Indian Machinery and Transport Equipment Exports - Forecasting with External Factors Using Chain of Hybrid Sarimax-Garch Model
Volume-5 | Issue-2

Enhancing Road Safety: A Driver Fatigue Detection and Behaviour Monitoring System using Advanced Computer Vision Techniques
Volume-6 | Issue-2

Green Lights Ahead: An IoT Solution for Prioritizing Emergency Vehicles
Volume-5 | Issue-3

Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2

Smart Farming: Enhancing Network Infrastructure for Agricultural Sustainability
Volume-6 | Issue-1

Predictive Analytics with Data Visualization
Volume-4 | Issue-2

Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2

Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2

Blockchain Framework for Communication between Vehicle through IoT Devices and Sensors
Volume-3 | Issue-2

Split-Capacitor Five-Level Transformerless Grid Connected Single Phase PV System using Level Shifted PWM Technique
Volume-4 | Issue-1

Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3

Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2

Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2

Construction of a Framework for Selecting an Effective Learning Procedure in the School-Level Sector of Online Teaching Informatics
Volume-3 | Issue-4

Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2

Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2

Characterizing WDT subsystem of a Wi-Fi controller in an Automobile based on MIPS32 CPU platform across PVT
Volume-2 | Issue-4

Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4

Design of Data Mining Techniques for Online Blood Bank Management by CNN Model
Volume-3 | Issue-3

Ethereum and IOTA based Battery Management System with Internet of Vehicles
Volume-3 | Issue-3

Home / Archives / Volume-7 / Issue-1 / Article-3

Volume - 7 | Issue - 1 | march 2025

A Framework for Detecting Multiple Cyberattacks in IoT Environments Open Access
Yonas Mekonnen  , Mesfin Kifle  88
Pages: 36-60
Cite this article
Mekonnen, Yonas, and Mesfin Kifle. "A Framework for Detecting Multiple Cyberattacks in IoT Environments." Journal of Ubiquitous Computing and Communication Technologies 7, no. 1 (2025): 36-60
Published
10 April, 2025
Abstract

The Internet of Things refers to the growing trend of embedding ubiquitous and pervasive computing capabilities through sensor networks and internet connectivity. The growth and expansion of newly evolved cyberattacks, network patterns and heterogenous nature of cyberattacks trend become the warfare across the globe and challenges to apply single layer cyberattacks detection techniques to the Internet of Things. This research work identified the lack of cyberattacks detection framework as the major gap for detection of multiple cyberattacks such as denial of services, distributed denial of services, and multiple attacks while it includes multiple parameters at the same time The proposed framework contains three primary modules; the first module is responsible for capturing and pre-processing the captured data and construction of the model, then the core engine moule orchestrates the detection of cyberattacks. The third module, notifies and displays the results in a dashboard. This research study used multiple parameters including multiple attack classes, network packet patterns, and three scalar types namely no scaler, MinMax, and Standard. Regardless of the defined parameters used minmax scaler followed by standard scaler gives better detection performance than models trained with no scaler. The proposed framework is trained and evaluated with different models including Convolutional Neural Network (CNN), Hybrid, Feed Forward Neural Networks (FFNN), and Long Short-Term Memory (LSTM) that provides a result of 91.42%, 82.75%, 78.38%, and,74.83% detection accuracy respectively where it is observed that CNN model outperforms the optimal results among followed by hybrid and FFNN.

Keywords

IoT Environments Cyberattacks Multiple Attack Detection CNN LSTM FFNN

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here