Leveraging Smart Sentry to Detect and Mitigate Cyber Threats in Industrial IoT Networks
Published 2025-04-06
Keywords
- Internet of Things,
- Machine learning,
- security,
- Intrusion detection system
How to Cite
Copyright (c) 2025 K Gayathri, K Tulasi Kumar, L Sai Vignesh, P Ajay Prathap, G Anusha

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
The Internet of Things (IoT) has revolutionized digital connectivity but has simultaneously broadened the landscape for cyber threats. This paper focuses on categorizing IoT attacks by integrating multiple machine learning (ML) models and deep learning (DL) techniques. The research presents a binary and multiclass classification approach utilizing algorithms like Random Forest, Decision Tree, Extra Trees Classifier, Support Vector Machine, k-Nearest Neighbors, and a Deep Neural Network. Experiments were conducted using the Edge-IIoTset dataset, reflecting real-world IoT threat scenarios. Pre-processing involved Principal Component Analysis (PCA) for dimensionality reduction, Synthetic Minority Over-sampling Technique (SMOTE) to counteract class imbalance, and data normalization. The study provides a comparative analysis of model performance, showing that the DNN model achieved outstanding results—100% accuracy for binary classification, 96.15% for 6-class classification, and 94.68% for 15-class classification. A 10-fold cross-validation was also implemented to ensure model generalization. The findings offer valuable insights for improving the security posture of IoT environments through intelligent detection mechanisms.
References
- Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge IIoTset: A new comprehensive realistic cybersecurity dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access, 10, 40281–40306. https://doi.org/10.1109/ACCESS.2022.3167253
- Gupta, K., Sharma, D. K., Datta Gupta, K., & Kumar, A. (2022). A tree classifier based network intrusion detection model for Internet of Medical Things. Computers & Electrical Engineering, 102, 108158. https://doi.org/10.1016/j.compeleceng.2022.108158
- Bhandari, G., Lyth, A., Shalaginov, A., & Grønli, T.-M. (2023). Distributed deep neural-network-based middleware for cyber-attacks detection in smart IoT ecosystem: A novel framework and performance evaluation approach. Electronics, 12(2), 298. https://doi.org/10.3390/electronics12020298
- Bhandari, G. P., Lyth, A., Shalaginov, A., & Grønli, T.-M. (2022, December). Artificial intelligence enabled middleware for distributed cyberattacks detection in IoT-based smart environments. In 2022 IEEE International Conference on Big Data (pp. 3023–3032). IEEE.
- Rashid, M. M., Khan, S. U., Eusufzai, F., Redwan, M. A., Sabuj, S. R., & Elsharief, M. (2023). A federated learning-based approach for improving intrusion detection in industrial Internet of Things networks. Network, 3(1), 158–179.
- Friha, O., Ferrag, M. A., Benbouzid, M., Berghout, T., Kantarci, B., & Choo, K.-K. R. (2023). 2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT. Computers & Security, 127, 103097. https://doi.org/10.1016/j.cose.2022.103097
- Cheikhrouhou, O., Fredj, O. B., Atitallah, N., & Hellal, S. (2022, November). Intrusion detection in industrial IoT. In Proceedings of the 15th International Conference on Security of Information and Networks (SIN) (pp. 1–4). https://doi.org/10.1109/SIN56466.2022.9970535
- Chen, Z., Liu, J., Shen, Y., Simsek, M., Kantarci, B., Mouftah, H. T., & Djukic, P. (2023). Machine learning-enabled IoT security: Open issues and challenges under advanced persistent threats. ACM Computing Surveys, 55(5), 1–37. https://doi.org/10.1145/3530812
- Dini, P., Begni, A., Ciavarella, S., De Paoli, E., Fiorelli, G., Silvestro, C., & Saponara, S. (2022). Design and testing novel one-class classifier based on polynomial interpolation with application to networking security. IEEE Access, 10, 67910–67924. https://doi.org/10.1109/ACCESS.2022.3186026
- Elias, E. M. D., Carriel, V. S., De Oliveira, G. W., Dos Santos, A. L., Nogueira, M., Junior, R. H., & Batista, D. M. (2022, November). A hybrid CNN-LSTM model for IIoT edge privacy-aware intrusion detection. In 2022 IEEE Latin-American Conference on Communications (LATINCOM) (pp. 1–6). IEEE. https://doi.org/10.1109/LATINCOM56090.2022.10000468
- Madapuri, R. K., & Mahesh, P. C. S. (2017). HBS-CRA: Scaling impact of change request towards fault proneness: Defining a heuristic and biases scale (HBS) of change request artifacts (CRA). Cluster Computing, 22(S5), 11591–11599. https://doi.org/10.1007/s10586-017-1424-0
- Dwaram, J. R., & Madapuri, R. K. (2022). Crop yield forecasting by long short-term memory network with Adam optimizer and Huber loss function in Andhra Pradesh, India. Concurrency and Computation: Practice and Experience, 34(27). https://doi.org/10.1002/cpe.7310
- Reddy, B. S. H. (2025). Deep learning-based detection of hair and scalp diseases using CNN and image processing. Milestone Transactions on Medical Technometrics, 3(1), 145–155. https://doi.org/10.5281/zenodo.14965660
- Reddy, B. S. H., Venkatramana, R., & Jayasree, L. (2025). Enhancing apple fruit quality detection with augmented YOLOv3 deep learning algorithm. International Journal of Human Computations & Intelligence, 4(1), 386–396. https://doi.org/10.5281/zenodo.14998944
- Kumar, A., Satheesha, T. Y., Salvador, B. B. L., Mithileysh, S., & Ahmed, S. T. (2023). Augmented intelligence enabled deep neural networking (AuDNN) framework for skin cancer classification and prediction using multi-dimensional datasets on industrial IoT standards. Microprocessors and Microsystems, 97, 104755. https://doi.org/10.1016/j.micpro.2023.104755
- Patil, K. K., & Ahmed, S. T. (2014, October). Digital telemammography services for rural India, software components and design protocol. In 2014 International Conference on Advances in Electronics Computers and Communications (pp. 1–5). IEEE.
- Kumar, S. S., Ahmed, S. T., Flora, P. M., Hemanth, L. S., Aishwarya, J., GopalNaik, R., & Fathima, A. (2021, January). An improved approach of unstructured text document classification using predetermined text model and probability technique. In ICASISET 2020: Proceedings of the First International Conference on Advanced Scientific Innovation in Science, Engineering and Technology (p. 378). European Alliance for Innovation.
- Ahmed, S. T., Sandhya, M., & Shankar, S. (2018, August). ICT’s role in building and understanding Indian telemedicine environment: A study. In Information and Communication Technology for Competitive Strategies: Proceedings of Third International Conference on ICTCS 2017 (pp. 391–397). Springer.
- Singh, K. D., & Ahmed, S. T. (2020, July). Systematic linear word string recognition and evaluation technique. In 2020 International Conference on Communication and Signal Processing (ICCSP) (pp. 545–548). IEEE.