A Comprehensive Study of Deep Learning Models for Intrusion Detection in IoT Devices
Received: 3 November 2024 | Revised: 29 December 2024 | Accepted: 18 January 2025 | Online: 3 April 2025
Corresponding author: Enas F. Khairullah
Abstract
The Internet of Things (IoT) has revolutionized how people interact with the world, but the increasing complexity of cyberattacks poses significant challenges in detecting intrusions. Failure to prevent intrusions can compromise IoT security services, including data confidentiality, integrity, and availability. For this reason, this study employs four deep learning models: A Deep Neural Networks (DNN), a Convolutional Neural Network (CNN), a Recurrent Neural Network (RNN), and a Long-Short-Term Memory (LSTM) network. The multiclassification performance of each model was evaluated using the Bot-IoT dataset. This study also addresses the bias towards the DDoS/DoS category in the Bot-IoT dataset, using the SMOTE technique to mitigate overfitting. The LSTM model achieved an excellent balance between performance and efficiency, outperforming state-of-the-art deep learning Intrusion Detection System (IDS) approaches on the same dataset, achieving a multiclass classification accuracy of 99.97%.
Keywords:
deep neural network, intrusion detection system, deep learning, internet of things, cybersecurityDownloads
References
M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, and M. Guizani, "A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1646–1685, 2020.
M. F. Elrawy, A. I. Awad, and H. F. A. Hamed, "Intrusion detection systems for IoT-based smart environments: a survey," Journal of Cloud Computing, vol. 7, no. 1, Dec. 2018, Art. no. 21.
R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024.
S. M. S. Bukhari et al., "Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability," Ad Hoc Networks, vol. 155, Mar. 2024, Art. no. 103407.
A. Čolaković and M. Hadžialić, "Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues," Computer Networks, vol. 144, pp. 17–39, Oct. 2018.
C. Han, J. M. Jornet, E. Fadel, and I. F. Akyildiz, "A cross-layer communication module for the Internet of Things," Computer Networks, vol. 57, no. 3, pp. 622–633, Feb. 2013.
R. Alghamdi and M. Bellaiche, "An ensemble deep learning based IDS for IoT using Lambda architecture," Cybersecurity, vol. 6, no. 1, Mar. 2023, Art. no. 5.
A. Awajan, "A Novel Deep Learning-Based Intrusion Detection System for IoT Networks," Computers, vol. 12, no. 2, Feb. 2023, Art. no. 34.
H. Alkahtani and T. H. H. Aldhyani, "Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms," Complexity, vol. 2021, no. 1, 2021, Art. no. 5579851.
M. A. Alsoufi et al., "Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review," Applied Sciences, vol. 11, no. 18, Jan. 2021, Art. no. 8383.
J. Asharf, N. Moustafa, H. Khurshid, E. Debie, W. Haider, and A. Wahab, "A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions," Electronics, vol. 9, no. 7, Jul. 2020, Art. no. 1177.
A. Fatani, A. Dahou, M. A. A. Al-qaness, S. Lu, and M. Abd Elaziz, "Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System," Sensors, vol. 22, no. 1, Jan. 2022, Art. no. 140.
M. Ge, X. Fu, N. Syed, Z. Baig, G. Teo, and A. Robles-Kelly, "Deep Learning-Based Intrusion Detection for IoT Networks," in 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, Dec. 2019, pp. 256–25609.
N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, "Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset," Future Generation Computer Systems, vol. 100, pp. 779–796, Nov. 2019.
N. Koroniotis, N. Moustafa, E. Sitnikova, and J. Slay, "Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques," in Mobile Networks and Management, vol. 235, J. Hu, I. Khalil, Z. Tari, and S. Wen, Eds. Springer International Publishing, 2018, pp. 30–44.
S. M. Kasongo and Y. Sun, "A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System," IEEE Access, vol. 7, pp. 38597–38607, 2019.
R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, "Deep Learning Approach for Intelligent Intrusion Detection System," IEEE Access, vol. 7, pp. 41525–41550, 2019.
I. Idrissi, M. Boukabous, M. Azizi, O. Moussaoui, and H. El Fadili, "Toward a deep learning-based intrusion detection system for IoT against botnet attacks," IAES International Journal of Artificial Intelligence (IJ-AI), vol. 10, no. 1, Mar. 2021, Art. no. 110.
"Power of Recurrent Neural Networks (RNN): Revolutionizing AI," Simplilearn.com. https://www.simplilearn.com/tutorials/deep-learning-tutorial/rnn.
S. Saxena, "What is LSTM? Introduction to Long Short-Term Memory," Analytics Vidhya, Mar. 16, 2021. https://www.analyticsvidhya.com/blog/2021/03/introduction-to-long-short-term-memory-lstm/.
P. Skryjomski and B. Krawczyk, "Influence of minority class instance types on SMOTE imbalanced data oversampling," in Proceedings of the First International Workshop on Learning with Imbalanced Domains: Theory and Applications, Oct. 2017, pp. 7–21.
A. Derhab, A. Aldweesh, A. Z. Emam, and F. A. Khan, "Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering," Wireless Communications and Mobile Computing, vol. 2020, no. 1, 2020, Art. no. 6689134.
S. Kotsiantis, D. Kanellopoulos, and P. Pintelas, "Handling imbalanced datasets: A review," GESTS International Transactions on Computer Science and Engineering, vol. 30, 2006.
"Performance Metrics in Machine Learning." https://www.tutorialspoint.com/machine_learning/machine_learning_performance_metrics.htm.
Downloads
How to Cite
License
Copyright (c) 2025 Enas F. Khairullah, Nibras Alsenani

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.