Deep Learning Models with Transfer Learning and Ensemble for Enhancing Cybersecurity in IoT Use Cases
DOI:
https://doi.org/10.22399/ijcesen.1037Keywords:
Internet of Things, Artificial Intelligence, Cybersecurity, Deep Learning Transfer Learning, Hyperparameter OptimizationAbstract
Internet of Things (IoT) applications have made inroads into different domains, providing unique solutions—Internet of Things technology offers seamless integration of physical and digital worlds. However, the broad nature of the technologies and protocols used in IoT applications has increased vulnerability from malicious attackers. Hence, protecting IoT applications from cyber-attacks is imperative. Researchers have implemented intrusion detection systems to overcome this issue to improve cybersecurity in IoT scenarios. With the new threats of cybercrime emerging, a continuous effort is required to enhance the security of IoT applications. To address this pressing need, we present our study that proposes a deep learning-based framework to bolster cybersecurity at the IoT use cases level by exploiting the power of transfer learning and ensembling it from deep learning models pre-trained at larger datasets. Deep learning models attain high performance with the help of hyperparameter tuning, and we achieve that through PSO in our proposed system. Our ensemble system shows how individual models can outperform individual models by using the best-performing models as constituents in the ensemble approach. We introduce an algorithm called — Optimized Ensemble Learning-Based Intrusion Detection (OEL-ID). This algorithm leverages the present framework and corresponding optimization strategies to boost intrusion detection performance for improved cyber security in IoT scenarios. Using the UNSW-NB15 benchmark dataset, our empirical study demonstrates that our proposed method, compared to some of the existing deep learning models, obtained a detection accuracy of 98.89%, which, in turn, provided the highest comparative accuracy. Therefore, the proposed system can be used with IoT use cases as it allows for a significant level of security to the system's underlying applications
References
Ibitoye, O., Shafiq, O., & Matrawy, A. (2019). Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks. 2019 IEEE Global Communications Conference (GLOBECOM). 1-6. https://doi.org/10.1109/globecom38437.2019.9014337
Madhu, B., Chari, M.V.G., Vankdothu, R., Silivery, A.K. and Aerranagula, V. (2023). Intrusion detection models for IOT networks via deep learning approaches. Measurement: Sensors. 25, 1-14. https://doi.org/10.1016/j.measen.2022.100641
Keshk, M., Koroniotis, N., Pham, N., Moustafa, N., Turnbull, B. and Zomaya, A.Y. (2023). An explainable deep learning-enabled intrusion detection framework in IoT networks. Information Sciences. 639;1-20. https://doi.org/10.1016/j.ins.2023.119000
Bassey, J., Adesina, D., Li, X., Qian, L., Aved, A., & Kroecker, T. (2019). Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning. 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC). 98-104. https://doi.org/10.1109/fmec.2019.8795319
Fatani, A., Abd Elaziz, M., Dahou, A., Al-Qaness, M.A. and Lu, S. (2021). IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access. 9;123448-123464. https://doi.org/10.1109/ACCESS.2021.3109081
Lazzarini, R., Tianfield, H. and Charissis, V. (2023). A stacking ensemble of deep learning models for IoT intrusion detection. Knowledge-Based Systems. 279;1-13. https://doi.org/10.1016/j.knosys.2023.110941.
Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications. 50;1-19. https://doi.org/ 10.1016/j.jisa.2019.102419.
Bakhsh, S.A., Khan, M.A., Ahmed, F., Alshehri, M.S., Ali, H. and Ahmad, J. (2023). Enhancing IoT network security through deep learning-powered Intrusion Detection System. Internet of Things. 24;1-36. https://doi.org/10.1016/j.iot.2023.100936
Jayalaxmi, P.L.S., Saha, R., Kumar, G., Conti, M. and Kim, T.H. (2022). Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey. IEEE Access, 10;121173-121192. https://doi.org/10.1109/ACCESS.2022.3220622
Bovenzi, G., Aceto, G., Ciuonzo, D., Persico, V., & Pescape, A. (2020). A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios. GLOBECOM 2020 - 2020 IEEE Global Communications Conference. 1-7. https://doi.org/10.1109/globecom42002.2020.9348167.
Vishwakarma, M. and Kesswani, N. (2022). DIDS: A Deep Neural Network based real-time Intrusion detection system for IoT. Decision Analytics Journal. 5;1-9. https://doi.org/10.1016/j.dajour.2022.100142
Soliman, S., Oudah, W. and Aljuhani, A.,(2023). Deep learning-based intrusion detection approach for securing industrial Internet of Things. Alexandria Engineering Journal 81;371-383. https://doi.org/10.1016/j.aej.2023.09.023.
Rezvy, S., Luo, Y., Petridis, M., Lasebae, A., & Zebin, T. (2019). An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 2019 53rd Annual Conference on Information Sciences and Systems (CISS). 1-6. https://doi.org/10.1109/ciss.2019.8693059
Saleem, T. J., & Chishti, M. A. (2020). Deep learning for the internet of things: potential benefits and use-cases. Digital Communications and Networks. 1-24. https://doi.org/10.1016/j.dcan.2020.12.002
Akgun, D., Hizal, S. and Cavusoglu, U. (2022). A new DDoS attacks intrusion detection model based on deep learning for cybersecurity. Computers & Security. 118;1-13. https://doi.org/10.1016/j.cose.2022.102748
Ullah, I. and Mahmoud, Q.H. (2021). Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9;103906-103926. https://doi.org/10.1109/ACCESS.2021.3094024
Qiu, H., Dong, T., Zhang, T., Lu, J., Memmi, G., & Qiu, M. (2021). Adversarial Attacks Against Network Intrusion Detection in IoT Systems. IEEE Internet of Things Journal. 8(13);10327–10335. https://doi.org/10.1109/jiot.2020.3048038
Kasongo, S.M. (2023). A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework. Computer Communications, 199;113-125. https://doi.org/10.1016/j.comcom.2022.12.010.
Rahman, S. A., Tout, H., Talhi, C., & Mourad, A. (2020). Internet of Things Intrusion Detection: Centralized, On-Device, or Federated Learning? IEEE Network. 34(6);310–317. https://doi.org/10.1109/mnet.011.2000286
Hnamte, V. and Hussain, J. (2023). DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system. Telematics and Informatics Reports. 10;1-13. https://doi.org/10.1016/j.teler.2023.100053.
Cassales, G. W., Senger, H., de Faria, E. R., & Bifet, A. (2019). IDSA-IoT: An Intrusion Detection System Architecture for IoT Networks. 2019 IEEE Symposium on Computers and Communications (ISCC). 1-7. https://doi.org/10.1109/iscc47284.2019.8969609
Anushiya, R. and Lavanya, V.S. (2023). A new deep-learning with swarm based feature selection for intelligent intrusion detection for the Internet of things. Measurement: Sensors, 26, pp.1-9.. https://doi.org/10.1016/j.measen.2023.100700.
Yahyaoui, A., Abdellatif, T., & Attia, R. (2019). Hierarchical anomaly based intrusion detection and localization in IoT. 2019 15th International Wireless Communications & Mobile Computing Conference. 108-113. https://doi.org/10.1109/iwcmc.2019.8766574
Li, B., Wu, Y., Song, J., Lu, R., Li, T., & Zhao, L. (2020). DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems. IEEE Transactions on Industrial Informatics. 1–10. https://doi.org/10.1109/tii.2020.3023430
Hazman, C., Guezzaz, A., Benkirane, S. and Azrour, M. (2023). lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Cluster Computing, 26(6);4069-4083. https://doi.org/10.1007/s10586-022-03810-0.
Singh, P., P, J. J., Pankaj, A., & Mitra, R. (2021). Edge-Detect: Edge-Centric Network Intrusion Detection using Deep Neural Network. 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). 1-6. https://doi.org/10.1109/ccnc49032.2021.9369469
Hasan, M., Milon Islam, M., Islam, I., & Hashem, M. M. A. (2019). Attack and Anomaly Detection in IoT Sensors in IoT Sites Using Machine Learning Approaches. Internet of Things, 100059. 7;1-14. https://doi.org/10.1016/j.iot.2019.100059
Campos, E.M., Saura, P.F., González-Vidal, A., Hernández-Ramos, J.L., Bernabe, J.B., Baldini, G. and Skarmeta, A. (2022). Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges. Computer Networks. 203;1-16. https://doi.org/10.1016/j.comnet.2021.108661.
Pecori, R., Tayebi, A., Vannucci, A., & Veltri, L. (2020). IoT Attack Detection with Deep Learning Analysis. 2020 International Joint Conference on Neural Networks (IJCNN). 1-8. https://doi.org/10.1109/ijcnn48605.2020.9207171
[30] Catillo, M., Pecchia, A. and Villano, U. (2023). CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders. Computers & Security. 129;1-15. https://doi.org/10.1016/j.cose.2023.103210.
Amanullah, M. A., Habeeb, R. A. A., Nasaruddin, F. H., Gani, A., Ahmed, E., Nainar, A. S. M., … Imran, M. (2020). Deep learning and big data technologies for IoT security. Computer Communications. 151;495-517. https://doi.org/10.1016/j.comcom.2020.01.016
Saleem, T. J., & Chishti, M. A. (2019). Deep Learning for Internet of Things Data Analytics. Procedia Computer Science. 163;381–390. https://doi.org/10.1016/j.procs.2019.12.120
Verma, A., & Ranga, V. (2019). ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things. 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU). 1-6. https://doi.org/10.1109/iot-siu.2019.8777504
Vishwakarma, M. and Kesswani, N. (2023). A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection. Decision Analytics Journal. 7;1-8. https://doi.org/10.1016/j.dajour.2023.100233.
Elmasry, W., Akbulut, A., & Halim Zaim, A. (2019). Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Computer Networks. 1-48. https://doi.org/10.1016/j.comnet.2019.107042
Telikani, A., & Gandomi, A. H. (2019). Cost-sensitive stacked auto-encoders for intrusion detection in the Internet of things. Internet of Things, 1-25. https://doi.org/10.1016/j.iot.2019.100122
Altunay, H.C. and Albayrak, Z., 2023. A hybrid CNN+ LSTM-based intrusion detection system for industrial IoT networks. Engineering Science and Technology, an International Journal. 38;1-13. https://doi.org/10.1016/j.jestch.2022.101322.
Nguyen, T. D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N., & Sadeghi, A.-R. (2019). DÏoT: A Federated Self-learning Anomaly Detection System for IoT. 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). 1-12. https://doi.org/10.1109/icdcs.2019.00080
Gümüşbaş, D., Yıldırım, T., Genovese, A. and Scotti, F. (2020). A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems. IEEE Systems Journal. 15(2);1717-1731. https://doi.org/10.1109/jsyst.2020.2992966
Amjan Shaik, Bhuvan Unhelkar, & Prasun Chakrabarti. (2025). Exploring Artificial Intelligence and Data Science-Based Security and its Scope in IoT Use Cases. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.869
M. Husain Bathushaw, & S. Nagasundaram. (2024). The Role of Blockchain and AI in Fortifying Cybersecurity for Healthcare Systems. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.596
R, U. M., P, R. S., Gokul Chandrasekaran, & K, M. (2024). Assessment of Cybersecurity Risks in Digital Twin Deployments in Smart Cities. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.494
Vutukuru, S. R., & Srinivasa Chakravarthi Lade. (2025). CoralMatrix: A Scalable and Robust Secure Framework for Enhancing IoT Cybersecurity. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.825
Ahmed, U., Lin, J.C.W. and Srivastava, G. (2022). A resource allocation deep active learning based on load balancer for network intrusion detection in SDN sensors. Computer Communications. 184;56-63. https://doi.org/10.1016/j.comcom.2021.12.009.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.