An Adaptive AI-Driven Cyber Threat Detection Framework for Securing Heterogeneous IoT Networks
Received: 26 May 2025 | Revised: 18 June 2025 and 8 July 2025 | Accepted: 11 July 2025 | Online: 5 August 2025
Corresponding author: Kireet Muppavaram
Abstract
This work proposes an intelligent cybersecurity system built upon Artificial Intelligence (AI) to address evolving cyber threats in heterogeneous Internet of Things (IoT) environments. The proposed framework integrates machine learning with mathematical threat analysis to shift from traditional system security, which responds after an attack, to a proactive approach that predicts and prevents threats. It reacts immediately, processes in just 0.35 s, adapts to 95% of IoT surroundings, and handles security by categorizing threats into four tiers with minimal impact on performance. Tests against standard Intrusion Detection Systems (IDSs), such as SNORT, Suricata, and Bro/Zeek, demonstrate that the framework is superior at handling a wide range of threats.
Keywords:
cyber threats, cybersecurity, Artificial Intelligence (AI), Internet of Things (IoT), machine learningDownloads
References
S. Ankalaki, A. R. Atmakuri, M. Pallavi, G. S. Hukkeri, T. Jan, and G. R. Naik, "Cyber Attack Prediction: From Traditional Machine Learning to Generative Artificial Intelligence," IEEE Access, vol. 13, pp. 44662–44706, 2025.
N. Moustafa, N. Koroniotis, M. Keshk, A. Y. Zomaya, and Z. Tari, "Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions," IEEE Communications Surveys & Tutorials, vol. 25, no. 3, pp. 1775–1807, 2023.
G. Falco, A. Viswanathan, C. Caldera, and H. Shrobe, "A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities," IEEE Access, vol. 6, pp. 48360–48373, 2018.
I. Bibi, A. Akhunzada, and N. Kumar, "Deep AI-Powered Cyber Threat Analysis in IIoT," IEEE Internet of Things Journal, vol. 10, no. 9, pp. 7749–7760, May 2023.
M. Ragab et al., "Artificial intelligence driven cyberattack detection system using integration of deep belief network with convolution neural network on industrial IoT," Alexandria Engineering Journal, vol. 110, pp. 438–450, Jan. 2025.
A. Souri, M. Norouzi, and Y. Alsenani, "A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things," Cluster Computing, vol. 27, no. 3, pp. 3639–3655, June 2024.
P. Ajay, B. Nagaraj, R. Arun Kumar, V. Suthana, and M. Ruth Keziah, "DBN-protected material Enhanced intrusion prevention sensor system defends against cyber attacks in the IoT devices," Measurement: Sensors, vol. 34, Aug. 2024, Art. no. 101263.
A. Zacharis, V. Katos, and C. Patsakis, "Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle," International Journal of Information Security, vol. 23, no. 4, pp. 2691–2710, Aug. 2024.
M. A. Alsoufi et al., "Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review," Applied Sciences, vol. 11, no. 18, Sept. 2021, Art. no. 8383.
S. Ghosh, A. Zaboli, J. Hong, and J. Kwon, "An Integrated Approach of Threat Analysis for Autonomous Vehicles Perception System," IEEE Access, vol. 11, pp. 14752–14777, 2023.
F. Alwahedi, A. Aldhaheri, M. A. Ferrag, A. Battah, and N. Tihanyi, "Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models," Internet of Things and Cyber-Physical Systems, vol. 4, pp. 167–185, Jan. 2024.
I. H. Sarker, A. I. Khan, Y. B. Abushark, and F. Alsolami, "Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions," Mobile Networks and Applications, vol. 28, no. 1, pp. 296–312, Feb. 2023.
K. K. Mamidi et al., "Investigation of cyber attacks using post-installation app detection method," Cogent Engineering, vol. 11, no. 1, Dec. 2024, Art. no. 2411859.
M. Kireet, P. Rachala, M. S. Rao, and R. Sreerangam, "Investigation Of Contemporary Attacks In Android Apps," International Journal of Scientific and Technology Research, vol. 8, no. 12, pp. 1789–1794, 2019.
C. P. Kaliappan, K. Palaniappan, D. Ananthavadivel, and U. Subramanian, "Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection," Peer-to-Peer Networking and Applications, vol. 17, no. 5, pp. 2737–2757, Sept. 2024.
Y. R. Maramreddy and K. Muppavaram, "Detecting and Mitigating Data Poisoning Attacks in Machine Learning: A Weighted Average Approach," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 15505–15509, Aug. 2024.
V. Koka and K. Muppavaram, "An Enhanced Framework to Mitigate Post-Installation Cyber Attacks on Android Apps," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 14788–14792, Aug. 2024.
J. Wang, Y. Ma, L. Zhang, R. X. Gao, and D. Wu, "Deep learning for smart manufacturing: Methods and applications," Journal of Manufacturing Systems, vol. 48, no. C, pp. 144–156, July 2018.
A. L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016.
J. Li, M. S. Othman, H. Chen, and L. M. Yusuf, "Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning," Journal of Big Data, vol. 11, no. 1, Feb. 2024, Art. no. 36.
"The UNSW-NB15 Dataset." UNSW Research. [Online]. Available: https://research.unsw.edu.au/projects/unsw-nb15-dataset.
"iotid20 dataset." Kaggle. [Online]. Available: https://www.kaggle.com/datasets/rohulaminlabid/iotid20-dataset.
Downloads
How to Cite
License
Copyright (c) 2025 Kireet Muppavaram, T. Aruna Sri, T. Murali Krishna, Sharada Mani, Jyotsnarani Tripathi, Manmath Nath Das, G. Lakshmi Vara Prasad, T. Manyam

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.