An Adaptive AI-Driven Cyber Threat Detection Framework for Securing Heterogeneous IoT Networks

Authors

  • Kireet Muppavaram Department of CSE, GITAM School of Technology, GITAM Deemed to be University, Hyderabad Campus, Telangana, India
  • T. Aruna Sri Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Hyderabad Campus, Telangana, India
  • T. Murali Krishna Department of CSE, Ashoka Womens Engineering College, Kurnool, Andhra Pradesh, India
  • Jyotsnarani Tripathi Department of CSE (AIML & IoT), VNR Vignana Jyothi Institute of Engineering and Technology, India
  • Manmath Nath Das Department of AI & DS, VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, India
  • Sharada Mani Department of CSE-DS, QIS College of Engineering and Technology (A), AP, India
  • G. Lakshmi Vara Prasad Department of AIML, QIS College of Engineering and Technology (A), AP, India
  • T. Manyam School of Engineering, Information Technology, Anurag University, Telangana, India
Volume: 15 | Issue: 5 | Pages: 26750-26756 | October 2025 | https://doi.org/10.48084/etasr.12386

Abstract

This work proposes an intelligent cybersecurity system built upon Artificial Intelligence (AI) to address evolving cyber threats in heterogeneous Internet of Things (IoT) environments. The proposed framework integrates machine learning with mathematical threat analysis to shift from traditional system security, which responds after an attack, to a proactive approach that predicts and prevents threats. It reacts immediately, processes in just 0.35 s, adapts to 95% of IoT surroundings, and handles security by categorizing threats into four tiers with minimal impact on performance. Tests against standard Intrusion Detection Systems (IDSs), such as SNORT, Suricata, and Bro/Zeek, demonstrate that the framework is superior at handling a wide range of threats.

Keywords:

cyber threats, cybersecurity, Artificial Intelligence (AI), Internet of Things (IoT), machine learning

Downloads

Download data is not yet available.

References

S. Ankalaki, A. R. Atmakuri, M. Pallavi, G. S. Hukkeri, T. Jan, and G. R. Naik, "Cyber Attack Prediction: From Traditional Machine Learning to Generative Artificial Intelligence," IEEE Access, vol. 13, pp. 44662–44706, 2025.

N. Moustafa, N. Koroniotis, M. Keshk, A. Y. Zomaya, and Z. Tari, "Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions," IEEE Communications Surveys & Tutorials, vol. 25, no. 3, pp. 1775–1807, 2023.

G. Falco, A. Viswanathan, C. Caldera, and H. Shrobe, "A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities," IEEE Access, vol. 6, pp. 48360–48373, 2018.

I. Bibi, A. Akhunzada, and N. Kumar, "Deep AI-Powered Cyber Threat Analysis in IIoT," IEEE Internet of Things Journal, vol. 10, no. 9, pp. 7749–7760, May 2023.

M. Ragab et al., "Artificial intelligence driven cyberattack detection system using integration of deep belief network with convolution neural network on industrial IoT," Alexandria Engineering Journal, vol. 110, pp. 438–450, Jan. 2025.

A. Souri, M. Norouzi, and Y. Alsenani, "A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things," Cluster Computing, vol. 27, no. 3, pp. 3639–3655, June 2024.

P. Ajay, B. Nagaraj, R. Arun Kumar, V. Suthana, and M. Ruth Keziah, "DBN-protected material Enhanced intrusion prevention sensor system defends against cyber attacks in the IoT devices," Measurement: Sensors, vol. 34, Aug. 2024, Art. no. 101263.

A. Zacharis, V. Katos, and C. Patsakis, "Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle," International Journal of Information Security, vol. 23, no. 4, pp. 2691–2710, Aug. 2024.

M. A. Alsoufi et al., "Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review," Applied Sciences, vol. 11, no. 18, Sept. 2021, Art. no. 8383.

S. Ghosh, A. Zaboli, J. Hong, and J. Kwon, "An Integrated Approach of Threat Analysis for Autonomous Vehicles Perception System," IEEE Access, vol. 11, pp. 14752–14777, 2023.

F. Alwahedi, A. Aldhaheri, M. A. Ferrag, A. Battah, and N. Tihanyi, "Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models," Internet of Things and Cyber-Physical Systems, vol. 4, pp. 167–185, Jan. 2024.

I. H. Sarker, A. I. Khan, Y. B. Abushark, and F. Alsolami, "Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions," Mobile Networks and Applications, vol. 28, no. 1, pp. 296–312, Feb. 2023.

K. K. Mamidi et al., "Investigation of cyber attacks using post-installation app detection method," Cogent Engineering, vol. 11, no. 1, Dec. 2024, Art. no. 2411859.

M. Kireet, P. Rachala, M. S. Rao, and R. Sreerangam, "Investigation Of Contemporary Attacks In Android Apps," International Journal of Scientific and Technology Research, vol. 8, no. 12, pp. 1789–1794, 2019.

C. P. Kaliappan, K. Palaniappan, D. Ananthavadivel, and U. Subramanian, "Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection," Peer-to-Peer Networking and Applications, vol. 17, no. 5, pp. 2737–2757, Sept. 2024.

Y. R. Maramreddy and K. Muppavaram, "Detecting and Mitigating Data Poisoning Attacks in Machine Learning: A Weighted Average Approach," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 15505–15509, Aug. 2024.

V. Koka and K. Muppavaram, "An Enhanced Framework to Mitigate Post-Installation Cyber Attacks on Android Apps," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 14788–14792, Aug. 2024.

J. Wang, Y. Ma, L. Zhang, R. X. Gao, and D. Wu, "Deep learning for smart manufacturing: Methods and applications," Journal of Manufacturing Systems, vol. 48, no. C, pp. 144–156, July 2018.

A. L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016.

J. Li, M. S. Othman, H. Chen, and L. M. Yusuf, "Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning," Journal of Big Data, vol. 11, no. 1, Feb. 2024, Art. no. 36.

"The UNSW-NB15 Dataset." UNSW Research. [Online]. Available: https://research.unsw.edu.au/projects/unsw-nb15-dataset.

"iotid20 dataset." Kaggle. [Online]. Available: https://www.kaggle.com/datasets/rohulaminlabid/iotid20-dataset.

Downloads

How to Cite

[1]
K. Muppavaram, “An Adaptive AI-Driven Cyber Threat Detection Framework for Securing Heterogeneous IoT Networks”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 5, pp. 26750–26756, Oct. 2025.

Metrics

Abstract Views: 195
PDF Downloads: 71

Metrics Information