Development of A Machine Learning-Based Security Module for Detecting Exploit-Type Attacks in IoT Networks
-
https://doi.org/10.14419/6m5nbj91
Received date: June 9, 2025
Accepted date: July 19, 2025
Published date: July 25, 2025
-
Machine Learning; IoT Networks; Security Module; Exploit-Type Attacks -
Abstract
This study investigated the effectiveness of a two-layer neural network (NN) model in detecting malicious-based cyberattacks. The model showed strong classification performance with 0.92 precision, 0.965 recall, and F1 score of 0.92. The SMOTE (Synthetic Minority Over-sampling Technique) method was used to solve the class imbalance problem, which greatly improved the prediction ability of the model. In addition, OneHotEncoding was used to convert categorical variables into binary format, which further improved the accuracy of the model. The results demonstrate the potential of deep learning methods, especially NNs, for cybersecurity tasks, demonstrating their ability to accurately detect complex and deep patterns of malicious usage.
-
References
- Alosaimi, S., & Almutairi, S. M. (2023). An intrusion detection system using BoT-IoT. Applied Sciences, 13(9), 5427. https://doi.org/10.3390/app13095427.
- Damaševičius, R., Bacanin, N., & Misra, S. (2023). From sensors to safety: Internet of Emergency Services (IoES) for emergency response and dis-aster management. Journal of Sensor and Actuator Networks, 12, 41. https://doi.org/10.3390/jsan12030041.
- Yogesh, K. M., Stephan, T., Bharath, M. B., Gad, I., Arpitha, S., & Prakash, M. M. (2023). Characterization of darknet traffic detection using time domain features. In Proceedings of the International Conference on Computer Vision and Internet of Things (ICCVIoT’T) (pp. 233–237). https://doi.org/10.1049/icp.2023.2881.
- Alotaibi, B. (2023). A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportuni-ties. Sensors, 23, 7470. https://doi.org/10.3390/s23177470.
- Srinivasan, S., & Deepalakshmi, P. (2023). Enhancing the security in cyberworld by detecting the botnets using ensemble classification based ma-chine learning. Measurement: Sensors, 25, 100624. https://doi.org/10.1016/j.measen.2022.100624.
- Ju, Z., Zhang, H., Li, X., Chen, X., Han, J., & Yang, M. (2022). A survey on attack detection and resilience for connected and automated vehicles: From vehicle dynamics and control perspective. IEEE Transactions on Intelligent Vehicles, 7, 815–837. https://doi.org/10.1109/TIV.2022.3186897.
- Bahashwan, A. A., Anbar, M., Manickam, S., Al-Amiedy, T. A., Aladaileh, M. A., & Hasbullah, I. H. (2023). A systematic literature review on ma-chine learning and deep learning approaches for detecting DDoS attacks in software-defined networking. Sensors, 23(9), 4441. https://doi.org/10.3390/s23094441.
- Alam, S., Bhatia, S., Shuaib, M., Khubrani, M. M., Alfayez, F., Malibari, A. A., & Ahmad, S. (2023). An overview of blockchain and IoT integra-tion for secure and reliable health records monitoring. Sustainability, 15, 5660. https://doi.org/10.3390/su15075660.
- Rihan, S. D. A., Anbar, M., & Alabsi, B. A. (2023). Approach for detecting attacks on IoT networks based on ensemble feature selection and deep learning models. Sensors, 23(17), 7342. https://doi.org/10.3390/s23177342.
- Suleski, T., Ahmed, M., Yang, W., & Wang, E. (2023). A review of multi-factor authentication in the Internet of Healthcare Things. Digital Health, 9, https://doi.org/10.1177/20552076231177144.
- Al-Amiedy, T. A., Anbar, M., Belaton, B., Bahashwan, A. A., Hasbullah, I. H., Aladaileh, M. A., & Mukhaini, G. A. (2023). A systematic litera-ture review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things. Internet of Things, 22, 100741. https://doi.org/10.1016/j.iot.2023.100741.
- Sodhro, A. H., Awad, A. I., van de Beek, J., & Nikolakopoulos, G. (2022). Intelligent authentication of 5G healthcare devices: A survey. Internet of Things, 20, 100610. https://doi.org/10.1016/j.iot.2022.100610.
- Nova, K. (2022). Security and resilience in sustainable smart cities through cyber threat intelligence. International Journal of Information and Cy-bersecurity, 6, 21–42.
- Elattar, M., Younes, A., Gad, I., & Elkabani, I. (2024). Explainable AI model for PDFMal detection based on gradient boosting model. Neural Computing and Applications, 36(34), 21607–21622. https://doi.org/10.1007/s00521-024-10314-y.
- Wei, C., Xie, G., & Diao, Z. (2023). A lightweight deep learning framework for botnet detecting at the IoT edge. Computers & Security, 129, 103195. https://doi.org/10.1016/j.cose.2023.103195.
- Salunkhe, V., Tangudu, A., Mokkapati, C., Goel, D. P., & Aggarwal, A. (2024). Advanced encryption techniques in healthcare IoT: Securing pa-tient data in connected medical devices. Modern Dynamics in Mathematics and Progressions, 1, 224–247. https://doi.org/10.36676/mdmp.v1.i2.22.
- Alkadi, S., Al-Ahmadi, S., & Ben Ismail, M. M. (2024). RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic. Sensors, 24, 2626. https://doi.org/10.3390/s24082626.
-
Downloads
-
How to Cite
Matharasi, P. B. ., Chennakesavulu, M. ., S, M. P., Akula , D. ., Lakshminarasimhan , S. ., Jogekar, R. N. ., Mukkapati, N. ., & Kanth, T. . (2025). Development of A Machine Learning-Based Security Module for Detecting Exploit-Type Attacks in IoT Networks. International Journal of Basic and Applied Sciences, 14(3), 286-297. https://doi.org/10.14419/6m5nbj91
