacks in IoT Environments
PDF
PDF

How to Cite

Mekonnen, Yonas, and Mesfin Kifle. 2025. “A Framework for Detecting Multiple Cyberattacks in IoT Environments”. Journal of Ubiquitous Computing and Communication Technologies 7 (1): 36-60. https://doi.org/10.36548/jucct.2025.1.003.

Keywords

— IoT Environments
— Cyberattacks
— Multiple Attack Detection
— CNN
— LSTM
— FFNN
Published: 10-04-2025

Abstract

The Internet of Things refers to the growing trend of embedding ubiquitous and pervasive computing capabilities through sensor networks and internet connectivity. The growth and expansion of newly evolved cyberattacks, network patterns and heterogenous nature of cyberattacks trend become the warfare across the globe and challenges to apply single layer cyberattacks detection techniques to the Internet of Things. This research work identified the lack of cyberattacks detection framework as the major gap for detection of multiple cyberattacks such as denial of services, distributed denial of services, and multiple attacks while it includes multiple parameters at the same time The proposed framework contains three primary modules; the first module is responsible for capturing and pre-processing the captured data and construction of the model, then the core engine moule orchestrates the detection of cyberattacks. The third module, notifies and displays the results in a dashboard. This research study used multiple parameters including multiple attack classes, network packet patterns, and three scalar types namely no scaler, MinMax, and Standard. Regardless of the defined parameters used minmax scaler followed by standard scaler gives better detection performance than models trained with no scaler. The proposed framework is trained and evaluated with different models including Convolutional Neural Network (CNN), Hybrid, Feed Forward Neural Networks (FFNN), and Long Short-Term Memory (LSTM) that provides a result of 91.42%, 82.75%, 78.38%, and,74.83% detection accuracy respectively where it is observed that CNN model outperforms the optimal results among followed by hybrid and FFNN.

References

  1. G. Bhandari, A. Lyth, A. Shalaginov and T.-M. Grønli, "Distributed deep neural-network-based middleware for cyber-attacks detection in Smart iot ecosystem: A novel framework and performance evaluation approach," Electronics, vol. 12, no. 2, 298, 2023.
  2. W. L. Khedr, A. E. Gouda and E. R. Mohamed, "FMDADM: A multi-layer ddos attack detection and mitigation framework using Machine Learning for stateful SDN-based IOT Networks," IEEE Access, vol. 11, 2023. 28934-28954.
  3. Nagisetty and G. P. Gupta, "Framework for detection of malicious activities in IOT networks using Keras Deep Learning Library," 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), 2019
  4. M. Bagaa, T. Taleb, J. Bernabe and A. Skarmeta, "A Machine Learning Security Framework for IOT systems," IEEE Access, vol. 8, 2020. 114066-114077.
  5. O. Vermesan, P. Friess., “Internet of Things from Research and Innovation to Market Deployment” Denmark: River Publishers, 2014, 10
  6. V. Rigworo Kebande, "Industrial internet of things (IIoT) forensics: Challenges, opportunities, and future directions," 2023.
  7. Ullah, S. M. Anwar, J. Li, L. Nadeem, T. Mahmood, A. Rehman and T. Saba, "Smart cities: The role of internet of things and machine learning in realizing a data-centric smart environment," Complex Intelligent Systems, vol. 10, no. 1, 2023. 1607-1637.
  8. S. Syed, D. Sierra-Sosa, A. Kumar and A. Elmaghraby, "IoT in Smart Cities: A Survey of Technologies, practices and challenges," Smart Cities, vol. 4, no. 2, 2021. 429-475.
  9. X. Yang, X. Wang, X. Li, D. Gu, C. Liang, K. Li, G. Zhang and J. Zhong, "Exploring emerging IoT Technologies in smart health research: A knowledge graph analysis," BMC Medical Informatics and Decision Making, vol. 20, no. 1, 2020.
  10. Y. Cheng, X. Zhao, J. Wu, H. Liu, Y. Zhao, M. Al Shurafa and I. Lee, "Research on the smart medical system based on Nb-IOT Technology," Mobile Information Systems.2021.1-10.
  11. Rejeb, K. Rejeb, H. Treiblmaier, A. Appolloni, S. Alghamdi, Y. Alhasawi and M. Iranmanesh, "The internet of things (IoT) in Healthcare: Taking Stock and moving forward," Internet of Things, vol. 22, 2023.
  12. P. High, "Forbes," Forbs, 25 November 2014.[Online]. Available: https://www.forbes.com/sites/peterhigh/2013/10/14/gartner-top-10-strategic-technology-trends-for-2014/.[Accessed 25 August 2023].
  13. P. Friess and O. Vermesan, "Internet of things applications - from research and innovation to market deployment," 2022.
  14. R. Khan, M. Kashif, R. H. Jhaveri, R. Raut, T. Saba and S. A. Bahaj, "Deep learning for intrusion detection and security of internet of things (IOT): Current analysis, challenges, and possible solutions," Security and Communication Networks,2022. 1-15.
  15. M. Catillo, A. Pecchia and U. Villano, "Botnet detection in the internet of things through all-in-one deep autoencoding," Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022.
  16. M. Burhan, R. A. Rehman, B. Khan and B.-S. Kim, "IoT elements, layered architectures and security issues: A comprehensive survey," Sensors, vol. 18, no. 9, 2018.
  17. T.-H. Nguyen and M. Yoo, "A hybrid prevention method for eavesdropping attack by link spoofing in software-defined internet of things controllers," International Journal of Distributed Sensor Networks, vol. 13, no. 11, 2017.
  18. Wood, J. Stankovic and S. Son, "Jam: A jammed-area mapping service for Sensor Networks," Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748).
  19. D. Puthal, S. Nepal, R. Ranjan and J. Chen, "Threats to networking cloud and edge datacenters in the internet of things," IEEE Cloud Computing, vol. 3, no. 3, 64-71, 2016.
  20. S. Golestani Najafabadi, H. Naji and A. Mahani, "Sybil attack detection: Improving security of WSNS for Smart Power Grid Application," 2013 Smart Grid Conference (SGC), 2013.
  21. G. S and G. B.B., "Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art," Int J Syst Assur Eng Manag, vol. 8, no. 1, 2017. 512-530.
  22. D. D., "Improved Layered Architecture for Internet of Things," Int. J. Comput. Acad. Res (IJCAR), vol. 4, 2015. 214-223.
  23. M. Hasan, M. M. Islam, M. I. Zarif and M. Hashem, "Attack and anomaly detection in IOT sensors in IoT sites using machine learning approaches," Internet of Things, vol. 7, 2019.
  24. Haldorai, A. Ramu and M. Suriya, "Organization internet of things (IoTs): Supervised, unsupervised, and reinforcement learning," Business Intelligence for Enterprise Internet of Things, 2020. 27-53.
  25. S. Rathore and J. H. Park, "Semi-supervised Learning Based Distributed Attack Detection Framework for IoT," Applied Soft Computing, vol. 72, 2018. 79-89.
  26. M. Lopez-Martin, B. Carro and A. Sanchez-Esguevillas, "Application of deep reinforcement learning to intrusion detection for supervised problems," Expert Systems with Applications, , 2020. 141.
  27. K. Yang, J. Ren, Y. Zhu and W. Zhang, "Active learning for wireless IoT intrusion detection," IEEE Wireless Communications, vol. 25, no. 6, 2018. 19-25.
  28. Bhati and C. S. Rai, "Analysis of support vector machine-based intrusion detection techniques," Arabian Journal for Science and Engineering, vol. 45, no. 4, pp., 2019.
  29. O. Jullian, B. Otero, E. Rodriguez, N. Gutierrez, H. Antona and R. Canal, "Deep-learning based detection for cyber-attacks in IoT Networks: A distributed attack detection framework," Journal of Network and Systems Management, vol. 31, no. 2, 2023. 2371-2383.
  30. J. Roldán, J. Boubeta-Puig, J. Luis Martínez and G. Ortiz, "Integrating complex event processing and machine learning: An intelligent architecture for detecting IOT security attacks," Expert Systems with Applications, vol. 149, 2020.
  31. M. Anwer, S. M. Khan, M. U. Farooq and W. Waseemullah, "Attack detection in IoT using machine learning," Engineering, Technology & Applied Science Research, vol. 11, no. 3, 7273-7278, 2021.
  32. S. Latif, Z. E. Huma, S. S. Jamal, F. Ahmed, J. Ahmad, A. Zahid, K. Dashtipour, M. U. Aftab, M. Ahmad and Q. H. Abbasi, "Intrusion Detection Framework for the internet of things using a dense random neural network," IEEE Transactions on Industrial Informatics, vol. 18, no. 9, 6435-6444, 2022.
  33. S. M. Nizamudeen, "Intelligent intrusion detection framework for multi-clouds – IoT environment using swarm-based deep learning classifier," Journal of Cloud Computing, 2023.
  34. Vom Brocke, J., Hevner, A. and Maedche, A., 2020. Introduction to design science research. Design science research. Cases, 1-13.