Using Machine Learning Algorithms to Enhance IoT s
Using Machine Learning Algorithms to Enhance IoT s
com/scientificreports
The term “Internet of Things” (IoT) refers to a system of networked computing devices that may work
and communicate with one another without direct human intervention. It is one of the most exciting
areas of computing nowadays, with its applications in multiple sectors like cities, homes, wearable
equipment, critical infrastructure, hospitals, and transportation. The security issues surrounding
IoT devices increase as they expand. To address these issues, this study presents a novel model for
enhancing the security of IoT systems using machine learning (ML) classifiers. The proposed approach
analyzes recent technologies, security, intelligent solutions, and vulnerabilities in ML IoT-based
intelligent systems as an essential technology to improve IoT security. The study illustrates the
benefits and limitations of applying ML in an IoT environment and provides a security model based
on ML that manages autonomously the rising number of security issues related to the IoT domain.
The paper proposes an ML-based security model that autonomously handles the growing number
of security issues associated with the IoT domain. This research made a significant contribution
by developing a cyberattack detection solution for IoT devices using ML. The study used seven ML
algorithms to identify the most accurate classifiers for their AI-based reaction agent’s implementation
phase, which can identify attack activities and patterns in networks connected to the IoT. The study
used seven ML algorithms to identify the most accurate classifiers for their AI-based reaction agent’s
implementation phase, which can identify attack activities and patterns in networks connected
to the IoT. Compared to previous research, the proposed approach achieved a 99.9% accuracy, a
99.8% detection average, a 99.9 F1 score, and a perfect AUC score of 1. The study highlights that the
proposed approach outperforms earlier machine learning-based models in terms of both execution
speed and accuracy. The study illustrates that the suggested approach outperforms previous machine
learning-based models in both execution time and accuracy.
Keywords Internet of Things, Sustainable development goals, Sustainable cities and communities, IoT
security, Machine learning
Technology such as cloud computing, cloud edge, and software-defined networking (SDN) have significantly
increased users’ reliance on their infrastructure. Consequently, the number of threats faced by these users has
also risen. As a result, security management during IoT system development has become increasingly difficult
and complex. The IoT can be described as an electrical network that connects physical objects, such as sen-
sors, with software that makes it possible for them to exchange, examine, and gather data. Various sectors use
IoT applications, including the military, personal healthcare, household appliances, and agriculture produc-
tion infrastructure1. This research attempts to achieve the Sustainable Cities and Communities Goal (SDG 11)
included in the UN Sustainable Development Goals (SDG)2. Addressing the challenges and finding solutions for
the IoT require considering a wide range of factors. It is crucial for solutions to encompass the entire system to
provide comprehensive security. However, most IoT devices operate without human interaction, making them
susceptible to unauthorized access. Therefore, it is imperative to enhance the existing security techniques to safe-
guard the IoT e nvironment3. ML techniques can offer potential alternatives for securing IoT systems, including:
• Intrusion detection and prevention ML can create IoT intrusion detection and prevention (IDPS) tools. ML
algorithms can analyze network traffic, device logs, and other data related to known attacks or suspicious
activity.
1
College of Computer Science, King Khalid University, Abha, Kingdom of Saudi Arabia. 2Faculty of Informatics and
Computer Science, British University in Egypt-BUE, Cairo, Egypt. 3Electronics and Micro‑Electronics Laboratory
(E. μ. E. L), Faculty of Sciences of Monastir, University of Monastir, Monastir, Tunisia. *email: helsofany@
kku.edu.sa
• Anomaly detection ML algorithms can learn IoT device behavior and network interactions through anomaly
detection. ML models can detect unusual IoT activity using real-time data. This helps detect security breaches
like unauthorized access or malicious acts and prompt appropriate responses.
• Threat intelligence and prediction ML can analyze big security data sets and provide insights. ML models may
discover new risks, anticipate attack pathways, and give actionable insight to IoT security practitioners by
analyzing data from security feeds, vulnerability databases, and public forums.
• Firmware and software vulnerability analysis Researchers may use ML to analyze IoT firmware and software
for vulnerabilities. ML models may discover IoT device firmware and software security problems by training
on known vulnerabilities and coding patterns. This helps manufacturers repair vulnerabilities before deploy-
ment or deliver security patches quickly.
• Behavior-based authentication ML algorithms can learn IoT devices and user behavior. By analyzing device
usage patterns, ML models may create predictable behavior profiles. ML can require extra authentication or
warn for illegal access when a device or user deviates considerably from the learned profile.
• Data privacy and encryption ML can assist in ensuring data privacy and security in IoT systems. ML algo-
rithms may provide homomorphic encryption, which permits calculations on encrypted data. ML can per-
form data anonymization and de-identification to safeguard sensitive data and facilitate analysis and insights.
In general, ML techniques must be used in conjunction with other security measures to offer complete
security for IoT systems. ML algorithms and methods have been applied in various tasks, including machine
translation, regression, clustering, transcription, detection, classification, probability mass function, sampling,
and estimation of probability density. Numerous applications utilize ML techniques and algorithms, such as spam
identification, image and video recognition, customer segmentation, sentiment analysis, demand forecasting,
virtual personal assistants, detection of fraudulent transactions, automation of customer service, authentication,
malware detection, and speech recognition4.
In addition, IoT and ML integration can enhance the devices of IoT levels of security, thereby increasing their
reliability and accessibility. ML’s advanced data exploration methods play an important role in elevating IoT secu-
rity from only providing security for communication devices to intelligent systems with a high level of s ecurity5.
ML-based models have emerged as a response to cyberattacks within the IoT ecosystem, and the combination
of Deep Learning (DL) and ML approaches represents a novel and significant development that requires careful
consideration. Numerous uses, including wearable smart gadgets, smart homes, healthcare, and Vehicular Area
Networks (VANET), necessitate the implementation of robust security measures to safeguard user privacy and
personal information. The successful utilization of IoT is evident across multiple sectors of modern life6. By
2025, we expect that the IoT will have an economic effect of $2.70–$6.20 trillion. Research findings indicate that
ML and DL techniques are key drivers of automation in knowledge work, thereby contributing to the economic
impact. There have been many recent technological advancements that are shaping our world in significant ways.
By 2025, we expect an estimated $5.2–$6.7 trillion in annual economic effects from knowledge labor automation7.
This research study addresses the vulnerabilities in IoT systems by presenting a novel ML-based security
model. The proposed approach aims to address the increasing security concerns associated with the Internet of
Things. The study analyzes recent technologies, security, intelligent solutions, and vulnerabilities in IoT-based
smart systems that utilize ML as a crucial technology to enhance IoT security. The paper provides a detailed
analysis of using ML technologies to improve IoT systems’ security and highlights the benefits and limitations
of applying ML in an IoT environment. When compared to current ML-based models, the proposed approach
outperforms them in both accuracy and execution time, making it an ideal option for improving the security of
IoT systems. The creation of a novel ML-based security model, which can enhance the effectiveness of cyber-
security systems and IoT infrastructure, is the contribution of the study. The proposed model can keep threat
knowledge databases up to date, analyze network traffic, and protect IoT systems from newly detected attacks
by drawing on prior knowledge of cyber threats.
The study comprises five sections: “Related works” section presents a summary of some previous research.
“IoT, security, and ML” section introduces the Internet of Things’ security and ML aspects. “The proposed IoT
framework architecture” section presents the proposed IoT framework architecture, providing detailed informa-
tion and focusing on its performance evaluation. “Result evaluation and discussion” section provides an evalu-
ation of the outcomes and compares them with other similar systems. We achieve this by utilizing appropriate
datasets, methodologies, and classifiers. “Conclusions and upcoming work” section concludes the discussion
and outlines future research directions.
Related works
The idea of security in IoT devices has been recently articulated in studies that analyze the security needs at sev-
eral layers of architecture, such as the application, cloud, network, data, and physical layers. Layers have examined
potential vulnerabilities and attacks against IoT devices, classified IoT attacks, and explained layer-based security
requirements8. On the other hand, industrial IoT (IIoT) networks are vulnerable to cyberattacks. Developing
IDS is important to secure IIoT networks. The authors presented three DL models, LSTM, CNN, and a hybrid,
to identify IIoT network breaches9. The researchers used the UNSW-NB15 and X-IIoTID datasets to identify
normal and abnormal data, then compared them to other research using multi-class, and binary classification.
The hybrid LSTM + CNN model has the greatest intrusion detection accuracy in both datasets. The researchers
also assessed the implemented models’ accuracy in detecting attack types in the d atasets9.
10
In Ref. , the authors introduced the hybrid synchronous-asynchronous privacy-preserving federated tech-
nique. The federated paradigm eliminates FL-enabled NG-IoT setup issues and protects all its pieces with Two-
Trapdoor Homomorphic Encryption. The server protocol blocks irregular users. The asynchronous hybrid
LEGATO algorithm reduces user dropout. By sharing data, they assist data-poor consumers. In the presented
model, security analysis ensures federated correctness, auditing, and PP. Their performance evaluation showed
higher functionality, accuracy, and reduced system overheads than peer efforts. For medical devices, the authors
of Ref.11 developed an auditable privacy-preserving federated learning (AP2FL) method. By utilizing Trusted
Execution Environments (TEEs), AP2FL reduces issues about data leakage during training and aggregation
activities on both servers and clients. The authors of this study aggregated user updates and found data similari-
ties for non-IID data using Active Personalized Federated Learning (ActPerFL) and Batch Normalization (BN).
In Ref.12, the authors addressed two major consumer IoT threat detection issues. First, the authors addressed
FL’s unfixed issue: stringent client validation. They solved this using quantum-centric registration and authen-
tication, ensuring strict client validation in FL. FL client model weight protection is the second problem. They
suggested adding additive homomorphic encryption to their model to protect FL participants’ privacy without
sacrificing computational speed. This technique obtained an average accuracy of 94.93% on the N-baIoT data-
set and 91.93% on the Edge-IIoTset dataset, demonstrating consistent and resilient performance across varied
client settings.
Utilizing a semi-deep learning approach, SteelEye was created in Ref.13 to precisely detect and assign respon-
sibility for cyberattacks that occur at the application layer in industrial control systems. The proposed model uses
category boosting and a diverse range of variables to provide precise cyber-attack detection and attack attribution.
SteelEye demonstrated superior performance in terms of accuracy, precision, recall, and Fl-score compared to
state-of-the-art cyber-attack detection and attribution systems.
In Ref.14, researchers developed a fuzzy DL model, an enhanced adaptive neuro-fuzzy inference system
(ANFIS), fuzzy matching (FM), and a fuzzy control system to detect network risks. Our fuzzy DL finds robust
nonlinear aggregation using the fuzzy Choquet integral. Metaheuristics optimized ANFIS attack detection’s
error function. FM verifies transactions to detect blockchain fraud and boost efficiency. The first safe, intelligent
fuzzy blockchain architecture, which evaluates IoT security threats and uncertainties, enables blockchain layer
decision-making and transaction approval. Tests show that the blockchain layer’s throughput and latency can
reveal threats to blockchain and IoT. Recall, accuracy, precision, and F1-score are important for the intelligent
fuzzy layer. In blockchain-based IoT networks, the FCS model for threat detection was also shown to be reliable.
In Ref.15, the study examined Federated Learning (FL) privacy measurement to determine its efficacy in
securing sensitive data during AI and ML model training. While FL promises to safeguard privacy during model
training, its proper implementation is crucial. Evaluation of FL privacy measurement metrics and methodolo-
gies can identify gaps in existing systems and suggest novel privacy enhancement strategies. Thus, FL needs full
research on “privacy measurement and metrics” to thrive. The survey critically assessed FL privacy measurement
found research gaps, and suggested further study. The research also included a case study that assessed privacy
methods in an FL situation. The research concluded with a plan to improve FL privacy via quantum computing
and trusted execution environments.
Hackers may access IoT apps to provide false details regarding goods and steal personal information23. Smart
agriculture techniques include selective irrigation, soil hydration monitoring, and temperature and moisture
regulation. Smart technologies can result in larger crops and prevent the growth of mold and other contaminants.
IoT apps monitor farm animals’ activity and health, but compromised agriculture applications can lead to the
theft of animals and damage to crops. Intelligent grids and automated metering use smart meters to monitor and
record storage tanks, improve solar system performance, and track water pressure. However, smart meters are
more susceptible to cyber and physical threats than traditional meters. Advanced Metering Infrastructure (AMI)
connects all electrical appliances in a house to smart meters, enabling communication and security networks to
monitor consumption and costs. Adversary incursions into such systems might change the data obtained, costing
consumers or service providers m oney24. IoT apps in security and emergency sectors limit access to restricted
areas and identify harmful gas leaks. Security measures protect confidential information and sensitive products.
However, compromised security in IoT apps can have disastrous consequences, such as criminals accessing
banned areas or erroneous radiation level alerts leading to serious i llnesses25.
1. Botnets Devices get infected by malware called botnets, like Mirai. The bot’s main objectives are to infect
improperly configured devices and assault a target server when given the order by a botmaster27.
2. Sleep deprivation attack Attacks from sleep deprivation are linked to battery-powered sensor nodes and
equipment. Keeping the machines and devices awake for a long time is the aim of the sleep disturbances
assault28.
3. Node tampering and jamming Node tampering attacks are launched by querying the machines to acquire
accessibility to and change confidential data, like routing data tables and cryptographic shared keys. A node
jamming assault, on the other hand, occurs when perpetrators breach the radio frequencies of wireless sensor
nodes29.
4. Eavesdropping By allowing the attacker to hear the information being transferred across a private channel,
eavesdropping is an exploit that puts the secrecy of a message in danger30.
These attacks can harm most or all IoT system physical components and can be prevented by implementing
appropriate security measures.
Network layer attacks aim to interfere with the IoT space’s network components, which include routers,
bridges, and others. The following are some examples of network layer attacks:
• Man-in-the-middle (MiTM) This threat involves an attacker posing as a part of the communication networks
and directly connecting to another user device31.
• Denial of service (DoS) Attackers who use DoS techniques generate numerous pointless requests, making it
challenging for the user to access and utilize IoT gadgets.
• Routing attacks Malicious nodes engage in routing-type assaults to block routing functionality or to perform
DoS activities.
• Middleware attacks An assault on middleware directly targets the IoT system’s middleware components.
Cloud-based attacks, breaches of authentication, and signature packaging attacks are the three most common
forms of middleware attacks.
• Malware The use of executable software by attackers to interfere with network equipment is known as malware.
• Phishing attack This is a sort of breach that seeks to get users’ usernames and passwords by making them
appear to be reliable entities.
• Code injection attack The main goal of an injector attack into a program or script code is to inject an execut-
able code into the memory space of the breached process.
1. Supervised learning This type of algorithm learns from labeled training data. Various applications in the IoT
can utilize supervised learning, such as:
• Anomaly detection By training ML models to recognize abnormal patterns or behaviors in IoT sensor
data, we can identify anomalies or potential security breaches.
• Predictive maintenance By analyzing past sensor data, supervised learning algorithms can predict equip-
ment failures or maintenance requirements. This enables the implementation of proactive maintenance
measures, leading to a decrease in downtime.
• Environmental monitoring ML models can learn from sensor data to predict environmental conditions
like air quality, water pollution, or weather patterns.
2. Unsupervised learning Unsupervised learning algorithms extract patterns or structures from unlabeled data
without predefined categories. In IoT, unsupervised learning techniques find applications such as:
• Clustering ML models can group similar IoT devices or data points, facilitating resource allocation, load
balancing, or identifying network segments.
• Dimensionality reduction Unsupervised learning techniques like autoencoders or principal component
analysis (PCA) make it easier to analyze IoT data.
• Behavioral profiling Unsupervised learning can help in understanding the normal behavior of IoT devices
or users, enabling the detection of deviations or anomalies.
3. Reinforcement learning Reinforcement learning aims to maximize a reward by training an agent how to
interact with its environment and use feedback to improve its performance. The following applications use
reinforcement learning on the IoT.
• Energy management ML models can learn optimal energy allocation strategies for IoT devices to maxi-
mize energy efficiency or minimize costs.
• Adaptive IoT systems Reinforcement learning can be used to optimize IoT system parameters or con-
figurations based on real-time feedback and changing conditions.
• Smart resource allocation ML models can learn to allocate resources dynamically based on demand, user
preferences, or changing network conditions.
4. Deep learning DL algorithms, especially deep neural networks, excel at processing complex data and extract-
ing high-level features. In IoT, DL has various applications, including:
• Image and video analysis DL models can analyze images or video streams from IoT devices, enabling
applications like object detection, surveillance, or facial recognition.
• Natural language processing (NLP) DL techniques can process and understand text or voice data from
IoT devices, enabling voice assistants, sentiment analysis, or chatbots.
• Time-series analysis DL models, such as long short-term memory (LSTM) or recurrent neural networks
(RNNs) networks, can analyze time-series sensor datasets for predicting future values or detecting
anomalies.
• Software defined networking (SDN) SDN is a cutting-edge networking model that separates the data plane
from the control plane. This improves network programmability, adaptability, and management, and it also
enables external applications to control how the network behaves. The SDN’s three basic components are
communication interfaces, controllers, and switches. Cognitive judgments were imposed on the switches by
a central authority (i.e., the SDN controller). It keeps the state of the system up to date by changing the flow
rules of the appropriate switches. IoT systems’ success and viability depend on SDN adoption. To handle IoT
networks’ huge data flows and minimize bottlenecks, SDN’s routing traffic intelligence and improving usage
of the network are essential. This connection may be applied at many layers in the IoT network, including
enabling end-to-end IoT traffic control, core, access, and cloud networks (where creation, processing, and
providing of data takes place). SDN also enhances IoT security, for example, tenant traffic isolation, tracking
centralized security based on the network’s global view, and dropping of traffic at the edge of the network to
ward off malignant traffic.
• Network function virtualization (NFV) Virtualization in network contexts is called network function virtual-
ization (NFV). NFV separates software from hardware, adding value and reducing capital and operational
costs. The European Telecommunications Standards Institute (ETSI) has standardized this approach’s novel
design for use in telecommunications systems. The architecture of ETSI NFV has three basic components:
(a) Virtualization infrastructure Virtualization technologies are found in this layer in addition to needed
hardware that offers abstractions to resources for Virtualized Network Functions (VNFs). Cloud
platforms handle networking, data processing, and storage.
(b) Virtual network functions VNFs replace specific hardware equipment for network functions. They
scale and cost-effectively handle network services across numerous settings.
(c) Management and orchestration Block of Management and orchestration (MANO) is a component of
ETSI NFV and is responsible for communicating with the VNF layer and the infrastructure layer. It
manages monitoring VNFs, configuration, instantiation, and global resource allocation.
The ecosystem of the IoT is given value by virtualized resources of the network, explaining its variability
and quick expansion. NFV and SDN can offer advanced virtual monitoring tools like Deep Packet Inspectors
(DPIs) and Intrusion Detection Systems (IDSs). They can provide scalable network security equipment, as
well as deploy and configure on-demand components, such as authentication systems and firewalls, to defend
against attacks that have been identified by monitoring agents. When processing for security is offloaded from
resource-constrained IoT devices to virtual instances, the resulting boost in efficiency and drop in energy
consumption clear the way for other useful applications to be implemented. IoT security hardware lacks
NFV’s flexibility and enhanced security. NFV’s value-added features improved IoT security, even if they did
not replace current solutions.
• Machine learning (ML) ML is an algorithmic artificial intelligence (AI) discipline that uses techniques to
give intelligence to devices and computers. ML methods include unsupervised, supervised, and reinforcement
learning. They are typically used in the security of networks. ML is used to specify and precisely identify
the security regulations of the data plane. In mitigating a sort of attack given by tagging traffic networks or
creating policies to access control, the difficulty is to fine-tune key security protocol parameters. Moreover,
several ML approaches may prevent IoT attacks.
(a) Supervised learning In algorithms of supervised learning, the model output is known even though
the underlying relationships between the data are unknown. This model is often trained with two
datasets: One for “testing” and “evaluating” the driven model and another to “learn” from. Within
the context of security, it is common to compare a suspected attack to a database of known threats.
(b) Unsupervised learning Data is not pre-labeled, and the model is unknown. It sets it apart from super-
vised learning. It aims to classify and find patterns in the data.
(c) Reinforcement learning It looks at problems and methods to enhance its model through study. It
employs trial and error and incentive mechanisms to train its models in a novel way. A metric known
as the “value function” is determined by tracking the output’s success and applying the reward to its
formula. This value tells the model how well it is evaluated, so it may adjust its behavior accordingly.
1. Security enforcement layer Several VNFs implemented on many clouds, Physical Network Functions (PNFs),
and edges facilitate interaction between IoT devices and end users. These network functions (PNFs and
VNFs), end users, and IoT devices interact with each other over either a conventional or an SDN-based
network. The research classifies attacks on the IoT as either internal or external. The internal attack is caused
by compromised and malicious IoT devices, while the external attack is initiated from the end-user network
and directed at the IoT domain. The external attack creates danger for the external network and/or other
authorized IoT devices. Attacks would be primarily addressed at three levels: (1) IoT devices, via IoT con-
trollers; (2) network, via SDN controllers; and (3) cloud, via an NFV orchestrator. By implementing VNF
security and setting the interaction through SDN networking, the security framework features may be prop-
erly implemented within the IoT territory. The security enforcement plan was developed to match closely
with ETSI and Open Networking Foundation (ONF) guidelines for NFV and SDN. As shown in Fig. 1, the
security enforcement mechanisms consist of five separate logical blocks.
• Management and control block It analyzes the components required to manage NFV and SDN infrastruc-
tures. It uses SDN controllers and ETSI MANO stack modules for this. To implement efficient security
functions, the SDN controllers and NFV orchestrator must work closely together as NFV is frequently
used alongside SDN to alter programmatically the network based on policies and resources.
• VNF block Taking into consideration the VNFs that have been implemented across the virtualization
infrastructure to implement various network-based security measures, the threat and protection meas-
ures required by the rules of security will be met with a focus on the delivery of sophisticated VNF
security (e.g., IDS/IPS, virtual firewalls, etc.).
• Infrastructure block It includes every hardware component needed to construct an IaaS layer, including
computers, storage devices, networks, and the software used to run them in a virtualized environment.
In addition to the elements of the network that are in charge of transmitting traffic while adhering to
the regulations that have been specified by the SDN controller, a set of security probes is included in
this plane to gather data for use by the monitoring services.
• Monitoring agents block Its primary duty is reporting network activity and IoT actions to identify and
prevent various types of attacks. In the proposed model, the detection technique may make use of either
network patterns or IoT misbehavior. Using SDN-enabled traffic mirroring, every bit of data that is being
sent over the network can be seen. The Security Orchestration Plane hosts an AI-based response agent
that receives logs from the monitoring agents describing malicious transactions.
• The IoT domain block It refers to the interconnected system of cameras, sensors, appliances, and other
physical objects that form the SDN. The proposed methodology considers the substantial risk these
devices pose to data privacy and integrity, and it tries to enforce the security standards in this domain.
2. Security orchestration layer This layer has the task of setting up real-time rules of security depending on the
current state of monitoring data and adjusting the policies dynamically based on their context. It is a novel
part of the proposed framework that communicates with the security enforcement layer to request the nec-
essary actions to be taken to enforce security regulations inside the IoT domain. Virtual security enablers
must be created, configured, and monitored to deal with the present attack.
Figure 2 is a diagrammatic representation of the major cooperation that happens among various frame-
work components. This study proposes a feedback automation mechanism control system consisting of an
oversight agent, an AI-based reaction agent, and an orchestrator for security. The latter protects against
dangers by utilizing an NFV orchestrator, SDN controller, and IoT controller (see Figs. 3, 4).
• AI-based reaction agent This part orders the security orchestrator to perform predetermined measures
in response to an incident. This block, as shown in Fig. 4, makes use of the information collected by
the monitoring agent from IoT domains and the network. This part employs ML models that have
been trained on network topologies and the actions of IoT devices to identify potential dangers. For
the security orchestrator, these ML models will be able to prescribe the optimal template for policies
of security. Figure 4 also shows how to identify security threats from observations of network patterns
and/or IoT activities. The security orchestrator would then be informed of the discovered danger level
(where every level from L1 to L5 belongs to a different predefined security policy). As shown in Fig. 4,
we developed an AI-based reaction agent that uses seven ML techniques to recognize IoT-related attack
activities and/or patterns in a network. These techniques are Random Forest, Decision Tree, Naive Bayes,
Backpropagation NN, XGBoost, AdaBoost, and Ensemble RF-BPNN.
• Security orchestrator This part of closed-loop automation enforces the AI reaction agent’s security prac-
tices. It enforces IoT security regulations utilizing SDN and NFV with the control and management
block. The security orchestrator instantiates, configures, and monitors virtual security devices, manipu-
lates bad traffic through SDN, or directly controls IoT machines, like shutting off a hacked device.
We have addressed the IoT security threats using RF, NB, DT, NNs, XGBoost, AdaBoost, and Ensemble
RF-BPNN, which involve leveraging ML algorithms to detect and mitigate potential risks. To highlight their
effectiveness, we can compare some of these approaches to traditional security methods as follows:
1. RFs are an ensemble learning algorithm that combines multiple DTs to enhance accuracy and robustness.
They applied to the proposed IoT security system as follows:
a. Ensemble construction RF consists of multiple DTs, each trained on a randomly selected subset of the
training dataset. This randomness helps to reduce overfitting and increase generalization.
b. Classification When classifying new instances, each DT in the RF independently predicts the class. The
last prediction depends on the majority vote or averaging of the individual tree predictions.
2. Decision trees (DTs) are a popular ML technique for classification and regression tasks. The proposed IoT
security system uses a DT classifier to identify and address unique threats, and it works as follows:
a. Feature selection The first stage is to select relevant features from the IoT device data. These features can
include network traffic patterns, device behavior, communication protocols, and more.
b. Training Using a labeled dataset, we train a DT classifier that contains instances of both normal and
malicious behavior. The model learns to classify instances based on the selected features.
c. Detection Once trained, the DT can classify new instances as normal or malicious, depending on their
feature values. If the DT classified an instance as malicious, it would take appropriate security measures,
such as blocking network access or raising an alarm.
3. Neural networks NNs, particularly DL architectures, have gained significant popularity in various domains,
including IoT security. Here’s how they can be used:
a. Multiple layers of interconnected nodes (neurons) form the architecture design of a neural network
model. Each neuron applies a non-linear activation function to weighted inputs from the previous layer.
b. We train the neural network using a labeled dataset through a process known as backpropagation. To
reduce the discrepancy between the expected and observed labels, we iteratively tweak the network’s
biases and weights.
c. Prediction: Once trained, the neural network can classify new instances into different threat categories
based on their input features.
• Comparative analysis with traditional approaches Compared to traditional security approaches, such as rule-
based systems or signature-based detection, ML techniques offer several advantages. Traditional methods
rely on predefined rules or patterns, which might not be able to adapt to rapidly evolving threats. In contrast,
ML methods can learn from data and adapt their behavior accordingly. They can detect anomalies, identify
new attack patterns, and improve over time as they encounter new threats. However, traditional approaches
often provide better interpretability and explainability.
Rule-based systems explicitly define security rules, making it easier for security analysts to understand and
verify their behavior. However, ML models, especially complicated ones like neural networks, are black boxes,
making their decision-making process difficult to comprehend.
In conclusion, ML techniques like DTs, RFs, XGBoost, AdaBoost, and neural networks provide powerful
tools for addressing unique IoT security threats. They offer improved accuracy, adaptability, and the ability to
handle complex and evolving attack patterns. However, they may trade off some interpretability compared to
traditional security approaches. The approach is selected based on the specific requirements of the IoT security
system and the trade-offs between accuracy, interpretability, and computational requirements.
• Evaluating network patterns Intrusion system evaluation is the first stage in evaluating the framework’s effec-
tiveness.
Several publicly available datasets, including the UNSW_NB15, IoT-23, DARPA, KDD 99, NSL-KDD, DEF-
CON, and balanced BoTNeT-IoT-L01 datasets, were used to build the proposed system (see the datasets link
(https://drive.google.com/drive/folders/1gjP-pQzFZsLh2QMsIa5GPhEh5etv9J vc?usp=sharin
g)). These datasets
contain information on IoT attacks in the form of (.csv) files. Table 1 shows the network traffic information from
different IoT devices. Advantages of the NSL-KDD dataset compared with the initial KDD dataset: The train set
does not contain duplicated data; therefore, classifiers are not biased toward more frequent records. BoTNeT-
IoT-L01 is a recent dataset that consists of two Botnet assaults (Gafgyt and Mirai). Over a 10-s frame with a
decay factor of (0.1), the mean, count, variance, radius, magnitude, correlation coefficient, and covariance were
the seven statistical measures that were computed. The .csv file was used to extract four features: jitter, packet
count, outbound packet size alone, and combined outbound and inbound packet s ize37. By computing three or
more statistical measures for each of the four traits, a total of twenty-three features were obtained.
Furthermore, this study used the widely recognized NSL-KDD dataset as a benchmark. It served as a bench-
mark for assessing intrusion detection systems in this research. It is a much better version of dataset KDD 99
(see Table 2). The NSL-KDD dataset has over 21 distinct attack types, which serve as the foundation for the
application of our proposed IDS model, such as teardrop, satan, rootkit, buffer-overflow, smurf DDoS, pod-dos,
and Neptune-dos. The NSL-KDD dataset is primarily composed of preprocessed network traffic data. These
data provide a more precise representation of the network traffic that occurs at present. There are two distinct
collections of data inside the dataset: a set for testing and a set for training. Comparatively, the set of testing
Dataset No. of features No. of instances Name of attacks Separate train- test set
BoTNet-IoT-L01 23 1,111,864 UDP, Scan, Syn, Ack, TCP, UDP plain, Combo, and Junk Yes
NSL-KDD 42 148,517 DoS, Probe, R2L,and U2R Yes
KDD99 42 4,886,431 DoS, Probe, R2L,and U2R Yes
DoS, Fuzzers, Backdoors, Worms, Reconnaissance, Analysis,
UNSW-NB15 49 1,540,044 Yes
Exploits, Generic, and Shellcode
has around 23,000 records, whereas the training set contains approximately 125,000 records. Each entry in the
dataset corresponds to a network connection and contains a set of 41 features, including the IP addresses of the
source and destination, protocols, flags, and a label indicating whether the connection is normal or abnormal
(anomalous). Each sample in the dataset corresponds to certain attacks as follows: DoS attacks, remote-to-local
(R2L) attacks, user-to-root (U2R) attacks, and probing a ttacks38. There are many implementation tools available
for analyzing IoT attack datasets, such as Wireshark, Snort, Zeek (formerly Bro), Jupyter Notebook, Python,
and Weka. In this work, the researchers used Python programming and Weka data mining tools for ML and
data analysis processing.
The proposed tools include a large collection of ML algorithms for classification, regression, clustering, and
association rule mining, such as RF, NB, DT, NNs, XGBoost, AdaBoost, and Ensemble RF-BPNN, as well as tools
for model evaluation and selection, including cross-validation and ROC analysis.
Certain ML algorithms are incapable of learning due to the wide range of features present in nature. The
modeling process becomes more challenging when a feature is continuous. Hence, before constructing clas-
sification patterns, preprocessing is fundamental to optimize prediction accuracy. Specifically, a discretization
technique is used to overcome this restriction. When applied to a continuous variable, the discretization data
mining approach seeks to minimize the number of possible values by categorizing them into intervals. Two dif-
ferent kinds of discretization are discussed in the literature: (1) static variable discretization, in which variables are
partitioned separately, and (2) dynamic variable discretization, in which all features are discretized concurrently39.
The research discretized the attacks and then categorized them such that the research was left with only the most
common types (UDP, Junk, Ack, and UDP plain from the balanced BoTNet-IoT-L01 dataset and DDoS, Probe,
U2R, and R2L from NSL-KDD).
1. Metrics for comparing performance Choosing measures that can indicate the strength of an IDS is a major
problem when evaluating an IDS. An IDS’s performance goes well beyond its classification results alone. Cost
Per Example (CPE), precision, detection rate, and model accuracy are utilized to evaluate the effectiveness
of the proposed system. When evaluating outcomes, the following metrics should be used in conjunction
with one another40.
5 5
1
CPE = CM i, j + C i, j . (1)
N
i=1 j=1
Equation (1) indicates Cost-Sensitive Classification (CSC) or CPE, where N is the total number of samples,
CM refers to the classification’s Confusion Matrix algorithm, and C is the Cost Matrix (see Table 3)41.
2. Input data cleaning, feature extraction, and classification The research proposes a first method, which involves
preparing the entire dataset and then categorizing it using a variety of techniques (Hoeffding Tree, RF, Bayes
Net, and J48) as shown in Fig. 6. Next, the research chooses the best classifier (algorithm) that generates a
preferred accuracy (see Table 4 for the BoTNet-IoT-L01 dataset and Table 5 for the NSL-KDD dataset).
Algorithm Accuracy (%) Sensitivity (%) Specificity (%) Training time (s) Testing time (s)
Random forest 98.4 95.5 98.8 192.7 92.08
Naive Bayes 78.0 76.2 76.8 214.55 82.18
Decision tree 95.8 95.6 98.1 219.61 82.13
Backpropagation NN 95.3 94.6 94.2 258.91 88.20
Ensembled RF-BPNN 99.2 97.6 96.2 230.4 86.66
Table 5. The precision rate of used ML algorithms for each attack from NSL-KDD.
3. Backpropagation approach To investigate the multilayer neural net approach, the research utilized the capa-
bilities of a backpropagation technique for learning. The research employed a multilayer neural network
with three layers. The initial layer had 41 inputs, representing the features of the dataset. The final layer
encompassed the classification responses, namely, U2L, U2R, Probe, DoS, and Normal. An extra hidden
layer was incorporated to facilitate the learning process. This method uses 100 neurons and a single hidden
layer. Experience has shown that the alternative hidden layer and neuron counts did not increase the mean
squared error (MSE) (see Table 6).
4. Distributed classification module This module introduces a distributed categorization system in which the
various types of attacks (DDoS, U2R, R2L, and Probe; UDP, UDP plain, Ack, and Junk) are all assigned to
the Ensembled RF-BPNN algorithm. Finally, the AdaBoost method is used to combine the resulting models
(see Table 7).
Parameters Values
Epochs no. 500
Layers count in the NN {1–4}
Units count in the NN {100–200}
Percent of noise applied c 25%
Learning percent 0.005
Classifier (output layer) RF
Figure 6. RF-BPNN accuracy evaluation for each attack type in the balanced BoTNet-IoT-L01 dataset.
Figure 7. The accuracy for detecting some attacks in the UNSW_NB15 dataset, using RF Classifier.
disparity between the intended result and the actual one. The margin difference is the ‘reduction in impurity’.
The target is output shifted by one index to the right and the impurity at first split is initialized by the impurity
of the batch (see Fig. 5).
When employing the AdaBoost classifier as a detection model, the research was limited to considering a single
window size. Therefore, the research has successfully decreased the number of attributes in the BoTNeT-IoT-
L01 dataset from 115 to 23. This significant decrease in the dimensionality of the dataset results in a significant
acceleration of the detection process. Speaking of the BotNet-IoT dataset, the research discovered that just a
small number of parameters have an important role in our system’s overall performance, and time windows
of 10 s performed marginally better than those of shorter duration (see Fig. 6). Additionally, the research dis-
covered that traffic heterogeneity greatly impacted RF classifier performance. However, when compared to the
other classification algorithms, AdaBoost and RF-BPNN had the greatest and most stable results (see Table 7).
Figure 7 shows the accuracy for detecting DoS, Fuzzers, Generic, Backdoor, and Exploit attacks in the UNSW_
NB15 dataset using the RF classifier and SMOTE (where “label” refers to the target variable and “attack_cat”
refers to the attack types).
Different experiments determine the system’s performance. Examining and validating each stage using the
supplied classifiers is necessary to confirm the experimental results. Whether the classifier can discriminate
across feature categories is also crucial. Accuracy, specificity, precision, recall, F1-score, and AUC measure the
model’s performance and indicate the correctness of the system. Such measurements are based on the TP, FP, TN,
and FN, as shown in Eqs. (2) to (6):
Ser. Classifier Accuracy (%) Precision (%) Specificity (%) Recall (%) F1-score (%) AUC
1 Random forest 99.9 99.9 99.8 99.9 99.9 1.0
2 Naive Bayes 73.1 73.8 65.6 79.0 76.3 0.8
3 Decision Tree 99.9 100.0 100.0 99.1 99.5 0.8
4 Back propagation NN 67.6 66.7 49.9 82.0 73.6 0.6
5 XGBoost 99.9 100.0 100.0 99.1 99.9 1.0
6 AdaBoost 99.9 99.9.0 99.9 99.9 99.9 1.0
7 Ensembled RF-BPNN 99.9 99.9 99.8 99.9 99.9 1.0
Table 9. Performance metrics for 7 ML algorithms using the UNSW-NB15 dataset and SMOTE.
TP + T N
Accuracy = , (2)
TN + T P + FN + F P
TP
Precision = , (3)
TP + FP
TN
Specificity = , (4)
TN + F P
TP
Recall = , (5)
TP + FN
2 × Recall × Percision
F1 − score = . (6)
Recall + Percision
We use the following terms to describe the classification errors: true positive (TP) for attack instances, true
negative (TN) for normal cases, false positive (FP) for incorrectly classified normal instances, and false negative
(FN) for incorrectly classified attack instances.
Thus, the accuracy formula evaluates the classifier’s capacity to accurately categorize both positive and nega-
tive instances; precision denotes the classifier’s ability to avoid incorrectly labeling positive instances as negative,
and specificity denotes its capacity to avoid incorrectly labeling negative instances as positive. In machine learn-
ing, recall is the rate at which a classifier can identify positive examples, whereas the F1-score is the weighted
average of accuracy and recall.
Table 9 shows the performance of seven machine learning classifiers using the Synthetic Minority Oversam-
pling Technique (SMOTE) on the UNSW_NB15 dataset. As you can see in Fig. 8, the RF, XGBoost, AdaBoost,
and Ensembled RF-BPNN classifiers did the best overall. They achieved an accuracy of 99.9%, an AUC of 1, and
an F1 score of 99.9%. The Naive Bayes classifier, on the other hand, obtained the minimum accuracy and F1 score.
Figure 8. The accuracy of 7 ML algorithms using the UNSW-NB15 dataset and SMOTE.
1. Integration with IoT security frameworks The ML-based model can integrate with IoT security frameworks
by aligning its functionalities with their security objectives and guidelines. For example:
a. The proposed model can integrate with existing authentication mechanisms recommended by IoT
security frameworks, such as digital certificates or secure bootstrapping protocols. It can enhance device
authentication by analyzing device behavior patterns and detecting anomalies that may indicate unau-
thorized access or compromised devices.
b. To align with data privacy requirements, the model can utilize encryption techniques and privacy-
preserving algorithms recommended by the IoT security frameworks. It provides a guarantee of secure
transmission and storage of data, protecting confidential information against illegal access.
c. The proposed model can integrate with existing access control mechanisms defined by IoT security
frameworks. It can augment access control by providing intelligent decision-making capabilities based
on historical data, user behavior analysis, or contextual information. This aids in assessing access
requests and preventing unauthorized access to IoT resources.
2. Integration with IoT security standards The ML-based model can comply with IoT security standards by
incorporating the required security controls and practices. For example:
a. The proposed model can align with ISO/IEC 27000 standards by implementing appropriate security
controls for risk assessment, incident management, and data protection. It can follow the standards’
guidelines to ensure that the necessary security measures are in place.
b. The model can follow the NIST framework to enhance its threat detection and incident response capa-
bilities.
3. Interoperability in IoT ecosystems By adhering to standard IoT protocols, data formats, and metadata stand-
ards, the ML-based model can ensure interoperability. For example:
a. The ML model can communicate with IoT devices and gateways using standard IoT protocols such as
MQTT or CoAP, ensuring compatibility and interoperability across different devices and platforms.
b. The ML model can use commonly used data formats, such as JSON, or semantic data models, such as
the Semantic Sensor Network (SSN) ontology, to facilitate seamless data sharing and interoperability
with other components within the IoT ecosystem.
Algorithm Training (time complexity) Testing (Time complexity) Auxiliary space Notes
RF tree)
O(n log(n)d n O(d ntree) O(p ntree)
Bayes Net O(n*m) O(c*m) O(c*m)
Decision Tree (Hoeffding Tree, J48) O(n log(n)d) O(d) O(p)
Backpropagation NN O(n * t * (ij + jk + kl)), O(nk) O(nk) n: number of epochs
Table 11. Time complexity of training and testing for the ML algorithms used.
By integrating with existing IoT security frameworks and standards, the proposed model can enhance its
adaptability and compatibility within IoT ecosystems. This integration allows the model to complement and
enhance the existing security infrastructure, contributing to improved IoT security outcomes.
1. The authors conducted a privacy impact assessment to determine if the proposed ML-based security model
has any privacy issues or concerns.
2. To mitigate privacy concerns, the study implemented privacy-enhancing techniques. This process included
data anonymization, encryption, differential privacy, or federated learning, which allows for training the
proposed ML model without sharing raw data.
3. The study minimized the amount of personally identifiable information (PII) gathered and stored to reduce
privacy risks. During the requirements engineering phase, we only collected the necessary data for the
proposed machine learning-based security model, ensuring its safe storage and disposal when no longer
required.
4. We implemented regular monitoring of the proposed ML model for potential biases in data and outcomes.
Implementing a bias detection process is critical for identifying discriminatory patterns. We can take steps
to mitigate detected biases, which may include adjusting training data, diversifying datasets, or utilizing bias
correction algorithms.
5. Regularly monitor the proposed ML-based security model performance, including privacy aspects, and
update it as needed to address emerging privacy concerns, mitigate biases, and ensure ongoing compliance
with ethical standards.
Data availability
The corresponding author can provide the datasets used and/or analyzed in this work upon reasonable request.
References
1. Sharma, A., Singh, P. K. & Kumar, Y. An integrated fire detection system using IoT and image processing technique for smart cities.
Sustain. Cities Soc. 61, e4826 (2020).
2. Sinan, K. SDG-11: Sustainable Cities and Communities. Emerging Technologies, Sustainable Development Goals Series 1st edn.
(Springer, 2020).
3. Hussain, F., Hussain, R., Hassan, S. A. & Hossain, E. Machine learning in IoT security: Current solutions and future challenges.
IEEE Commun. Surv. Tutor. 22(3), 1686–1721 (2020).
4. Bharati, S., Mondal, M. R. H., Podder, P. & Prasath, V. B. Federated learning: Applications, challenges and future directions. Int. J.
Hybrid Intell. Syst. 18(1–2), 19–35 (2022).
5. Shafiq, M., Tian, Z., Bashir, A. K., Du, X. & Guizani, M. Corrauc: A malicious BOT-IOT traffic detection method in IoT network
using machine learning techniques. IEEE Internet Things J. 8(5), 3242–3254 (2020).
6. Omolara, A. E. et al. The Internet of Things security: A survey encompassing unexplored areas and new insights. Comput. Secur.
112, 102494 (2022).
7. Bharati, S., Podder, P., Mondal, M. R. H. & Paul, P. K. Applications and challenges of cloud integrated IoMT. In Cognitive Internet
of Medical Things for Smart Healthcare 1st edn (eds Hassanien, A. E. et al.) 67–85 (Springer, 2021).
8. Özalp, A. N. et al. Layer-based examination of cyber-attacks in IoT. In 2022 International Congress on Human-Computer Interac-
tion, Optimization and Robotic Applications (HORA) (IEEE, 2022).
9. Altunay, H. C. & Albayrak, Z. A hybrid CNN+ LSTM—Based intrusion detection system for industrial IoT networks. Eng. Sci.
Technol. Int. J. 38, 101322 (2023).
10. Abbas, Y., Ali, D., Gautam, S., Hadis, K. & Reza, M. P. Hybrid privacy preserving federated learning against irregular users in
next-generation Internet of Things. J. Syst. Archit. 148, 103088 (2024).
11. Abbas, Y., Ali, D. & Gautam, S. AP2FL: Auditable privacy-preserving federated learning framework for electronics in healthcare.
IEEE Trans. Consumer Electron. 99, 1 (2023).
12. Danyal, N., Abbas, Y., Ali, D. & Gautam, S. Federated quantum-based privacy-preserving threat detection model for consumer
Internet of Things. IEEE Trans. Consumer Electron. https://doi.org/10.1109/TCE.2024.3377550 (2024).
13. Sanaz, N., Behrouz, Z., Abbas, Y. & Ali, D. Steeleye: An application-layer attack detection and attribution model in industrial control
systems using semi-deep learning. In 2021 18th International Conference on Privacy, Security and Trust (PST), IEEE Xplore (2021).
14. Abbas, Y., Ali, D., Reza, M. P., Gautam, S. & Hadis, K. Secure intelligent fuzzy blockchain framework: Effective threat detection in
IoT networks. Comput. Ind. 144, 103801 (2023).
15. Gopi, K. J., Abbas, Y., Reza, M. P. & Seyedamin, P. Exploring privacy measurement in federated learning. J. Supercomput. 1, 43
(2023).
16. Otoum, Y. & Nayak, A. On securing IoT from deep learning perspective. In Proc. 2020 IEEE Symposium on Computers and Com-
munications (ISCC) 1–7 (2020).
17. Butun, I., Sterberg, P. O. & Song, H. Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Com-
mun. Surv. Tutor. 22(1), 616–644 (2020).
18. Tahsien, S. M., Karimipour, H. & Spachos, P. Machine learning based solutions for security of Internet of Things (IoT): A survey.
J. Netw. Comput. Appl. 161, 102630 (2020).
19. Abiodun, O. I., Abiodun, E. O., Alawida, M., Alkhawaldeh, R. S. & Arshad, H. A review on the security of the Internet of Things:
Challenges and solutions. Wirel. Person. Commun. 119(3), 2603–2637 (2021).
20. Podder, P., Mondal, M. R. H., Bharati, S. & Paul, P. K. Review on the security threats of Internet of Things. Int. J. Comput. Appl.
176(41), 37–45 (2020).
21. Hamad, Z. J. & Askar, S. Machine learning powered IoT for smart applications. Int. J. Sci. Bus. 5(3), 92–100 (2021).
22. Xu, H. et al. A combination strategy of feature selection based on an integrated optimization algorithm and weighted K-nearest
neighbor to improve the performance of network intrusion detection. Electronics 9(8), 1206 (2020).
23. Bharati, S. & Mondal, M. R. H. Computational intelligence for managing pandemics. In 12 Applications and Challenges of AI-Driven
IoHT for Combating Pandemics: A Review (eds Bharati, S. & Mondal, M. R. H.) 213–230 (De Gruyter, 2021).
24. Robel, M. R. A., Bharati, S., Podder, P. & Mondal, M. R. H. IoT driven healthcare monitoring system. In Fog, Edge, and Pervasive
Computing in Intelligent IoT Driven Applications (eds Gupta, D. & Khamparia, A.) 161–176 (Wiley, 2020).
25. Podder, P., Mondal, M. R. H. & Kamruzzaman, J. Iris feature extraction using three-level Haar wavelet transform and modified
local binary pattern. In Applications of Computational Intelligence in Multi-Disciplinary Research 1st edn (eds Elngar, A. A. et al.)
(Elsevier, 2022).
26. Chandavarkar, B. R. Hardcoded credentials and insecure data transfer in IoT: National and international status. In Proc. 2020 11th
International Conference on Computing, Communication and Networking Technologies (ICCCNT) 1–7 (2020).
27. Ferrara, P., Mandal, A. K., Cortesi, A. & Spoto, F. Static analysis for discovering IoT vulnerabilities. Int. J. Softw. Tools Technol.
Transf. 23(1), 71–88 (2021).
28. Yu, Y., Guo, L., Liu, S., Zheng, J. & Wang, H. Privacy protection scheme based on CP-ABE in crowdsourcing-IoT for Smart Ocean.
IEEE Internet Things J. 7(10), 10061–10071 (2020).
29. Xiong, J. et al. A personalized privacy protection framework for mobile crowdsensing in IIoT. IEEE Trans. Ind. Inform. 16(6),
4231–4241 (2020).
30. Jiang, X., Lora, M. & Chattopadhyay, S. An experimental analysis of security vulnerabilities in industrial IoT devices. ACM Trans.
Internet Technol. 20(1), 1–24 (2020).
31. Visoottiviseth, V., Sakarin, P., Thongwilai, J. & Choobanjong T. Signature-based and behavior-based attack detection with machine
learning for home IoT devices. In Proc. 2020 IEEE Region 10 Conference (TENCON 2020) 829–834 (2020).
32. Turk, Z., Soto, B. G. D., Mantha, B. R. K., Maciel, A. & Georgescu, A. A systemic framework for addressing cybersecurity in con-
struction. Autom. Construct. 133(3), 103988 (2022).
33. Al Hayajneh, A., Bhuiyan, N. Z. A. & McAndrew, I. Improving internet of things (IoT) security with software defined networking
(SDN). Computers 9(1), 8 (2020).
34. Hussain, F., Hassan, S. A., Hussain, R. & Hossain, E. Machine learning for resource management in cellular and IoT networks:
Potentials, current solutions, and open challenges. IEEE Commun. Surv. Tutor. 22(2), 1251–1275 (2020).
35. IoT Dataset for Intrusion Detection Systems (IDS). https://w ww.k aggle.c om/a zalho
waide/i ot-d
atase t-f or-i ntrus ion-d
etect ion-s yste
ms-ids (2023).
36. Nawir, M., Amir, A., Yaakob, N. & Lynn, O. B. Internet of Things (IoT): Taxonomy of security attacks. In Proc. 3rd International
Conference in Electronic Design (ICED) 321–326 (2016).
37. Herzberg, B., Bekerman, D. & Zeifman, I. Breaking down mirai: An IoT DDoS botnet analysis. Incapsula Blog, Bots and DDoS,
Security, (2016).
38. Ambusaidi, M. A., He, X., Nanda, P. & Tan, Z. Building an intrusion detection system using a filter-based feature selection algo-
rithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016).
39. Moustafa, N., Creech, G. & Slay, J. Big data analytics for intrusion detection system: Statistical decision-making using finite Dirichlet
mixture models. In Data Analytics and Decision Support for Cybersecurity 1st edn (eds Moustafa, N. et al.) 127–156 (Springer,
2017).
40. Tsai, C. F. & Lin, C. Y. A triangle area based nearest neighbors approach to intrusion detection. Pattern Recogn. 43(1), 222–229
(2010).
41. Alom, M. Z., Bontupalli, V. & Taha, T. M. Intrusion detection using deep belief networks. In Proc. IEEE National Aerospace and
Electronics Conference (NAECON) 339–344 (2015).
42. Yin, C., Zhu, Y., Fei, J. & He, X. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5,
21954–21961 (2017).
43. Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R. & Ghogho, M. Deep learning approach for network intrusion detection in
software defined networking. In Proc. 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM)
258–263 (2016).
44. Ludwig, S. A. Intrusion detection of multiple attack classes using a deep neural net ensemble. In Proc. 2017 IEEE Symposium Series
on Computational Intelligence (SSCI) 1–7 (2017).
45. Al-Hawawreh, M., Moustafa, N. & Sitnikova, E. Identification of malicious activities in industrial Internet of Things based on deep
learning models. J. Inf. Secur. Appl. 41, 1–11 (2018).
46. Shone, N., Ngoc, T. N., Phai, V. D. & Shi, Q. Deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top.
Comput. Intell. 2(1), 41–50 (2018).
47. Subba, B., Biswas, S. & Karmakar, S. Enhancing performance of anomaly-based intrusion detection systems through dimensionality
reduction using principal component analysis. In Proc. 2016 IEEE International Conference on Advanced Networks and Telecom-
munications Systems (ANTS) 1–6 (2016).
48. Kumar, R. et al. Blockchain-based authentication and explainable AI for securing consumer IoT applications. IEEE Trans. Consumer
Electron. https://doi.org/10.1109/TCE.2023.3320157 (2024).
49. Javeed, D., Gao, T., Kumar, P. & Jolfaei, A. An explainable and resilient intrusion detection system for industry 5.0. IEEE Trans.
Consumer Electron. 70(1), 1342–1350. https://doi.org/10.1109/TCE.2023.3283704 (2024).
50. Kumar, R. et al. Digital twins-enabled zero touch network: A smart contract and explainable AI integrated cybersecurity framework.
Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2024.02.015 (2024).
Acknowledgements
The authors extend their appreciation to the Deanship of Research and Graduate Studies at King Khalid Univer-
sity for funding this work through small group research under Grant Number (RGP1/129/45).
Author contributions
Hosam El-Sofany is responsible for developing the original research concept, design, methodology, and imple-
mentation. He is also responsible for writing, editing, reviewing, checking against plagiarism using the iThenti-
cate program, and proofreading. Samir A. El-Seoud: methodology, writing, and proofreading. Omar H. Karam:
methodology, writing, and proofreading. Belgacem Bouallegue: methodology, writing, reviewing, editing, and
proofreading.
Competing interests
The authors declare no competing interests.
Additional information
Correspondence and requests for materials should be addressed to H.E.-S.
Reprints and permissions information is available at www.nature.com/reprints.
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International
License, which permits use, sharing, adaptation, distribution and reproduction in any medium or
format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the
Creative Commons licence, and indicate if changes were made. The images or other third party material in this
article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the
material. If material is not included in the article’s Creative Commons licence and your intended use is not
permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
1. use such content for the purpose of providing other users with access on a regular or large scale basis or as a means to circumvent access
control;
2. use such content where to do so would be considered a criminal or statutory offence in any jurisdiction, or gives rise to civil liability, or is
otherwise unlawful;
3. falsely or misleadingly imply or suggest endorsement, approval , sponsorship, or association unless explicitly agreed to by Springer Nature in
writing;
4. use bots or other automated methods to access the content or redirect messages
5. override any security feature or exclusionary protocol; or
6. share the content in order to create substitute for Springer Nature products or services or a systematic database of Springer Nature journal
content.
In line with the restriction against commercial use, Springer Nature does not permit the creation of a product or service that creates revenue,
royalties, rent or income from our content or its inclusion as part of a paid for service or for other commercial gain. Springer Nature journal
content cannot be used for inter-library loans and librarians may not upload Springer Nature journal content on a large scale into their, or any
other, institutional repository.
These terms of use are reviewed regularly and may be amended at any time. Springer Nature is not obligated to publish any information or
content on this website and may remove it or features or functionality at our sole discretion, at any time with or without notice. Springer Nature
may revoke this licence to you at any time and remove access to any copies of the Springer Nature journal content which have been saved.
To the fullest extent permitted by law, Springer Nature makes no warranties, representations or guarantees to Users, either express or implied
with respect to the Springer nature journal content and all parties disclaim and waive any implied warranties or warranties imposed by law,
including merchantability or fitness for any particular purpose.
Please note that these rights do not automatically extend to content, data or other material published by Springer Nature that may be licensed
from third parties.
If you would like to use or distribute our Springer Nature journal content to a wider audience or on a regular basis or in any other manner not
expressly permitted by these Terms, please contact Springer Nature at