Full Text

Turn on search term navigation

© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

The widespread use of the Internet of Things (IoT) has led to significant breakthroughs in various fields but has also exposed critical vulnerabilities to evolving cybersecurity threats. Current Intrusion Detection Systems (IDSs) often fail to provide real-time detection, scalability, and interpretability, particularly in high-speed optical network environments. This research introduces XIoT, which is a novel explainable IoT attack detection model designed to address these challenges. Leveraging advanced deep learning methods, specifically Convolutional Neural Networks (CNNs), XIoT analyzes spectrogram images transformed from IoT network traffic data to detect subtle and complex attack patterns. Unlike traditional approaches, XIoT emphasizes interpretability by integrating explainable AI mechanisms, enabling cybersecurity analysts to understand and trust its predictions. By offering actionable insights into the factors driving its decision making, XIoT supports informed responses to cyber threats. Furthermore, the model’s architecture leverages the high-speed, low-latency characteristics of optical networks, ensuring the efficient processing of large-scale IoT data streams and supporting real-time detection in diverse IoT ecosystems. Comprehensive experiments on benchmark datasets, including KDD CUP99, UNSW NB15, and Bot-IoT, demonstrate XIoT’s exceptional accuracy rates of 99.34%, 99.61%, and 99.21%, respectively, significantly surpassing existing methods in both accuracy and interpretability. These results highlight XIoT’s capability to enhance IoT security by addressing real-world challenges, ensuring robust, scalable, and interpretable protection for IoT networks against sophisticated cyber threats.

Details

Title
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
Author
Nouman Imtiaz 1   VIAFID ORCID Logo  ; Wahid, Abdul 2   VIAFID ORCID Logo  ; Syed Zain Ul Abideen 2   VIAFID ORCID Logo  ; Mian, Muhammad Kamal 3   VIAFID ORCID Logo  ; Sehito, Nabila 4   VIAFID ORCID Logo  ; Khan, Salahuddin 5   VIAFID ORCID Logo  ; Virdee, Bal S 6   VIAFID ORCID Logo  ; Kouhalvandi, Lida 7   VIAFID ORCID Logo  ; Alibakhshikenari, Mohammad 8   VIAFID ORCID Logo 

 School of Computer Science and Technology, Shandong University, Qingdao 266510, China; [email protected] 
 College of Computer Science and Technology, Qingdao University, Qingdao 266071, China; [email protected] (A.W.); [email protected] (S.Z.U.A.) 
 School of Electronic Science and Engineering, Southeast University, No. 2 Southeast University Road, Jiangning, Nanjing 211189, China 
 Department of Computer Science, ILMA University, Karachi 74900, Pakistan; [email protected] 
 College of Engineering, King Saud University, P.O. Box 800, Riyadh 11421, Saudi Arabia; [email protected] 
 Center for Communications Technology, London Metropolitan University, London N7 8DB, UK; [email protected] 
 Department of Electrical and Electronics Engineering, Dogus University, Istanbul 34775, Turkey; [email protected] 
 Electronics Engineering Department, University of Rome “Tor Vergata”, 00133 Rome, Italy 
First page
35
Publication year
2025
Publication date
2025
Publisher
MDPI AG
e-ISSN
23046732
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
3159540057
Copyright
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.