AI-Driven Intrusion Detection in Internet of Things Networks Using the Edge-IIoTset Dataset

Authors

  • Sandeep Gupta SATI, Vidisha. Author

DOI:

https://doi.org/10.63282/3050-922X.IJERET-V7I1P124

Keywords:

Industrial Internet of Things (IIoT), Cybersecurity, Intrusion Detection System (IDS), IoT devices, Deep Learning

Abstract

Network Intrusion Detection System (NIDS) is an essential tool in securing cyberspace from a variety of security risks and unknown cyberattacks. A number of solutions have been implemented for Machine Learning (ML), and Deep Learning (DL) based NIDS. In this paper, a deep learning-based multi-class intrusion detection model is introduced on the Edge-IIoTset dataset that includes realistic IIoT network traffic and attack variants. The dataset was preprocessed through feature refinement, categorical encoding, robust scaling, and imbalance handling to enhance model reliability. Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) were implemented and evaluated in terms of stratified 5-fold cross-validation. Experiments prove that the suggested LSTM model is much more effective than CNN and some traditional machine learning methods, and it has an accuracy of 99.96 with close-to-perfect precision, recall, and F1-score. The analyses of confusion matrix and ROC curve also reinforce the high discriminatory power of the model in all attack classes, such as DDoS, Injection, Malware, and Information Gathering. The results indicate the success of sequential deep learning to model intricate traffic patterns in IIoT systems. The study provides a very dependable and scalable intrusion detection system that can be applicable in IIoT cybersecurity in practice.

References

[1] K. M. R. Seetharaman and P. Yadav, “A Machine Learning Framework for Detecting and Mitigation of Cyber Threats in IoT Environments,” in 2025 3rd International Conference on Inventive Computing and Informatics (ICICI), IEEE, Jun. 2025, pp. 1112–1119. doi: 10.1109/ICICI65870.2025.11069697.

[2] S. K. Chintagunta and S. Amrale, “Enhancing Cloud Database Security Through Intelligent Threat Detection and Risk Mitigation,” TIJER – Int. Res. J., vol. 9, no. 10, 2022.

[3] S. Singh, “Advancing Network Security in 5G: Leveraging the 5G-NIDD Dataset for Intrusion Detection and Mitigation,” in 2025 IEEE 12th International Conference on Cyber Security and Cloud Computing (CSCloud), IEEE, Nov. 2025, pp. 1–6. doi: 10.1109/CSCloud66326.2025.00055.

[4] R. Patel, “Automated Threat Detection and Risk Mitigation for ICS (Industrial Control Systems) Employing Deep Learning in Cybersecurity Defence,” Int. J. Curr. Eng. Technol., vol. 13, no. 06, pp. 584–591, Dec. 2023, doi: 10.14741/ijcet/v.13.6.11.

[5] P. Nutalapati, J. R. Vummadi, S. Dodda, and N. Kamuni, “Advancing Network Intrusion Detection: A Comparative Study of Clustering and Classification on NSL-KDD Data,” in 2025 International Conference on Data Science and Its Applications (ICoDSA), 2025, pp. 880–885. doi: 10.1109/ICoDSA67155.2025.11157595.

[6] S. Kumara, “AI-Driven Threat Identification and Response: Implications for Secure and Scalable Telecom Infrastructure,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 5, no. 4, 2025.

[7] P. Chandrashekar and M. Kari, “Design Machine Learning-Based Zero-Trust Intrusion Identification Models for Securing Cloud Computing System,” Int. J. Res. Anal. Rev., vol. 11, no. 4, 2024.

[8] S. Narang and A. Gogineni, “Zero-Trust Security in Intrusion Detection Networks: An AI-Powered Threat Detection in Cloud Environment,” Int. J. Sci. Res. Mod. Technol., vol. 4, no. 5, pp. 60–70, Jun. 2025, doi: 10.38124/ijsrmt.v4i5.542.

[9] S. B. Shah, B. Boddu, N. Prajapati, and S. A. Pahune, “AI-Powered Advanced Intrusion Detection for Securing Cloud Environments Against Network Attacks,” in 2025 Global Conference in Emerging Technology (GINOTECH), IEEE, May 2025, pp. 1–7. doi: 10.1109/GINOTECH63460.2025.11076673.

[10] G. Sarraf, “BalanceNet: Addressing Class Imbalance in AI-Powered Intrusion Detection Through Adaptive Sampling,” Asian J. Comput. Sci. Eng., vol. 8, no. 4, 2023, doi: https://doi.org/10.22377/ajcse.v8i04.268.

[11] D. Patel, “Leveraging Blockchain and AI Framework for Enhancing Intrusion Prevention and Detection in Cybersecurity,” Tech. Int. J. Eng. Res., vol. 10, no. 6, 2023, doi: 10.56975/tijer.v10i6.158517.

[12] G. Sarraf and V. Pal, “Adaptive Deep Learning for Identification of Real-Time Anomaly in Zero-Trust Cloud Networks,” ESP J. Eng. Technol. Adv., vol. 4, no. 3, 2024, doi: 10.56472/25832646/JETA-V4I3P122.

[13] R. Chauhan, M. Jena, E. Yafi, M. F. Zuhairi, and A. Mir, “Mitigating IoT Network Threats with a Dual-Model Deep Learning Framework: A Comparative Study of GAT and Transformer Architectures,” in 2026 20th International Conference on Ubiquitous Information Management and Communication (IMCOM), IEEE, Jan. 2026, pp. 1–6. doi: 10.1109/IMCOM69009.2026.11360928.

[14] A. P. Chowdhury, S. K. Hossain, F. N. Nur, A. H. M. S. Islam, and S. Sultana, “Distributed Intrusion Detection System For Edge of Things To Enhance Security,” in 2025 2nd International Conference on Next-Generation Computing, IoT and Machine Learning, NCIM 2025, 2025. doi: 10.1109/NCIM65934.2025.11160191.

[15] A. Tezcan and O. Karahan, “Addressing Class Imbalance in IoT Intrusion Detection with Hybrid Machine Learning Models,” 2025. doi: 10.1109/ismsit67332.2025.11268011.

[16] A. Sharma and H. Babbar, “Guarding Against IoT Threats: An Analysis of Intrusion Detection with the Kitsune Attack Dataset,” in 2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS), IEEE, Nov. 2024, pp. 637–641. doi: 10.1109/ICTACS62700.2024.10840935.

[17] B. Chhetry, R. K. Dutta, R. Matam, and F. A. Barbhuiya, “Improving Reconnaissance Detection in IoT Environments Using Machine Learning with Heterogeneous Data Integration,” in 2024 IEEE Future Networks World Forum (FNWF), IEEE, Oct. 2024, pp. 440–445. doi: 10.1109/FNWF63303.2024.11028791.

[18] V. Sujatha, K. L. Prasanna, K. Niharika, V. Charishma, and K. B. Sai, “Network Intrusion Detection using Deep Reinforcement Learning,” in 2023 7th International Conference on Computing Methodologies and Communication (ICCMC), IEEE, Feb. 2023, pp. 1146–1150. doi: 10.1109/ICCMC56507.2023.10083673.

[19] A. F. Almutairi and A. Abdulghani Alshargabi, “Using Deep Learning Technique to Protect Internet Network from Intrusion in IoT Environment,” in 2022 2nd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2022, 2022. doi: 10.1109/eSmarTA56775.2022.9935467.

[20] E. C. Nkoro, J. N. Njoku, C. I. Nwakanma, J. Lee, and D. Kim, “Zero-Trust Marine Cyberdefense for IoT-Based Communications : An Explainable Approach,” pp. 1–27, 2024.

[21] A. A. Eshmawi, A. Aldrees, and R. Alharthi, “Smart framework for industrial IoT and cloud computing network intrusion detection using a ConvLSTM-based deep learning model,” Front. Comput. Sci., vol. 7, Aug. 2025, doi: 10.3389/fcomp.2025.1622382.

[22] O. Bin Samin, N. A. A. Algeelani, A. Bathich, M. Omar, M. Mansoor, and A. Khan, “Optimizing agricultural data security: harnessing IoT and AI with Latency Aware Accuracy Index (LAAI),” PeerJ Comput. Sci., 2024, doi: 10.7717/PEERJ-CS.2276.

[23] F. Laiq, F. Al-Obeidat, A. Amin, and F. Moreira, “Securing edge-IIoT networks: a comprehensive ensemble-based DDoS detection system,” J. Phys. Complex., vol. 6, no. 2, p. 025005, Jun. 2025, doi: 10.1088/2632-072X/ad506b.

[24] W. Gao, M. Wang, Y. Pei, F. Li, and C. Wang, “A Lightweight Multi-Classification Intrusion Detection Model for Edge IoT Networks,” Feb. 02, 2026. doi: 10.20944/preprints202601.2418.v1.

[25] I. Izhar, A. Abdullah, M. Zunnurain Hussain, M. Zulkifl Hasan, and C. Author, “ENHANCING IOT/IIOT INTRUSION DETECTION: A COMPARATIVE STUDY OF HYBRID CNN-LSTM AND ADVANCED DNN ML MODEL ON EDGE-IIOTSET,” Spectr. Eng. Sci. , 2025.

[26] S. Fraihat, Q. Yaseen, Y. Sanjalawe, A. Abu-Errub, S. N. Makhadmeh, and M. A. Al-Betar, “Intrusion detection in industrial internet of things network using feature optimization and hybrid deep learning,” Discov. Internet Things, Feb. 2026, doi: 10.1007/s43926-026-00284-z.

Downloads

Published

2026-02-18

Issue

Section

Articles

How to Cite

1.
Gupta S. AI-Driven Intrusion Detection in Internet of Things Networks Using the Edge-IIoTset Dataset . IJERET [Internet]. 2026 Feb. 18 [cited 2026 Mar. 13];7(1):180-7. Available from: https://ijeret.org/index.php/ijeret/article/view/478