Application of Deep Learning Techniques for Automatic Detection of Network Security Threats in Internet of Things Environments


Aidynov T. Altaibek M. Tleuberdin S. Nurusheva A. Satybaldina D. Abisheva G.
2025Institute of Electrical and Electronics Engineers Inc.

IEEE European Technology and Engineering Management Summit, E-TEMS
2025Issue 2025237 - 245 pp.

This paper presents a comprehensive investigation into the implementation of cutting-edge machine learning paradigms for fortifying cybersecurity on the Internet of Things (IoT) ecosystem, with a particular focus on two pivotal datasets: the extensively utilized IoT-23 dataset and the specialized CRAFTED - Cooja RPL Attack Framework Test and Evaluation Dataset. Employing empirical analyses of simulated cyber threats, this research constructs multiple machine learning models to predict and classify a wide spectrum of IoT attack vectors and parameters with enhanced precision. Through rigorous experimentation, we evaluate an array of deep learning architectures, including Long Short-Term Memory (LSTM) networks and Residual Networks (ResNet), juxtaposing their efficacy against conventional machine learning models. The results showed that deep learning methods are good at identifying complex patterns in multidimensional data. However, traditional models such as Random Forest (RF) and Decision Trees (DT) have proven to be more efficient in terms of processing speed and classification accuracy in real time, making them the preferred choice for practical applications. The study also used methods for selecting features and adjusting model parameters, which significantly improved their accuracy. These approaches have provided useful technical insights and solutions for timely threat detection in IoT networks. The work carried out creates the basis for further research in the field of identifying cyber threats and anomalies, contributing to the development of reliable and intelligent cybersecurity systems.

anomaly detection , dataset , decision tree , deep learning , Internet of Things , LSTM , network security , ResNet

Text of the article Перейти на текст статьи

L.N. Gumilyov Eurasian National University, Faculty of Information Technologies, Department of Information Security, Astana, Kazakhstan
Research Institute of Information Security and Cryptology, L.N. Gumilyov Eurasian National University, Astana, Kazakhstan
Astana IT University, Department of Computer Engineering, Astana, Kazakhstan

L.N. Gumilyov Eurasian National University
Research Institute of Information Security and Cryptology
Astana IT University

10 лет помогаем публиковать статьи Международный издатель

Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026