A Deep Learning-Based Framework for Real-Time Detection of Cybersecurity Threats in IoT Environments

被引:0
作者
Almalki, Sultan Saaed [1 ]
机构
[1] Inst Publ Adm, Dept Digital Transformat & Informat, Makkah Al Mukarramah 23442, Saudi Arabia
关键词
IoT security; intrusion detection system; cybersecurity threats; deep learning; real-time detection; adversarial robustness; anomaly detection; INTRUSION DETECTION SYSTEMS; SECURITY;
D O I
10.14569/IJACSA.2025.0160343
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The rapid adoption of Internet of Things (IoT) devices has led to an exponential increase in cybersecurity threats, necessitating efficient and real-time intrusion detection systems (IDS). Traditional IDS and machine learning models struggle with evolving attack patterns, high false positive rates, and computational inefficiencies in IoT environments. This study proposes a deep learning-based framework for real-time detection of cybersecurity threats in IoT networks, leveraging Transformers, Convolutional Neural Networks (CNNs), and Long Short-Term Memory (LSTM) architectures. The proposed framework integrates hybrid feature extraction techniques, enabling accurate anomaly detection while ensuring low latency and high scalability for IoT devices. Experimental evaluations on benchmark IoT security datasets (CICIDS2017, NSL-KDD, and TON_IoT) demonstrate that the Transformer-based model outperforms conventional IDS solutions, achieving 98.3% accuracy with a false positive rate as low as 1.9%. AThe framework also incorporates adversarial defense mechanisms to enhance resilience against evasion attacks. The results validate the efficacy, adaptability, and real-time applicability of the proposed deep learning approach in securing IoT networks against cyber threats.
引用
收藏
页码:430 / 439
页数:10
相关论文
共 28 条
[1]   A survey of intrusion detection systems based on ensemble and hybrid classifiers [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
COMPUTERS & SECURITY, 2017, 65 :135-152
[2]  
Al-Shurbaji T., 2025, IEEE ACCESS
[3]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[4]  
[Anonymous], C. Computing-based, "Developing AI, IoT and Cloud Computing-based Tools and Applications for Women's Safety
[5]  
[Anonymous], 2021, The TONIoT Datasets
[6]   A Comprehensive Survey of Machine Learning Methodologies with Emphasis in Water Resources Management [J].
Drogkoula, Maria ;
Kokkinos, Konstantinos ;
Samaras, Nicholas .
APPLIED SCIENCES-BASEL, 2023, 13 (22)
[7]  
Elsayed S., 2024, IEEE ACCESS
[8]   Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis [J].
Ferrag, Mohamed Amine ;
Friha, Othmane ;
Maglaras, Leandros ;
Janicke, Helge ;
Shu, Lei .
IEEE ACCESS, 2021, 9 :138509-138542
[9]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
[10]   Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity [J].
Hassan, Ali ;
Nizam-Uddin, N. ;
Quddus, Asim ;
Hassan, Syed Rizwan ;
Rehman, Ateeq Ur ;
Bharany, Salil .
CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (03) :3499-3559