Anomaly based Intrusion Detection to Enhance IoT Devices Security using LSTM and Radial Basis Function Approach

The growing prevalence of IoT devices has rendered their security a paramount issue. Intrusion detection is essential for protecting IoT systems from potential attackers. Anomaly-based intrusion detection systems, despite their capacity to identify previously undiscovered threats, are frequently dis...

Full description

Saved in:
Bibliographic Details
Published in:2025 3rd International Conference on Data Science and Information System (ICDSIS) pp. 1 - 6
Main Authors: Narayana, G. V. L, G, Sharmila, A, Mohaideen, Sathya, S., Vennila, C., Nishant, Neerav
Format: Conference Proceeding
Language:English
Published: IEEE 16.05.2025
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The growing prevalence of IoT devices has rendered their security a paramount issue. Intrusion detection is essential for protecting IoT systems from potential attackers. Anomaly-based intrusion detection systems, despite their capacity to identify previously undiscovered threats, are frequently disregarded in favour of signature-based detection methods. Nonetheless, anomaly-based methods can be equally efficacious in thwarting intrusions. A significant problem in this field is assessing the efficacy of diverse anomaly detection strategies, which has led to reluctance among organisations in implementing these methods. The suggested methodology comprises three fundamental steps: data cleansing, feature extraction, and model training. During preprocessing, the most pertinent properties are chosen. PCA is utilised for feature extraction to discern the most informative attributes. The model is further trained with LSTM-RBF networks to improve detecting skills. The experimental findings demonstrate that the suggested method surpasses the two predominant alternatives, LSTM and RBF, attaining a detection rate of 97% and a low false alarm rate of 2%. The findings underscore the exceptional efficacy of the proposed LSTM-RBF method in accurately detecting intrusions while minimising false alarms, thereby illustrating its potential to enhance IoT security frameworks and promote the broader implementation of anomaly-based techniques in practical applications.
AbstractList The growing prevalence of IoT devices has rendered their security a paramount issue. Intrusion detection is essential for protecting IoT systems from potential attackers. Anomaly-based intrusion detection systems, despite their capacity to identify previously undiscovered threats, are frequently disregarded in favour of signature-based detection methods. Nonetheless, anomaly-based methods can be equally efficacious in thwarting intrusions. A significant problem in this field is assessing the efficacy of diverse anomaly detection strategies, which has led to reluctance among organisations in implementing these methods. The suggested methodology comprises three fundamental steps: data cleansing, feature extraction, and model training. During preprocessing, the most pertinent properties are chosen. PCA is utilised for feature extraction to discern the most informative attributes. The model is further trained with LSTM-RBF networks to improve detecting skills. The experimental findings demonstrate that the suggested method surpasses the two predominant alternatives, LSTM and RBF, attaining a detection rate of 97% and a low false alarm rate of 2%. The findings underscore the exceptional efficacy of the proposed LSTM-RBF method in accurately detecting intrusions while minimising false alarms, thereby illustrating its potential to enhance IoT security frameworks and promote the broader implementation of anomaly-based techniques in practical applications.
Author Nishant, Neerav
Sathya, S.
Narayana, G. V. L
Vennila, C.
G, Sharmila
A, Mohaideen
Author_xml – sequence: 1
  givenname: G. V. L
  surname: Narayana
  fullname: Narayana, G. V. L
  email: gvlnarayana.it@adityatekkali.edu.in
  organization: Aditya Institute of Technology and Management,Department of Information Technology,Tekkali,India
– sequence: 2
  givenname: Sharmila
  surname: G
  fullname: G, Sharmila
  email: charmicse@gmail.com
  organization: Sri Eshwar College of Engineering,Department of Artificial Intelligence and Machine Learning,Coimbatore,India
– sequence: 3
  givenname: Mohaideen
  surname: A
  fullname: A, Mohaideen
  email: mohaideenamqtr@gmail.com
  organization: Malla Reddy College of Engineering,Department of Computer Science and Engineering and Data Science,Secunderabad,India
– sequence: 4
  givenname: S.
  surname: Sathya
  fullname: Sathya, S.
  email: sathyas@saec.ac.in
  organization: S.A. Engineering College,Department of Electrical and Electronics Engineering,Chennai,India
– sequence: 5
  givenname: C.
  surname: Vennila
  fullname: Vennila, C.
  email: vennila.c_maths@psvpec.in
  organization: Padmavathy Engineering College,Department of Science and Humanities Prince Shri Venkateshwara,Chennai,India
– sequence: 6
  givenname: Neerav
  surname: Nishant
  fullname: Nishant, Neerav
  email: contactnn01@gmail.com
  organization: Babu Banarasi Das University,School of Engineering,Department of Computer Science and Engineering,Lucknow,India
BookMark eNo1UMtOwzAQNBIcoPQPOJgPSIm9dh7H0AdEKkIiuVcbe0MttXaVB1L_nlSF045mRqOZfWC3Pnhi7FnECyHi_KVcrqqySjRovZCx1Bc2FTKGGzbP0zwDEFrJRGf3LBQ-HPFw5g32ZHnph27sXfB8RQOZ4YKGwNd-j94QL0M9CT_OUM8rMmPnhjOf_P6bb6v6g6O3_AutwwN_xd71fDP6a0hxOnUBzf6R3bV46Gn-d2es3qzr5Xu0_Xwrl8U2cjkMkdUGZJOYFNNEttTQ1FVjYrVqIDbTAmFRZaB022YKGi1Ay9aaBAhSRJXCjD1dYx0R7U6dO2J33v2_AX4BYvRYqg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICDSIS65355.2025.11071203
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798331542658
EndPage 6
ExternalDocumentID 11071203
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i93t-d5c32b6c7a762febe6585a6d54b30c7981da48345ff843b51352fdc63e37aa473
IEDL.DBID RIE
IngestDate Wed Aug 06 17:54:40 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i93t-d5c32b6c7a762febe6585a6d54b30c7981da48345ff843b51352fdc63e37aa473
PageCount 6
ParticipantIDs ieee_primary_11071203
PublicationCentury 2000
PublicationDate 2025-May-16
PublicationDateYYYYMMDD 2025-05-16
PublicationDate_xml – month: 05
  year: 2025
  text: 2025-May-16
  day: 16
PublicationDecade 2020
PublicationTitle 2025 3rd International Conference on Data Science and Information System (ICDSIS)
PublicationTitleAbbrev ICDSIS
PublicationYear 2025
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.908501
Snippet The growing prevalence of IoT devices has rendered their security a paramount issue. Intrusion detection is essential for protecting IoT systems from potential...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Anomaly detection
distributed convolutional neural network (DCNN)
Faces
Feature extraction
improved conditional variational autoencoder (ICVAE)
Information systems
Internet of Things
Long short term memory
long short-term memory (LSTM)
Network intrusion detection
network intrusion detection systems (nids)
Principal component analysis
principal component analysis (PCA)
Security
Training
Title Anomaly based Intrusion Detection to Enhance IoT Devices Security using LSTM and Radial Basis Function Approach
URI https://ieeexplore.ieee.org/document/11071203
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF5sEfGkYsU3K3hN22RfyVFri4Faismht7KvaKEmYqPgv3d2myoePHgLmzCBGdiZb3e-bxC6jrTQNIlkwIwyAQ0BoChLTRAryygpOKx6EdexmEzi2SyZNmR1z4Wx1vrmM9t1j_4u31T63R2V9RxWAWukhVpC8DVZawddNbqZvXRwl6UZZ5BCAfhFrLv5_tfkFJ84Rnv__OU-6vxQ8PD0O7kcoC1bHqIKwPqLXH5il3sMTkvHmADH4jtb-5aqEtcVHpbPLpQ4rXJ44XcCnDVj6rDrc3_C4yx_wLI0-NFJEyzxrVwtVngEOc4buWmExjsoHw3zwX3QTEwIFgmpA8M0iRTXQsIWV0B4oLxgkhtGFelrkUBtKt3hISuKmBLFQqi-CqM5sURISQU5Qu2yKu0xwk6GzCZgqNCC9rWV3CpAfomJVWJCG5-gjnPW_HWtiTHf-On0j_UztOtC4u7dQ36O2uAfe4G29Ue9WL1d-kh-AT8DoeQ
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60inpSseLbFbymbbK7eRy1DxpMSzE59Fb2lVqoidgo-O-dXVPFgwdvYUMmMAP7zezO9w1Ct54MJI087jAllENdKFCEpsoJhWaU5D6sWhHXJBiPw-k0mtRkdcuF0Vrb5jPdMo_2Ll-V8s0clbVNrQLWyCbaMqOzarrWDrqplTPbcbeXxqnPAESh9PNYa_3Fr9kpFjoG-__86QFq_pDw8OQbXg7Rhi6OUAnl-jNffmCDPgrHheFMgGtxT1e2qarAVYn7xZMJJo7LDF7YvQCn9aA6bDrd5zhJsxHmhcKPRpxgie_5arHCA0A5a-SulhpvomzQz7pDp56Z4CwiUjmKSeIJXwYcNrkcAgQJBuO-YlSQjgwiyE65OT5keR5SIpgL-VeupE80CTinATlGjaIs9AnCRohMR2AolwHtSM19LaD2i1QoIuXq8BQ1jbNmL1-qGLO1n87-WL9Gu8NslMySePxwjvZMeMwtvOtfoAb4Sl-ibfleLVavVzaqn9typS0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2025+3rd+International+Conference+on+Data+Science+and+Information+System+%28ICDSIS%29&rft.atitle=Anomaly+based+Intrusion+Detection+to+Enhance+IoT+Devices+Security+using+LSTM+and+Radial+Basis+Function+Approach&rft.au=Narayana%2C+G.+V.+L&rft.au=G%2C+Sharmila&rft.au=A%2C+Mohaideen&rft.au=Sathya%2C+S.&rft.date=2025-05-16&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FICDSIS65355.2025.11071203&rft.externalDocID=11071203