Deep Learning Models with Transfer Learning and Ensemble for Enhancing Cybersecurity in IoT Use Cases

Authors

  • Sivananda Hanumanthu Bharatiya Engineering Science and Technology Innovation University (BESTIU), AP & Director of Enterprise Architecture at Rubrik, Bangalore, INDIA,
  • Gaddikoppula Anil Kumar

DOI:

https://doi.org/10.22399/ijcesen.1037

Keywords:

Internet of Things, Artificial Intelligence, Cybersecurity, Deep Learning Transfer Learning, Hyperparameter Optimization

Abstract

Internet of Things (IoT) applications have made inroads into different domains, providing unique solutions—Internet of Things technology offers seamless integration of physical and digital worlds. However, the broad nature of the technologies and protocols used in IoT applications has increased vulnerability from malicious attackers. Hence, protecting IoT applications from cyber-attacks is imperative. Researchers have implemented intrusion detection systems to overcome this issue to improve cybersecurity in IoT scenarios. With the new threats of cybercrime emerging, a continuous effort is required to enhance the security of IoT applications. To address this pressing need, we present our study that proposes a deep learning-based framework to bolster cybersecurity at the IoT use cases level by exploiting the power of transfer learning and ensembling it from deep learning models pre-trained at larger datasets. Deep learning models attain high performance with the help of hyperparameter tuning, and we achieve that through PSO in our proposed system. Our ensemble system shows how individual models can outperform individual models by using the best-performing models as constituents in the ensemble approach. We introduce an algorithm called — Optimized Ensemble Learning-Based Intrusion Detection (OEL-ID). This algorithm leverages the present framework and corresponding optimization strategies to boost intrusion detection performance for improved cyber security in IoT scenarios. Using the UNSW-NB15 benchmark dataset, our empirical study demonstrates that our proposed method, compared to some of the existing deep learning models, obtained a detection accuracy of 98.89%, which, in turn, provided the highest comparative accuracy. Therefore, the proposed system can be used with IoT use cases as it allows for a significant level of security to the system's underlying applications

References

Ibitoye, O., Shafiq, O., & Matrawy, A. (2019). Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks. 2019 IEEE Global Communications Conference (GLOBECOM). 1-6. https://doi.org/10.1109/globecom38437.2019.9014337

Madhu, B., Chari, M.V.G., Vankdothu, R., Silivery, A.K. and Aerranagula, V. (2023). Intrusion detection models for IOT networks via deep learning approaches. Measurement: Sensors. 25, 1-14. https://doi.org/10.1016/j.measen.2022.100641

Keshk, M., Koroniotis, N., Pham, N., Moustafa, N., Turnbull, B. and Zomaya, A.Y. (2023). An explainable deep learning-enabled intrusion detection framework in IoT networks. Information Sciences. 639;1-20. https://doi.org/10.1016/j.ins.2023.119000

Bassey, J., Adesina, D., Li, X., Qian, L., Aved, A., & Kroecker, T. (2019). Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning. 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC). 98-104. https://doi.org/10.1109/fmec.2019.8795319

Fatani, A., Abd Elaziz, M., Dahou, A., Al-Qaness, M.A. and Lu, S. (2021). IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access. 9;123448-123464. https://doi.org/10.1109/ACCESS.2021.3109081

Lazzarini, R., Tianfield, H. and Charissis, V. (2023). A stacking ensemble of deep learning models for IoT intrusion detection. Knowledge-Based Systems. 279;1-13. https://doi.org/10.1016/j.knosys.2023.110941.

Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications. 50;1-19. https://doi.org/ 10.1016/j.jisa.2019.102419.

Bakhsh, S.A., Khan, M.A., Ahmed, F., Alshehri, M.S., Ali, H. and Ahmad, J. (2023). Enhancing IoT network security through deep learning-powered Intrusion Detection System. Internet of Things. 24;1-36. https://doi.org/10.1016/j.iot.2023.100936

Jayalaxmi, P.L.S., Saha, R., Kumar, G., Conti, M. and Kim, T.H. (2022). Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey. IEEE Access, 10;121173-121192. https://doi.org/10.1109/ACCESS.2022.3220622

Bovenzi, G., Aceto, G., Ciuonzo, D., Persico, V., & Pescape, A. (2020). A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios. GLOBECOM 2020 - 2020 IEEE Global Communications Conference. 1-7. https://doi.org/10.1109/globecom42002.2020.9348167.

Vishwakarma, M. and Kesswani, N. (2022). DIDS: A Deep Neural Network based real-time Intrusion detection system for IoT. Decision Analytics Journal. 5;1-9. https://doi.org/10.1016/j.dajour.2022.100142

Soliman, S., Oudah, W. and Aljuhani, A.,(2023). Deep learning-based intrusion detection approach for securing industrial Internet of Things. Alexandria Engineering Journal 81;371-383. https://doi.org/10.1016/j.aej.2023.09.023.

Rezvy, S., Luo, Y., Petridis, M., Lasebae, A., & Zebin, T. (2019). An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 2019 53rd Annual Conference on Information Sciences and Systems (CISS). 1-6. https://doi.org/10.1109/ciss.2019.8693059

Saleem, T. J., & Chishti, M. A. (2020). Deep learning for the internet of things: potential benefits and use-cases. Digital Communications and Networks. 1-24. https://doi.org/10.1016/j.dcan.2020.12.002

Akgun, D., Hizal, S. and Cavusoglu, U. (2022). A new DDoS attacks intrusion detection model based on deep learning for cybersecurity. Computers & Security. 118;1-13. https://doi.org/10.1016/j.cose.2022.102748

Ullah, I. and Mahmoud, Q.H. (2021). Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9;103906-103926. https://doi.org/10.1109/ACCESS.2021.3094024

Qiu, H., Dong, T., Zhang, T., Lu, J., Memmi, G., & Qiu, M. (2021). Adversarial Attacks Against Network Intrusion Detection in IoT Systems. IEEE Internet of Things Journal. 8(13);10327–10335. https://doi.org/10.1109/jiot.2020.3048038

Kasongo, S.M. (2023). A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework. Computer Communications, 199;113-125. https://doi.org/10.1016/j.comcom.2022.12.010.

Rahman, S. A., Tout, H., Talhi, C., & Mourad, A. (2020). Internet of Things Intrusion Detection: Centralized, On-Device, or Federated Learning? IEEE Network. 34(6);310–317. https://doi.org/10.1109/mnet.011.2000286

Hnamte, V. and Hussain, J. (2023). DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system. Telematics and Informatics Reports. 10;1-13. https://doi.org/10.1016/j.teler.2023.100053.

Cassales, G. W., Senger, H., de Faria, E. R., & Bifet, A. (2019). IDSA-IoT: An Intrusion Detection System Architecture for IoT Networks. 2019 IEEE Symposium on Computers and Communications (ISCC). 1-7. https://doi.org/10.1109/iscc47284.2019.8969609

Anushiya, R. and Lavanya, V.S. (2023). A new deep-learning with swarm based feature selection for intelligent intrusion detection for the Internet of things. Measurement: Sensors, 26, pp.1-9.. https://doi.org/10.1016/j.measen.2023.100700.

Yahyaoui, A., Abdellatif, T., & Attia, R. (2019). Hierarchical anomaly based intrusion detection and localization in IoT. 2019 15th International Wireless Communications & Mobile Computing Conference. 108-113. https://doi.org/10.1109/iwcmc.2019.8766574

Li, B., Wu, Y., Song, J., Lu, R., Li, T., & Zhao, L. (2020). DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems. IEEE Transactions on Industrial Informatics. 1–10. https://doi.org/10.1109/tii.2020.3023430

Hazman, C., Guezzaz, A., Benkirane, S. and Azrour, M. (2023). lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Cluster Computing, 26(6);4069-4083. https://doi.org/10.1007/s10586-022-03810-0.

Singh, P., P, J. J., Pankaj, A., & Mitra, R. (2021). Edge-Detect: Edge-Centric Network Intrusion Detection using Deep Neural Network. 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). 1-6. https://doi.org/10.1109/ccnc49032.2021.9369469

Hasan, M., Milon Islam, M., Islam, I., & Hashem, M. M. A. (2019). Attack and Anomaly Detection in IoT Sensors in IoT Sites Using Machine Learning Approaches. Internet of Things, 100059. 7;1-14. https://doi.org/10.1016/j.iot.2019.100059

Campos, E.M., Saura, P.F., González-Vidal, A., Hernández-Ramos, J.L., Bernabe, J.B., Baldini, G. and Skarmeta, A. (2022). Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges. Computer Networks. 203;1-16. https://doi.org/10.1016/j.comnet.2021.108661.

Pecori, R., Tayebi, A., Vannucci, A., & Veltri, L. (2020). IoT Attack Detection with Deep Learning Analysis. 2020 International Joint Conference on Neural Networks (IJCNN). 1-8. https://doi.org/10.1109/ijcnn48605.2020.9207171

[30] Catillo, M., Pecchia, A. and Villano, U. (2023). CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders. Computers & Security. 129;1-15. https://doi.org/10.1016/j.cose.2023.103210.

Amanullah, M. A., Habeeb, R. A. A., Nasaruddin, F. H., Gani, A., Ahmed, E., Nainar, A. S. M., … Imran, M. (2020). Deep learning and big data technologies for IoT security. Computer Communications. 151;495-517. https://doi.org/10.1016/j.comcom.2020.01.016

Saleem, T. J., & Chishti, M. A. (2019). Deep Learning for Internet of Things Data Analytics. Procedia Computer Science. 163;381–390. https://doi.org/10.1016/j.procs.2019.12.120

Verma, A., & Ranga, V. (2019). ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things. 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU). 1-6. https://doi.org/10.1109/iot-siu.2019.8777504

Vishwakarma, M. and Kesswani, N. (2023). A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection. Decision Analytics Journal. 7;1-8. https://doi.org/10.1016/j.dajour.2023.100233.

Elmasry, W., Akbulut, A., & Halim Zaim, A. (2019). Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Computer Networks. 1-48. https://doi.org/10.1016/j.comnet.2019.107042

Telikani, A., & Gandomi, A. H. (2019). Cost-sensitive stacked auto-encoders for intrusion detection in the Internet of things. Internet of Things, 1-25. https://doi.org/10.1016/j.iot.2019.100122

Altunay, H.C. and Albayrak, Z., 2023. A hybrid CNN+ LSTM-based intrusion detection system for industrial IoT networks. Engineering Science and Technology, an International Journal. 38;1-13. https://doi.org/10.1016/j.jestch.2022.101322.

Nguyen, T. D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N., & Sadeghi, A.-R. (2019). DÏoT: A Federated Self-learning Anomaly Detection System for IoT. 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). 1-12. https://doi.org/10.1109/icdcs.2019.00080

Gümüşbaş, D., Yıldırım, T., Genovese, A. and Scotti, F. (2020). A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems. IEEE Systems Journal. 15(2);1717-1731. https://doi.org/10.1109/jsyst.2020.2992966

Amjan Shaik, Bhuvan Unhelkar, & Prasun Chakrabarti. (2025). Exploring Artificial Intelligence and Data Science-Based Security and its Scope in IoT Use Cases. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.869

M. Husain Bathushaw, & S. Nagasundaram. (2024). The Role of Blockchain and AI in Fortifying Cybersecurity for Healthcare Systems. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.596

R, U. M., P, R. S., Gokul Chandrasekaran, & K, M. (2024). Assessment of Cybersecurity Risks in Digital Twin Deployments in Smart Cities. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.494

Vutukuru, S. R., & Srinivasa Chakravarthi Lade. (2025). CoralMatrix: A Scalable and Robust Secure Framework for Enhancing IoT Cybersecurity. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.825

Ahmed, U., Lin, J.C.W. and Srivastava, G. (2022). A resource allocation deep active learning based on load balancer for network intrusion detection in SDN sensors. Computer Communications. 184;56-63. https://doi.org/10.1016/j.comcom.2021.12.009.

Downloads

Published

2025-02-28

How to Cite

Sivananda Hanumanthu, & Gaddikoppula Anil Kumar. (2025). Deep Learning Models with Transfer Learning and Ensemble for Enhancing Cybersecurity in IoT Use Cases. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.1037

Issue

Section

Research Article