journal article Open Access Feb 10, 2025

Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks

Computers Vol. 14 No. 2 pp. 58 · MDPI AG
View at Publisher Save 10.3390/computers14020058
Abstract
The Internet of Things (IoT) ecosystem is rapidly expanding. It is driven by continuous innovation but accompanied by increasingly sophisticated cybersecurity threats. Protecting IoT devices from these emerging vulnerabilities has become a critical priority. This study addresses the limitations of existing IoT threat detection methods, which often struggle with the dynamic nature of IoT environments and the growing complexity of cyberattacks. To overcome these challenges, a novel hybrid architecture combining Convolutional Neural Networks (CNN), Bidirectional Long Short-Term Memory (BiLSTM), and Deep Neural Networks (DNN) is proposed for accurate and efficient IoT threat detection. The model’s performance is evaluated using the IoT-23 and Edge-IIoTset datasets, which encompass over ten distinct attack types. The proposed framework achieves a remarkable 99% accuracy on both datasets, outperforming existing state-of-the-art IoT cybersecurity solutions. Advanced optimization techniques, including model pruning and quantization, are applied to enhance deployment efficiency in resource-constrained IoT environments. The results highlight the model’s robustness and its adaptability to diverse IoT scenarios, which address key limitations of prior approaches. This research provides a robust and efficient solution for IoT threat detection, establishing a foundation for advancing IoT security and addressing the evolving landscape of cyber threats while driving future innovations in the field.
Topics

No keywords indexed for this article. Browse by subject →

References
55
[1]
Zaman "Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey" IEEE Access (2021) 10.1109/access.2021.3089681
[2]
Swamy "An Empirical Study on System Level Aspects of Internet of Things (IoT)" IEEE Access (2020) 10.1109/access.2020.3029847
[3]
Molaei "A Comprehensive Review on Internet of Things (IoT) and its Implications in the Mining Industry" Am. J. Eng. Appl. Sci. (2020) 10.3844/ajeassp.2020.499.515
[4]
Quy, V.K., Hau, N.V., Anh, D.V., Quy, N.M., Ban, N.T., Lanza, S., Randazzo, G., and Muzirafuti, A. (2022). IoT-Enabled Smart Agriculture: Architecture, Applications, and Challenges. Appl. Sci., 12. 10.3390/app12073396
[5]
Kim "A Review of the Applications of the Internet of Things (IoT) for Agricultural Automation" J. Biosyst. Eng. (2020) 10.1007/s42853-020-00078-3
[6]
Kassim, M.R.M. (2020, January 17–19). IoT Applications in Smart Agriculture: Issues and Challenges. Proceedings of the 2020 IEEE Conference on Open Systems (ICOS), Kuala Lumpur, Malaysia. 10.1109/icos50156.2020.9293672
[7]
González-Zamar, M.D., Abad-Segura, E., Vázquez-Cano, E., and López-Meneses, E. (2020). IoT Technology Applications-Based Smart Cities: Research Analysis. Electronics, 9. 10.3390/electronics9081246
[8]
Kanellopoulos, D., Sharma, V.K., Panagiotakopoulos, T., and Kameas, A. (2023). Networking Architectures and Protocols for IoT Applications in Smart Cities: Recent Developments and Perspectives. Electronics, 12. 10.3390/electronics12112490
[9]
Singh "Internet of Things (IoT) applications to fight against COVID-19 pandemic" Diabetes Metab. Syndr. Clin. Res. Rev. (2020) 10.1016/j.dsx.2020.04.041
[10]
Patrono "Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future" J. Clean. Prod. (2020) 10.1016/j.jclepro.2020.122877
[11]
Kaspersky (2024, December 06). Kaspersky Unveils an Overview of IoT-Related Threats in 2023. Kaspersky Press Releases. Available online: https://www.kaspersky.com/about/press-releases/kaspersky-unveils-an-overview-of-iot-related-threats-in-2023.
[12]
Khanna "Internet of Things (IoT), Applications and Challenges: A Comprehensive Review" Wirel. Pers. Commun. (2020) 10.1007/s11277-020-07446-4
[14]
Liao "Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review" IEEE Access (2020) 10.1109/access.2020.3006358
[15]
Muhammad "Cost-effective video summarization using deep CNN with hierarchical weighted fusion for IoT surveillance networks" IEEE Internet Things J. (2020) 10.1109/jiot.2019.2950469
[16]
Khan "Bidirectional LSTM-RNN-Based Hybrid Deep Learning Frameworks for Univariate Time Series Classification" J. Supercomput. (2021) 10.1007/s11227-020-03560-z
[17]
Hua "Recurrently Exploring Class-Wise Attention in a Hybrid Convolutional and Bidirectional LSTM Network for Multi-Label Aerial Image Classification" ISPRS J. Photogramm. Remote Sens. (2019) 10.1016/j.isprsjprs.2019.01.015
[18]
Algethami, S.A., and Alshamrani, S.S. (2024). A Deep Learning-Based Framework for Strengthening Cybersecurity in Internet of Health Things (IoHT) Environments. Appl. Sci., 14. 10.3390/app14114729
[19]
Omarov "One Dimensional Conv-BiLSTM Network with Attention Mechanism for IoT Intrusion Detection" Comput. Math. Methods Eng. (2023)
[20]
Alyilieli "A Comparative Evaluation of Intrusion Detection Systems on the Edge-IIoT-2022 Dataset" Intell. Syst. Appl. (2023)
[21]
Bovenzi "Network Anomaly Detection Methods in IoT Environments via Deep Learning: A Fair Comparison of Performance and Robustness" Comput. Secur. (2023) 10.1016/j.cose.2023.103167
[22]
Kikissagbe "Machine Learning for DoS Attack Detection in IoT Systems" Procedia Comput. Sci. (2024) 10.1016/j.procs.2024.08.027
[23]
Ahli, A., Raza, A., Ovaz, K., and Akpinar, M. (2023, January 20–23). Binary and Multi-Class Classification on the IoT-23 Dataset. Proceedings of the 2023 Advances in Science and Engineering Technology International Conferences (ASET), Dubai, United Arab Emirates. 10.1109/aset56582.2023.10180848
[24]
Zohourian "IoT-PRIDS: Leveraging Packet Representations for Intrusion Detection in IoT Networks" Comput. Secur. (2024) 10.1016/j.cose.2024.104034
[25]
Sahu "Internet of Things Attack Detection Using Hybrid Deep Learning Model" Comput. Commun. (2021) 10.1016/j.comcom.2021.05.024
[26]
Abdulkareem "A Lightweight SEL for Attack Detection in IoT/IIoT Networks" J. Netw. Comput. Appl. (2024) 10.1016/j.jnca.2024.103980
[27]
Riaz, S., Latif, S., Usman, S.M., Ullah, S.S., Algarni, A.D., Yasin, A., Anwar, A., Elmannai, H., and Hussain, S. (2022). Malware Detection in Internet of Things (IoT) Devices Using Deep Learning. Sensors, 22. 10.3390/s22239305
[28]
Halbouni "CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System" IEEE Access (2022) 10.1109/access.2022.3206425
[29]
Altunay "A Hybrid CNN+LSTM-Based Intrusion Detection System for Industrial IoT Networks" Eng. Sci. Technol. Int. J. (2023)
[30]
Nazir "A Deep Learning-Based Novel Hybrid CNN-LSTM Architecture for Efficient Detection of Threats in the IoT Ecosystem" Ain Shams Eng. J. (2024) 10.1016/j.asej.2024.102777
[31]
Bhandari, G., Lyth, A., Shalaginov, A., and Grønli, T.-M. (2023). Distributed Deep Neural-Network-Based Middleware for Cyber-Attacks Detection in Smart IoT Ecosystem: A Novel Framework and Performance Evaluation Approach. Electronics, 12. 10.3390/electronics12020298
[32]
Yazdinejad "An Ensemble Deep Learning Model for Cyber Threat Hunting in Industrial Internet of Things" Digit. Commun. Netw. (2023) 10.1016/j.dcan.2022.09.008
[33]
Bukhari "Enhancing Cybersecurity in Edge IIoT Networks: An Asynchronous Federated Learning Approach with a Deep Hybrid Detection Model" Internet Things (2024) 10.1016/j.iot.2024.101252
[34]
Abdalgawad "Generative Deep Learning to Detect Cyberattacks for the IoT-23 Dataset" IEEE Access (2022) 10.1109/access.2021.3140015
[35]
Zixu, T., Liyanage, K.S.K., and Gurusamy, M. (2020, January 7–11). Generative Adversarial Network and Auto Encoder-Based Anomaly Detection in Distributed IoT Networks. Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan. 10.1109/globecom42002.2020.9348244
[36]
Koroniotis "Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset" Future Gener. Comput. Syst. (2019) 10.1016/j.future.2019.05.041
[37]
Alani, M.M., and Miri, A. (2022). Towards an Explainable Universal Feature Set for IoT Intrusion Detection. Sensors, 22. 10.3390/s22155690
[38]
Moustafa, N. (2019). ToN_IoT Datasets. IEEE Dataport.
[39]
Garcia, S., Parmisano, A., and Erquiaga, M.J. (2020). IoT-23: A Labeled Dataset with Malicious and Benign IoT Network Traffic (Version 1.0.0) [Data set]. Zenodo.
[40]
Alfares, H., and Banimelhem, O. (2006, January 4–6). Comparative Analysis of Machine Learning Techniques for Handling Imbalance in IoT-23 Dataset for Intrusion Detection Systems. Proceedings of the 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Dubai, United Arab Emirates.
[41]
Thiyam "Efficient Feature Evaluation Approach for a Class-Imbalanced Dataset Using Machine Learning" Procedia Comput. Sci. (2023) 10.1016/j.procs.2023.01.226
[42]
Ferrag "Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning" IEEE Access (2022) 10.1109/access.2022.3165809
[43]
Sharafaldin, I., Lashkari, A.H., Hakak, S., and Ghorbani, A.A. (2019, January 1–3). Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. Proceedings of the IEEE 53rd International Carnahan Conference on Security Technology, Chennai, India. 10.1109/ccst.2019.8888419
[44]
Gheni "Two-Step Data Clustering for Improved Intrusion Detection System Using CICIoT2023 Dataset" e-Prime-Adv. Electr. Eng. Electron. Energy (2024) 10.1016/j.prime.2024.100673
[45]
Mahdi "Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms" Comput. Mater. Contin. (2024)
[46]
Bakhsh "Enhancing IoT Network Security Through Deep Learning-Powered Intrusion Detection System" Internet Things (2023) 10.1016/j.iot.2023.100936
[47]
Pruning and quantization for deep neural network acceleration: A survey

Tailin Liang, John Glossner, Lei Wang et al.

Neurocomputing 10.1016/j.neucom.2021.07.045
[48]
Bibi "Advances in Pruning and Quantization for Natural Language Processing" IEEE Access (2024) 10.1109/access.2024.3465631
[49]
Zeeshan, M. (2024). Efficient Deep Learning Models for Edge IoT Devices—A Review, Department of Electrical Engineering, Indian Institute of Technology Patna. Available online: https://d197for5662m48.cloudfront.net/documents/publicationstatus/216349/preprint_pdf/fd256b0205683d43c9f61e8327fec378.pdf.
[50]
Courbariaux "BinaryConnect: Training Deep Neural Networks with Binary Weights During Propagations" Adv. Neural Inf. Process. Syst. (2015)

Showing 50 of 55 references

Metrics
14
Citations
55
References
Details
Published
Feb 10, 2025
Vol/Issue
14(2)
Pages
58
License
View
Cite This Article
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al. (2025). Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks. Computers, 14(2), 58. https://doi.org/10.3390/computers14020058
Related

You May Also Like