Hybrid Convolutional Neural Network-Based Intrusion Detection System for Secure IoT Networks
Main Article Content
Abstract
Security vulnerabilities are a growing concern due to the increasing prevalence of Internet of Things (IoT) devices. This paper presents a hybrid Convolutional neural network (CNN)-based intrusion detection system (IDS) for IoT networks that detects threats. The research tackles the shortcomings of existing IDSs, which focus on individual threats and are computationally expensive. The proposed method outperforms the traditional machine learning and deep learning models in identifying IoT network attacks. The goal of this study is to create an effective IDS for IoT networks that can detect a range of anomalies and malicious attacks. The research aims to address the limitations of existing intrusion detection systems (IDSs) by enhancing their ability to detect a broader range of attacks with improved performance through the addition of a "long short-term memory (LSTM)" component and the utilization of a hybrid CNN model. The proposed model includes data gathering, preprocessing, network training, and attack identification. System logs and their features are selected for data collection, followed by preprocessing to remove noise. The training model defines the convolutional layer's structure, sliding window size, neuron connection weights, and outputs using the improved data. The training period is used for attack detection, and the weights are calculated from trained and real-time data. Using the UNSW NB15 dataset, the suggested IDS is tested against a recurrent neural network (RNN) system. The suggested model outperforms the RNN model in several performance parameters, achieving a 99.1% detection accuracy, 4% higher. CNN-based intrusion detection in IoT networks is stressed in the study. It shows how hybrid CNN-based techniques can improve IoT network security and resilience. The proposed IDS introduces a novel approach that utilizes a hybrid CNN model and incorporates LSTM to enhance the detection capabilities of IoT network attacks. The study highlights the significance of leveraging advanced machine learning techniques to maintain the integrity and privacy of IoT systems.
Metrics
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
THIS IS AN OPEN ACCESS ARTICLE UNDER THE CC BY LICENSE http://creativecommons.org/licenses/by/4.0/
Plaudit
References
Rath M, Swain J, Pati B, Pattanayak BK. Network Security: Attacks and Control in MANET. In: Handbook of Research on Network Forensics and Analysis Techniques. IGI Global; 2018:19-37.
Hosenkhan MR, Pattanayak BK. Security Issues in Internet of Things (IoT): A Comprehensive Review. In: New Paradigm in Decision Science and Management: Proceedings of ICDSM 2018. 2020:359-369.
Laha SR, Nayak DSK. Cybersecurity Challenges in IoT-Based Healthcare Systems: A Survey. In: Intelligent Security Solutions for Cyber-Physical Systems. Chapman and Hall/CRC; 2021:203-215.
Rath M, Pattanayak BK. Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET. International Journal of Information Security and Privacy 2019; 13(1):46-58.
Elzaghmouri BM, Habboush AK, Abu-Zanona M, Laha SR, Pattanayak BK, Pattnaik S, Mohanty B. Securing Industrial IoT Environments Through Machine Learning-Based Anomaly Detection in the Age of Pervasive Connectivity. International Journal of Intelligent Systems and Applications in Engineering 2023; 12(2):733-740.
Biswal AK, Singh D, Pattanayak BK, Samanta D, Yang MH. IoT-Based Smart Alert System for Drowsy Driver Detection. Wireless Communications and Mobile Computing 2021; 2021:1-13.
Laha SR, Pattanayak BK, Pattnaik S, Hosenkhan MR. Challenges Associated with Cybersecurity for Smart Grids Based on IoT. In: Intelligent Security Solutions for Cyber-Physical Systems. Chapman and Hall/CRC; 2024:191-202.
Vermesan O, Friess P, Guillemin P, Giaffreda R, Grindvoll H, Eisenhauer M, Tragos EZ. Internet of Things Beyond the Hype: Research, Innovation and Deployment. In: Building the Hyperconnected Society-Internet of Things Research and Innovation Value Chains, Ecosystems and Markets. River Publishers; 2022:15-118.
Lin Y, Wang J, Tu Y, Chen L, Dou Z. Time-Related Network Intrusion Detection Model: A Deep Learning Method. 2019 IEEE Global Communications Conference (GLOBECOM). IEEE; 2019:1-6.
Vigneswaran RK, Vinayakumar R, Soman KP, Poornachandran P. Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security. 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE; 2018:1-6.
Adat V, Gupta BB. Security in Internet of Things: Issues, Challenges, Taxonomy, and Architecture. Telecommunication Systems 2018; 67(3):423-441.
Nayak SK, Nayak AK, Laha SR, Tripathy N, Smadi TA. A Robust Deep Learning-Based Speaker Identification System Using Hybrid Model on KUI Dataset. International Journal of Electrical and Electronics Research 2024; 12(4):1502-1507.
Stephen R, Arockiam L. Intrusion Detection System to Detect Sinkhole Attack on RPL Protocol in Internet of Things. International Journal of Electrical Electronics and Computer Science 2017; 4(4):16-20.
Raza S, Wallgren L, Voigt T. SVELTE: Real-Time Intrusion Detection in the Internet of Things. Ad Hoc Networks 2013; 11(8):2661-2674.
Pongle P, Chavan G. Real Time Intrusion and Wormhole Attack Detection in Internet of Things. International Journal of Computer Applications 2015; 121(9): 1-9.
Jun C, Chi C. Design of Complex Event-Processing IDS in Internet of Things. Sixth International Conference on Measuring Technology and Mechatronics Automation. IEEE; 2014:226-229.
Summerville DH, Zach KM, Chen Y. Ultra-Lightweight Deep Packet Anomaly Detection for Internet of Things Devices. IEEE 34th International Performance Computing and Communications Conference (IPCCC). IEEE; 2015:1-8.
Al Smadi T, Gaeid KS, Mahmood AT, Hussein RJ, Al-Husban Y. State Space Modeling and Control of Power Plant Electrical Faults with Neural Networks for Diagnosis. Results in Engineering 2025; 25:104582.
Midi D, Rullo A, Mudgerikar A, Bertino E. Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things. IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE; 2017:656-666.
Thanigaivelan NK, Nigussie E, Kanth RK, Virtanen S, Isoaho J. Distributed Internal Anomaly Detection System for Internet-of-Things. 13th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE; 2016:319-320.
Oh D, Kim D, Ro WW. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things. Sensors 2014; 14(12):24188-24211.
Musleh D, Alotaibi M, Alhaidari F, Rahman A, Mohammad RM. Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT. Journal of Sensor and Actuator Networks 2023; 12(2):29, (1-19).
Hussain MZ, Hanapi ZM. Efficient Secure Routing Mechanisms for the Low-Powered IoT Network: A Literature Review. Electronics 2023; 12(3):482, (1-25).
Yazdinejad A, Dehghantanha A, Parizi RM, Srivastava G, Karimipour H. Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks. Computers in Industry 2023; 144: 103801.
Habboush AK, Elzaghmouri BM, Pattanayak BK, Pattnaik S, Haboush RA. An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment. Tikrit Journal of Engineering Sciences 2023; 30(4):153-158.
Cai J, Liang W, Li X, Li K, Gui Z, Khan MK. GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network. IEEE Internet of Things Journal 2023; 10(24):21502-21514.
Kharche A, Badholia S, Upadhyay RK. Implementation of Blockchain Technology in Integrated IoT Networks for Constructing Scalable ITS Systems in India. Blockchain: Research and Applications 2024; 5(2):100188.
Karthikeyan M, Manimegalai D, RajaGopal K. Firefly Algorithm Based WSN-IoT Security Enhancement with Machine Learning for Intrusion Detection. Scientific Reports 2024; 14(1):231.
Hussein AR. Internet of Things (IoT): Research Challenges and Future Applications. International Journal of Advanced Computer Science and Applications 2019; 10(6):77-82.
Elzaghmouri B, Elwasil O, Elaiwat S, Al-Khateeb A, AbdelRahman SM, Osman AAF, Ataelfadiel MAM, AbuDawas M, Abu-Zanona M, Zawaideh FH, Doumi AB. Comprehensive Evaluation of Transfer-CNN Based Models for Breast Cancer Detection. Journal of Information Systems Engineering and Management 2025; 10(13): 338-353.
Shambour Q. A Deep Learning Based Algorithm for Multi-Criteria Recommender Systems. Knowledge-Based Systems 2021; 211:106545.