A Hybrid Deep Learning-Powered SDN-Based Intrusion Detection Architecture for Cognitive IoT Security

Authors

  • Tejaswini Panse Department of Electronics Engineering, Yeshwantrao Chavan College of Engineering, Nagpur, Maharashtra, India
  • Venugopal Gaddam Department of Computer Science and Engineering (AI & ML), B. V. Raju Institute of Technology, Narsapur, Hyderabad, Telangana, India
  • Bhima Sankar Manthina Department of Electronics and Communication Engineering, IIIT Hyderabad, Telangana, India
  • Hanumantha Rao Battu Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation (Deemed to be University), Vaddeswaram, Guntur, Andhra Pradesh, India
  • Pamarthi Sunitha Department of Electronics and Communication Engineering, Aditya University, Surampalem, Andhra Pradesh, India
  • Vemuri Sailaja Department of Electronics and Communication Engineering, Pragati Engineering College, Surampalem, Andhra Pradesh, India
Volume: 15 | Issue: 5 | Pages: 27495-27501 | October 2025 | https://doi.org/10.48084/etasr.12564

Abstract

Various sectors, including smart homes, healthcare, transportation, agriculture, and manufacturing, derive significant advantages from Internet of Things (IoT) technology. This innovative method of interacting with the world enhances efficiency, convenience, and productivity. Nonetheless, it raises concerns regarding security, privacy, and data governance. This article introduces a cognitive hybrid Deep Learning (DL) approach, facilitated by Software-Defined Networking (SDN), to address security concerns in IoT networks through intrusion detection. The principal objective of this methodology is to consistently and effectively detect cybersecurity risks within the IoT ecosystem. Inspired by the cognitive computing paradigm, the proposed system can analyze, comprehend, and respond to diverse traffic targeting IoT devices. The suggested model is trained and evaluated utilizing the advanced N-BaIoT and CICDDoS2019 datasets. The experimental results exhibit a high degree of accuracy, producing an acceptable false positive rate alongside a tolerable testing duration. Moreover, the architecture takes into account the constrained resources of IoT devices, guaranteeing they are not excessively taxed during the process. The proposed model achieved an accuracy rate of 99.86%, precision of 99.96%, recall of 99.903%, and F1-Score of 99.93%. The proposed model surpassed existing hybrid DL methods.

Keywords:

intrusion detection, cognitive system, Internet of Things (IoT), cyber attacks, Deep Learning (DL), Machine Learning (ML), Software-Defined Networking (SDN)

Downloads

Download data is not yet available.

References

M. M. Inuwa and R. Das, "A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks," Internet of Things, vol. 26, Jul. 2024, Art. no. 101162.

P. Kumar, R. Kumar, G. P. Gupta, R. Tripathi, A. Jolfaei, and A. K. M. Najmul Islam, "A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system," Journal of Parallel and Distributed Computing, vol. 172, pp. 69–83, Feb. 2023.

J. Huang, H. Gao, S. Wan, and Y. Chen, "AoI-aware energy control and computation offloading for industrial IoT," Future Generation Computer Systems, vol. 139, pp. 29–37, Feb. 2023.

P. S. Rao, T. G. Krishna, and V. S. S. R. Muramalla, "Next-Gen Cybersecurity For Securing Towards Navigating the Future Guardians of the Digital Realm," International Journal of Progressive Research in Engineering Management and Science, vol. 3, no. 9, pp. 178–190, Sep. 2023.

M. Saied, S. Guirguis, and M. Madbouly, "Review of artificial intelligence for enhancing intrusion detection in the internet of things," Engineering Applications of Artificial Intelligence, vol. 127, no. A, Jan. 2024, Art. no. 107231.

A. Vijay, M. Kasiselvanathan, P. Sridhar, R. Sharan, G. Surya, and M. Vishva Surjith, "Recent Developments in Designing Internet of Things Architectures," in 2024 3rd International Conference on Applied Artificial Intelligence and Computing, Salem, India, 2024, pp. 1575–1580.

R. Pawar, A. P. Singh, and K. Sharma, "Mitigating Denial of Service Attacks in Software-Defined Networking Environments," in 2024 International Conference on Optimization Computing and Wireless Communication, Debre Tabor, Ethiopia, 2024, pp. 1–5.

D. Javeed, T. Gao, M. T. Khan, and D. Shoukat, "A Hybrid Intelligent Framework to Combat Sophisticated Threats in Secure Industries," Sensors, vol. 22, no. 4, Feb. 2022, Art. no. 1582.

D. A. M, V. Menon, S. Ezekiel, and P. Chaudhary, "Exploring the tractability of data fusion models for detecting anomalies in IoT-based dataset," in Big Data V: Learning, Analytics, and Applications, Orlando, FL, USA, 2023, pp. 82–89.

V. Ravi, T. D. Pham, and M. Alazab, "Deep Learning-Based Network Intrusion Detection System for Internet of Medical Things," IEEE Internet of Things Magazine, vol. 6, no. 2, pp. 50–54, Jun. 2023.

Z. Wang, H. Chen, S. Yang, X. Luo, D. Li, and J. Wang, "A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization," PeerJ Computer Science, vol. 9, Sep. 2023, Art. no. e1569.

R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024.

A. Chetouane and K. Karoui, "Risk based intrusion detection system in software defined networking," Concurrency and Computation: Practice and Experience, vol. 36, no. 9, 2024, Art. no. e7988.

I. A. Kandhro et al., "Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures," IEEE Access, vol. 11, pp. 9136–9148, 2023.

M. A. Ahmed and S. Alnatheer, "Intrusion Detection in a Digital Twin-Enabled Secure Industrial Internet of Things Environment for Industrial Sustainability," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21263–21269, Apr. 2025.

R. Verma and S. Chandra, "RepuTE: A soft voting ensemble learning framework for reputation-based attack detection in fog-IoT milieu," Engineering Applications of Artificial Intelligence, vol. 118, Feb. 2023, Art. no. 105670.

O. D. Okey, D. C. Melgarejo, M. Saadi, R. L. Rosa, J. H. Kleinschmidt, and D. Z. Rodríguez, "Transfer Learning Approach to IDS on Cloud IoT Devices Using Optimized CNN," IEEE Access, vol. 11, pp. 1023–1038, 2023.

A. H. A. Saq, A. Zainal, B. A. S. Al-Rimy, A. Alyami, and H. A. Abosaq, "Intrusion Detection in IoT using Gaussian Fuzzy Mutual Information-based Feature Selection," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 17564–17571, Dec. 2024.

A. Yazdinejad, M. Kazemi, R. M. Parizi, A. Dehghantanha, and H. Karimipour, "An ensemble deep learning model for cyber threat hunting in industrial internet of things," Digital Communications and Networks, vol. 9, no. 1, pp. 101–110, Feb. 2023.

J. Kaur, A. Agrawal, and R. A. Khan, "P2ADF: a privacy-preserving attack detection framework in fog-IoT environment," International Journal of Information Security, vol. 22, no. 4, pp. 749–762, Aug. 2023.

J. B. Awotunde et al., "An Ensemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks," Applied Sciences, vol. 13, no. 4, Feb. 2023, Art. no. 2479.

T. Saba, A. Rehman, T. Sadad, H. Kolivand, and S. A. Bahaj, "Anomaly-based intrusion detection system for IoT networks through deep learning model," Computers and Electrical Engineering, vol. 99, Apr. 2022, Art. no. 107810.

T. Acharya, A. Annamalai, and M. F. Chouikha, "Efficacy of CNN-Bidirectional LSTM Hybrid Model for Network-Based Anomaly Detection," in 2023 IEEE 13th Symposium on Computer Applications & Industrial Electronics, Penang, Malaysia, 2023, pp. 348–353.

P. L. S. Jayalaxmi, G. Kumar, R. Saha, M. Conti, T. Kim, and R. Thomas, "DeBot: A deep learning-based model for bot detection in industrial internet-of-things," Computers and Electrical Engineering, vol. 102, Sep. 2022, Art. no. 108214.

C. A. de Souza, C. B. Westphall, and R. B. Machado, "Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments," Computers & Electrical Engineering, vol. 98, Mar. 2022, Art. no. 107694.

S. Sivamohan and S. S. Sridhar, "An optimized model for network intrusion detection systems in industry 4.0 using XAI based Bi-LSTM framework," Neural Computing and Applications, vol. 35, no. 15, pp. 11459–11475, May 2023.

G. R. Mode, P. Calyam, and K. A. Hoque, "False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics." arXiv, Dec. 13, 2019.

Y. Meidan et al., "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders," IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, Jul. 2018.

I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, "Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy," in 2019 International Carnahan Conference on Security Technology, Chennai, India, 2019, pp. 1–8.

Downloads

How to Cite

[1]
T. Panse, V. Gaddam, B. S. Manthina, H. R. Battu, P. Sunitha, and V. Sailaja, “A Hybrid Deep Learning-Powered SDN-Based Intrusion Detection Architecture for Cognitive IoT Security”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 5, pp. 27495–27501, Oct. 2025.

Metrics

Abstract Views: 12
PDF Downloads: 5

Metrics Information