Machine Learning Techniques for Enhanced Intrusion Detection in IoT Security
| dc.contributor.author | Hakami, Hanadi | |
| dc.contributor.author | Faheem, Muhammad | |
| dc.contributor.author | Bashir Ahmad, Majid | |
| dc.contributor.orcid | https://orcid.org/0000-0003-4628-4486 | |
| dc.date.accessioned | 2026-01-29T13:58:00Z | |
| dc.date.issued | 2025 | |
| dc.description.abstract | Network Intrusion Detection Systems (NIDSs) are fundamental to safeguarding computer networks. Intrusion detection systems must become more effective as new attacks are developed and networks grow. Anomaly-based automated detection stands out due to its superior performance among the various detection techniques. However, with the increasing complexity and frequency of cyberattacks, managing vast amounts of data remains challenging for anomaly-based NIDS. Therefore, it is necessary to find an efficient method for solving the problem by using classification with an intrusion detection system which analyzes enormous amounts of traffic data. This research introduces a new model that leverages machine learning (ML) and deep learning (DL) to enhance detection effectiveness and ensure reliability. The approach optimizes data preprocessing by integrating SMOTE for effective data balancing and Pearson’s Correlation Coefficient (PCC) for feature selection. We compared several ML and DL techniques to detect and address the most efficient one for our pipeline. Compared with other approaches, LSTM and RF show superior results when tested on the WSN-DS, UNSW-NB15, and CIC-IDS 2017 datasets. Additionally, the proposed solution prevents biases from arising by addressing imbalanced datasets. | en |
| dc.description.notification | © 2025 The Authors. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ | |
| dc.description.reviewstatus | fi=vertaisarvioitu|en=peerReviewed| | |
| dc.format.pagerange | 31140-31158 | |
| dc.identifier.uri | https://osuva.uwasa.fi/handle/11111/19723 | |
| dc.identifier.urn | URN:NBN:fi-fe202601299830 | |
| dc.language.iso | en | |
| dc.publisher | IEEE | |
| dc.relation.doi | https://doi.org/10.1109/ACCESS.2025.3542227 | |
| dc.relation.funder | Teknologian tutkimuskeskus VTT | fi |
| dc.relation.funder | VTT Technical Research Centre of Finland | en |
| dc.relation.ispartofjournal | IEEE access | |
| dc.relation.issn | 2169-3536 | |
| dc.relation.url | https://doi.org/10.1109/ACCESS.2025.3542227 | |
| dc.relation.url | https://urn.fi/URN:NBN:fi-fe202601299830 | |
| dc.relation.volume | 13 | |
| dc.rights | https://creativecommons.org/licenses/by/4.0/ | |
| dc.source.identifier | WOS:001425541100040 | |
| dc.source.identifier | 2-s2.0-85217974303 | |
| dc.source.identifier | 5b7a0137-8f87-4023-952a-6edbfafb627d | |
| dc.source.metadata | SoleCRIS | |
| dc.subject | Intrusion detection | |
| dc.subject | IoT | |
| dc.subject | classification | |
| dc.subject | machine/deep learning | |
| dc.subject | random forests | |
| dc.subject | long-short-term-memory | |
| dc.subject | IoT | |
| dc.subject | classification | |
| dc.subject | machine/deep learning | |
| dc.subject | random forests | |
| dc.subject | long-short-term-memory | |
| dc.subject.discipline | fi=Tietotekniikka tekn|en=Information Technology tech| | |
| dc.title | Machine Learning Techniques for Enhanced Intrusion Detection in IoT Security | |
| dc.type.okm | fi=A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä (vertaisarvioitu)|en=A1 Journal article (peer-reviewed)| | |
| dc.type.publication | article | |
| dc.type.version | publishedVersion |
Tiedostot
1 - 1 / 1
