An Approach for Detecting Security Attacks using Machine Learning in IoT Environment

Main Article Content

Satish S. Banait, Ashwini B. Gavali, Shrinivas T. Shirkande, Aditi Lule, Anup Bhange, Kanchan Wagh


The strong security measures are becoming even more necessary to protect these networked systems as a result of the proliferation of Internet of Things (IoT) devices. The dynamic and varied nature of IoT networks frequently makes it impossible for traditional security solutions to be effective. The method suggested in this research uses machine learning to identify security attacks in IoT contexts. The suggested method makes use of the capabilities of machine learning algorithms to examine the enormous amounts of data produced by IoT devices. The system can develop the ability to recognise possible security threats and take immediate action by training models on labelled datasets that include both normal and attack patterns. In this paper multiple ML models for security threat detection in IoT environments in this study. Our evaluation uses both binary and multiclass classification models in an effort to accurately reflect the variety of assaults that can be found in IoT environments. The proposed method provide a new specialised IoT dataset that was created especially to reflect the characteristics of actual IoT environments in order to assure the validity of our assessment. By completing this extensive analysis, we hope to shed light on how well AI-based methods for security attack detection in IoT contexts work. The results of this study can help researchers and professionals decide which ML models and feature engineering techniques are best for IoT security. At the end of the day, we want to help with the creation of reliable security systems that safeguard IoT devices and shield user data from harmful attacks.

Article Details

Author Biography

Satish S. Banait, Ashwini B. Gavali, Shrinivas T. Shirkande, Aditi Lule, Anup Bhange, Kanchan Wagh

[1]Dr. Satish S. Banait

2Dr. Ashwini B. Gavali

3Dr. Shrinivas T. Shirkande

4Aditi Lule

5Dr. Anup Bhange

6Kanchan Wagh


1Assistant Professor, Department of Computer Engineering, K.K. Wagh Institute of Engineering Education and Research, Nashik. Maharashtra.(SPPU-Pune)

2Assistant Professor, S. B. Patil College of Engineering Indapur, Pune, Maharashtra, India

3Principal, S.B.Patil College of Engineering Indapur, Pune, Maharashtra, India

4Assistant Professor, Symbiosis School of Planning Architecture and Design, Nagpur Campus, Symbiosis International (Deemed University), Pune, India

5Assistant Professor, Department of Computer Science and Engineering, KDK College of Engineering Nagpur, Maharashtra, India

6Assistant professor, Department of Electronics and Telecommunication, Cummins College of Engineering for Women, Nagpur, Maharashtra, India, dnyane.ash@gmail.com2, shri.shirkande8@gmail.com3,, anupbhange@gmail.com5, kanchanwagh5@gmail.com6



Aljabri, M.; Zagrouba, R.; Shaahid, A.; Alnasser, F.; Saleh, A.; Alomari, D.M. Machine learning-based social media bot detection: A comprehensive literature review. Soc. Netw. Anal. Min. 2023, 13, 20.

Global IoT and Non-IoT Connections 2010–2025|Statista. Available online: (accessed on 21 February 2022).

Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. Computer Long. Beach. Calif. 2017, 50, 80–84.

Aljabri, M.; Alhaidari, F.; Mohammad, R.M.A.; Mirza, U.S.; Alhamed, D.H.; Altamimi, H.S.; Chrouf, S.M.B. An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models. Comput. Intell. Neurosci. 2022, 2022, 1–14.

Aljabri, M.; Aldossary, M.; Al-Homeed, N.; Alhetelah, B.; Althubiany, M.; Alotaibi, O.; Alsaqer, S. Testing and Exploiting Tools to Improve OWASP Top Ten Security Vulnerabilities Detection. In Proceedings of the 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN), Al-Khobar, Saudi Arabia, 4–6 December 2022; pp. 797–803.

Das, R.; Tuna, A.; Demirel, S.; Yurdakul, M.K. A Survey on the Internet of Things Solutions for the Elderly and Disabled: Applications, Prospects, and Challenges. Int. J. Comput. Netw. Appl. 2017, 4, 84–92.

Aljabri, M.; Alahmadi, A.A.; Mohammad, R.M.A.; Aboulnour, M.; Alomari, D.M.; Almotiri, S.H. Classification of Firewall Log Data Using Multiclass Machine Learning Models. Electron 2022, 11, 1851.

Aljabri, M.; Mirza, S. Phishing Attacks Detection using Machine Learning and Deep Learning Models. In Proceedings of the 2022 7th International Conference on Data Science and Machine Learning Applications (CDMA), Riyadh, Saudi Arabia, 1–3 March 2022; pp. 175–180.

MORE Alarming Cybersecurity Stats For 2021 ! Available online: (accessed on 21 February 2022).

Aljabri, M.; Aljameel, S.S.; Mohammad, R.M.A.; Almotiri, S.H.; Mirza, S.; Anis, F.M.; Aboulnour, M.; Alomari, D.M.; Alhamed, D.H.; Altamimi, H.S. Intelligent Techniques for Detecting Network Attacks: Review and Research Directions. Sensors 2021, 21, 7070. [

Aljabri, M.; Altamimi, H.S.; Albelali, S.A.; Al-Harbi, M.; Alhuraib, H.T.; Alotaibi, N.K.; Alahmadi, A.A.; Alhaidari, F.; Mohammad, R.M.A.; Salah, K. Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions. IEEE Access 2022, 10, 121395–121417.

Alzahrani, R.A.; Aljabri, M. AI-Based Techniques for Ad Click Fraud Detection and Prevention: Review and Research Directions. J. Sens. Actuator Netw. 2023, 12, 4.

The UNSW-NB15 Dataset|UNSW Research. Available online: (accessed on 19 February 2022).

Verma, A.; Ranga, V. Machine Learning Based Intrusion Detection Systems for IoT Applications. Wirel. Pers. Commun. 2020, 111, 2287–2310.

CIDDS—Coburg Intrusion Detection Data Sets: Hochschule Coburg. Available online: (accessed on 19 February 2022).

Datasets|Research|Canadian Institute for Cybersecurity|UNB. Available online: (accessed on 19 February 2022).

Khatib, A.; Hamlich, M.; Hamad, D. Machine Learning based Intrusion Detection for Cyber-Security in IoT Networks. E3S Web Conf. 2021, 297, 01057.

Rashid, M.M.; Kamruzzaman, J.; Hassan, M.M.; Imam, T.; Gordon, S. Cyberattacks detection in iot-based smart city applications using machine learning techniques. Int. J. Environ. Res. Public Health 2020, 17, 9347.

Alrashdi, I.; Alqazzaz, A.; Aloufi, E.; Alharthi, R.; Zohdy, M.; Ming, H. AD-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. In Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC, Las Vegas, NV, USA, 7–9 January 2019; pp. 305–310.

R. Patil Rashmi, Y. Gandhi, V. Sarmalkar, P. Pund and V. Khetani, "RDPC: Secure Cloud Storage with Deduplication Technique," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2020, pp. 1280-1283, doi: 10.1109/I-SMAC49090.2020.9243442.

Khetani, V. ., Gandhi, Y. ., Bhattacharya, S. ., Ajani, S. N. ., & Limkar, S. . (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262.

Verma, P.; Dumka, A.; Singh, R.; Ashok, A.; Gehlot, A.; Malik, P.K.; Gaba, G.S.; Hedabou, M. A Novel Intrusion Detection Approach Using Machine Learning Ensemble for IoT Environments. Appl. Sci. 2021, 11, 10268.

IDS 2018|Datasets|Research|Canadian Institute for Cybersecurity|UNB. Available online: (accessed on 21 February 2022).

Arora, P.; Kaur, B.; Teixeira, M.A. Evaluation of Machine Learning Algorithms Used on Attacks Detection in Industrial Control Systems. J. Inst. Eng. India Ser. B 2021, 102, 605–616.

Mothukuri, V.; Khare, P.; Parizi, R.M.; Pouriyeh, S.; Dehghantanha, A.; Srivastava, G. Federated Learning-based Anomaly Detection for IoT Security Attacks. IEEE Internet Things J. 2022, 9, 2545–2554.

Frazão, I.; Abreu, P.H.; Cruz, T.; Araújo, H.; Simões, P. Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process. Lect. Notes Comput. Sci. 2018, 11260, 230–235.

Wheelus, C.; Zhu, X. IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework. IoT 2020, 1, 259–285.