AI-Driven Threat Detection in IoT Environments Using Adaptive Cybersecurity Frameworks

Authors

  • M. RIYAZ MOHAMMED Department of Computer Science & IT, Jamal Mohamed College (Autonomous), Tiruchirapalli, Tamil Nadu, India. Author

DOI:

https://doi.org/10.64137/XXXXXXXX/IJCSEI-V1I1P101

Keywords:

IoT Security, AI-Driven Cybersecurity, Adaptive Frameworks, Threat Detection, Anomaly Detection, Machine Learning, Intrusion Detection System (IDS), Behavior Analysis

Abstract

More and more devices connected to the Internet of Things (IoT) in different fields have led to a much bigger area where attacks can take place. Different from standard computer systems, IoT devices usually have limited resources, no common security standards and are set up with weak or little threat monitoring. Due to this situation, cyber attackers can easily target common weaknesses by launching different types of attacks like DDoS, spoofing, and data theft. Such systems, which work on stored and unchanging rules and defend only the borders, are not up to the task in today’s diverse and fast-paced networks. Since the threat environment keeps evolving, it is important to have a flexible and intelligent way to secure the growing number of IoT devices. The study proposes an AI-based threat detection system as a key part of a cybersecurity framework built for use in the IoT ecosystem. It makes use of both supervised and unsupervised learning methods by machine learning algorithms, which can detect questionable or suspicious activities in the network. Using contextual information, behavior analysis can tell if activities are allowed or not, and anomaly detection systems allow early threat detection regardless of whether the danger is known. Besides, the system is able to deal with threats on its own by cutting off compromised devices and reporting sensor detections to administrators, all with a fast response. The test using standard datasets and imitated real-time conditions (such as BoT-IoT) demonstrates a detection accuracy of more than 96%. It means that by making use of this technology, IoT infrastructures can boost their ability to resist emerging cybersecurity threats

References

[1] Gilbert, C., & Gilbert, M. (2024). AI-Driven Threat Detection in the Internet of Things (IoT), Exploring Opportunities and Vulnerabilities.

[2] Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1-6). IEEE.

[3] Abeshu, A., & Chilamkurti, N. (2018). Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE Communications Magazine, 56(2), 169-175.

[4] Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE transactions on emerging topics in computational intelligence, 2(1), 41-50.

[5] Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690-1700.

[6] Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761-768.

[7] Meidan, Y., Bohadana, M., Shabtai, A., Guarnizo, J. D., Ochoa, M., Tippenhauer, N. O., & Elovici, Y. (2017, April). ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis. In Proceedings of the symposium on applied computing (pp. 506-509).

[8] Doshi, R., Apthorpe, N., & Feamster, N. (2018, May). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 29-35). IEEE.

[9] Fernandes, E., Jung, J., & Prakash, A. (2016, May). Security analysis of emerging smart home applications. In 2016 IEEE symposium on security and privacy (SP) (pp. 636-654). IEEE.

[10] Liu, H., Lang, B., Liu, M., & Yan, H. (2019). CNN and RNN based payload classification methods for attack detection. Knowledge-Based Systems, 163, 332-341.

[11] Al-Rimy, B. A. S., Maarof, M. A., & Shaid, S. Z. M. (2018). Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. Computers & Security, 74, 144-166.

[12] Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118-137.

[13] Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future generation computer systems, 82, 395-411.

[14] Mosenia, A., & Jha, N. K. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on emerging topics in computing, 5(4), 586-602.

[15] Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing, 21(2), 34-42.

[16] Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.

[17] Ande, R., Adebisi, B., Hammoudeh, M., & Saleem, J. (2020). Internet of Things: Evolution and technologies from a security perspective. Sustainable Cities and Society, 54, 101728.

[18] Awajan, A. (2023). A novel deep learning-based intrusion detection system for IOT networks. Computers, 12(2), 34.

[19] Wang, Z. (2018). Deep learning-based intrusion detection with adversaries. IEEE Access, 6, 38367-38384.

[20] Lansky, J., Ali, S., Mohammadi, M., Majeed, M. K., Karim, S. H. T., Rashidi, S., ... & Rahmani, A. M. (2021). Deep learning-based intrusion detection systems: a systematic review. IEEE Access, 9, 101574-101599.

[21] Kodi D, “Multi-Cloud FinOps: AI-Driven Cost Allocation and Optimization Strategies”, International Journal of Emerging Trends in Computer Science and Information Technology, pp. 131-139, 2025.

[22] Jagadeesan Pugazhenthi, Vigneshwaran & Pandy, Gokul & Jeyarajan, Baskaran & Murugan, Aravindhan. (2025). “AI-Driven Voice Inputs for Speech Engine Testing in Conversational Systems”. PAGES- 700-706. 10.1109/SoutheastCon56624.2025.10971485.

[23] Animesh Kumar, “AI-Driven Innovations in Modern Cloud Computing”, Computer Science and Engineering, 14(6), 129-134, 2024.

[24] Marella, Bhagath Chandra Chowdari, and Gopi Chand Vegineni. "Automated Eligibility and Enrollment Workflows: A Convergence of AI and Cybersecurity." AI-Enabled Sustainable Innovations in Education and Business, edited by Ali Sorayyaei Azar, et al., IGI Global, 2025, pp. 225-250. https://doi.org/10.4018/979-8-3373-3952-8.ch010

[25] Kirti Vasdev. (2020). “GIS in Cybersecurity: Mapping Threats and Vulnerabilities with Geospatial Analytics”. International Journal of Core Engineering & Management, 6(8, 2020), 190–195. https://doi.org/10.5281/zenodo.15193953

[26] L. N. R. Mudunuri, V. M. Aragani, and P. K. Maroju, "Enhancing Cybersecurity in Banking: Best Practices and Solutions for Securing the Digital Supply Chain," Journal of Computational Analysis and Applications, vol. 33, no. 8, pp. 929-936, Sep. 2024.

[27] Divya Kodi, "Zero Trust in Cloud Computing: An AI-Driven Approach to Enhanced Security," SSRG International Journal of Computer Science and Engineering, vol. 12, no. 4, pp. 1-8, 2025. Crossref, https://doi.org/10.14445/23488387/IJCSE-V12I4P101

[28] Puneet Aggarwal, Amit Aggarwal. "Empowering Intelligent Enterprises: Leveraging SAP's SIEM Intelligence For Proactive Cybersecurity", International Journal Of Computer Trends And Technology, 72 (10), 15-21, 2024.

[29] R. Daruvuri, K. K. Patibandla, and P. Mannem, “Data Driven Retail Price Optimization Using XGBoost and Predictive Modeling”, in Proc. 2025 International Conference on Intelligent Computing and Control Systems (ICICCS), Chennai, India. pp. 838–843, 2025.

[30] Mudunuri L.N.R.; (December, 2023); “AI-Driven Inventory Management: Never Run Out, Never Overstock”; International Journal of Advances in Engineering Research; Vol 26, Issue 6; 24-36

[31] Praveen Kumar Maroju, "Assessing the Impact of AI and Virtual Reality on Strengthening Cybersecurity Resilience Through Data Techniques," Conference: 3rd International conference on Research in Multidisciplinary Studies Volume: 10, 2024.

[32] Govindarajan Lakshmikanthan, Sreejith Sreekandan Nair (2022). Securing the Distributed Workforce: A Framework for Enterprise Cybersecurity in the Post-COVID Era. International Journal of Advanced Research in Education and Technology 9 (2):594-602.

[33] A Novel AI-Blockchain-Edge Framework for Fast and Secure Transient Stability Assessment in Smart Grids, Sree Lakshmi Vineetha Bitragunta, International Journal for Multidisciplinary Research (IJFMR), Volume 6, Issue 6, November-December 2024, PP-1-11.

[34] Rao, Kolati Mallikarjuna and Patel, Bhavikkumar, "Suspicious Call Detection and Mitigation Using Conversational AI", Technical Disclosure Commons, (December 04, 2023) https://www.tdcommons.org/dpubs_series/6473

[35] Dr. Priya. A., Dr. Charles Arockiasamy J., “The Global Reach of AI: A Postcolonial Analysis of Technological Dominance,” International Journal of Scientific Research in Science and Technology, 11(2), 1-5, 2025.

Downloads

Published

2025-09-01

Issue

Section

Articles

How to Cite

AI-Driven Threat Detection in IoT Environments Using Adaptive Cybersecurity Frameworks. (2025). International Journal of Computer Science and Engineering Innovations, 1(1), 1-8. https://doi.org/10.64137/XXXXXXXX/IJCSEI-V1I1P101