Published on: April 2026
DETECTION OF CYBER ATTACKS TRACES IN IOT DATA
SHAIK SOHEL AKTHER
V .Prema Tulasi
Article Status
Available Documents
Abstract
The trained models analyze IoT network data and classify it as normal or malicious activity. Experimental results show that the neural network model achieves high accuracy in detecting cyber attacks. The proposed approach utilizes data analysis and machine learning techniques to monitor network traffic and device behavior. By examining features such as packet size, frequency, communication patterns, and unusual activities, the system can distinguish between normal and malicious operations.
How to Cite this Paper
AKTHER, S. S. (2026). Detection of Cyber Attacks Traces in IOT Data. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.309
AKTHER, SHAIK. "Detection of Cyber Attacks Traces in IOT Data." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.309.
AKTHER, SHAIK. "Detection of Cyber Attacks Traces in IOT Data." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.309.
References
- da Costa et al., 2019] da Costa, K. A., Papa, J. P., Lisboa, C. O., Munoz, R., and de Albuquerque, V. H. C. (2019). Internet of things: A survey on machine learning based intrusion detection approaches. Computer Networks, 151:147–157.
- D’Angelo et al., 2020] D’Angelo, G., Ficco, M., and Palmieri, F. (2020). Malware detection in mobile environments based on Autoencoders and API-images. Journal of Parallel and Distributed Computing, 137:26–33.
- Abolhasanzadeh, 2015] Abolhasanzadeh, B. (2015). Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features. In 2015 7th Conference on Information and Knowledge Technology (IKT), pages 1–5. IEEE.
- Agustin et al., 2020] Agustin, P., Sebastian, G., and Maria Jose, E. (2020 (accessed February 3, 2020)). Stratosphere laboratory. a labeled dataset with malicious and benign iot network traffic. https://www.stratosphereips.org/datasets-iot23.
- Al-Qatf et al., 2018] Al-Qatf, M., Lasheng, Y., Al-Habib, M., and Al-Sabahi, K. (2018). Deep learning approach combining sparse autoencoder with svm for network intrusion detection. IEEE Access, 6:52843–52856.
- Arel et al., 2009] Arel, I., Rose, D., and Coop, R. (2009). Destin: A scalable deep learning architecture with application to high-dimensional robust pattern recognition. In 2009 AAAI Fall Symposium Series.
- Barut et al., 2020] Barut, O., Luo, Y., Zhang, T., Li, W., and Li, P. (2020). Netml: A challenge for network traffic analytics. arXiv preprint arXiv:2004.13006.
- [Berman et al., 2019] Berman, D., Buczak, A., Chavis, J., and Corbett, C. (2019). A Survey of Deep Learning Methods for Cyber Security. Information, 10(4):122.
- [Bieniasz et al., 2019] Bieniasz, J., Stepkowska, M., Janicki, A., and Szczypiorski, K. (2019). Mobile agents for detecting network attacks using timing covert channels. J. UCS, 25(9):1109–1130.
- D’Angelo and Palmieri, 2021] D’Angelo, G. and Palmieri, F. (2021). Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction. Journal of Network and Computer Applications, 173:102890.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 12 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

