Journal of Machine and Computing


Advanced Multi Class Cyber Security Attack Classification in IoT Based Wireless Sensor Networks Using Context Aware Depthwise Separable Convolutional Neural Network



Journal of Machine and Computing

Received On : 30 May 2024

Revised On : 18 December 2024

Accepted On : 28 January 2025

Published On : 05 April 2025

Volume 05, Issue 02

Pages : 814-830


Abstract


One of the most widely used wireless technologies in recent years has been wireless sensor networks (WSN), which has led to intriguing new Internet of Things (IoT) applications. Internet Protocol IP integration with IoT-based WSN enables any physical item with sensors must have widespread connectivity and transmit data in real time to the server linked to the gate on the internet. WSN security is still a developing area of study that falls under the Internet of Things paradigm. To protect digital infrastructures, strong techniques for precise and effective multi-class classification are required due to the growing frequency and sophistication of cyber-attacks. The proposed method makes use of the CICIDS2017 and UNSW-NB15 datasets alongside IoT-based wireless sensor networks to enhance cyber-security detection. In this work, Boosted Sooty Tern Optimization (BSTO) and Context-Aware Depthwise Separable Convolutional Neural Networks (CA-DSCNN) present an enhanced method for classifying multi-class cyber-security attacks. To guarantee consistent feature scaling, the proposed approach starts by applying Min-Max Scaler Normalization to preprocess the raw attack data. There is a feature selection stage that comes afterwards that uses Banyan Tree Growth Optimization (BTGO) combined with Augmented Snake Optimizer (ASO) to efficiently find and choose the most relevant characteristics to improve classification performance. Because of its strong feature extraction capabilities and computational efficiency, the CA-DSCNN is used; depthwise separable convolutions are used to strike a compromise between processing needs and accuracy. This architecture enhances the ability to extract complicated characteristics from the data and to comprehend those characteristics in context. BSTO is used to optimize the neural network's parameters, improving classification efficiency and accuracy in order to further enhance model performance. By lowering computational expenses and over-fitting, the proposed methodology which integrates IoT-based wireless sensor networks enhances cyber-security attack classification, exhibiting improved accuracy 99.5% and high PDR 99%.


Keywords


Multi-Class Cyber Security Attack, IoT-Based WSN, Min-Max Scaler Normalization, Context-Aware Depthwise Separable Convolutional Neural Networks, Banyan Tree Growth Optimization, Augmented Snake Optimizer and Boosted Sooty Tern Optimization.


  1. N. F. Syed, Z. Baig, A. Ibrahim, and C. Valli, “Denial of service attack detection through machine learning for the IoT,” Journal of Information and Telecommunication, vol. 4, no. 4, pp. 482–503, Jun. 2020, doi: 10.1080/24751839.2020.1767484.
  2. K. Kim, F. A. Alfouzan, and H. Kim, “Cyber-Attack Scoring Model Based on the Offensive Cybersecurity Framework,” Applied Sciences, vol. 11, no. 16, p. 7738, Aug. 2021, doi: 10.3390/app11167738.
  3. Dutta, M. Choraś, M. Pawlicki, and R. Kozik, “A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection,” Sensors, vol. 20, no. 16, p. 4583, Aug. 2020, doi: 10.3390/s20164583.
  4. H. Goyel and K. S. Swarup, “Data Integrity Attack Detection Using Ensemble-Based Learning for Cyber–Physical Power Systems,” IEEE Transactions on Smart Grid, vol. 14, no. 2, pp. 1198–1209, Mar. 2023, doi: 10.1109/tsg.2022.3199305.
  5. Almalaq, S. Albadran, and M. Mohamed, “Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems,” Mathematics, vol. 10, no. 15, p. 2574, Jul. 2022, doi: 10.3390/math10152574.
  6. M. Arunkumar and K. Ashok Kumar, “Malicious attack detection approach in cloud computing using machine learning techniques,” Soft Computing, vol. 26, no. 23, pp. 13097–13107, Feb. 2022, doi: 10.1007/s00500-021-06679-0.
  7. S. Aktar and A. Yasin Nur, “Towards DDoS attack detection using deep learning approach,” Computers & Security, vol. 129, p. 103251, Jun. 2023, doi: 10.1016/j.cose.2023.103251.
  8. Y. Wan and T. Dragicevic, “Data-Driven Cyber-Attack Detection of Intelligent Attacks in Islanded DC Microgrids,” IEEE Transactions on Industrial Electronics, vol. 70, no. 4, pp. 4293–4299, Apr. 2023, doi: 10.1109/tie.2022.3176301.
  9. D. Akgun, S. Hizal, and U. Cavusoglu, “A new DDoS attacks intrusion detection model based on deep learning for cybersecurity,” Computers & Security, vol. 118, p. 102748, Jul. 2022, doi: 10.1016/j.cose.2022.102748.
  10. F. W. Alsaade and M. H. Al-Adhaileh, “Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms,” Sensors, vol. 23, no. 8, p. 4086, Apr. 2023, doi: 10.3390/s23084086.
  11. T. Gopalakrishnan et al., “Deep Learning Enabled Data Offloading With Cyber Attack Detection Model in Mobile Edge Computing Systems,” IEEE Access, vol. 8, pp. 185938–185949, 2020, doi: 10.1109/access.2020.3030726.
  12. L. Vu, Q. U. Nguyen, D. N. Nguyen, D. T. Hoang, and E. Dutkiewicz, “Deep Transfer Learning for IoT Attack Detection,” IEEE Access, vol. 8, pp. 107335–107344, 2020, doi: 10.1109/access.2020.3000476.
  13. M. R. Habibi, H. R. Baghaee, F. Blaabjerg, and T. Dragicevic, “Secure MPC/ANN-Based False Data Injection Cyber-Attack Detection and Mitigation in DC Microgrids,” IEEE Systems Journal, vol. 16, no. 1, pp. 1487–1498, Mar. 2022, doi: 10.1109/jsyst.2021.3086145.
  14. O. Aouedi, K. Piamrat, G. Muller, and K. Singh, “Federated Semisupervised Learning for Attack Detection in Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 286–295, Jan. 2023, doi: 10.1109/tii.2022.3156642.
  15. M. Khosravi and B. T. Ladani, “Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection,” IEEE Access, vol. 8, pp. 162642–162656, 2020, doi: 10.1109/access.2020.3021499.
  16. S. Chen, Z. Wu, and P. D. Christofides, “Cyber-attack detection and resilient operation of nonlinear processes under economic model predictive control,” Computers & Chemical Engineering, vol. 136, p. 106806, May 2020, doi: 10.1016/j.compchemeng.2020.106806.
  17. S. Crespo-Martínez, A. Campazas-Vega, Á. M. Guerrero-Higueras, V. Riego-DelCastillo, C. Álvarez-Aparicio, and C. Fernández-Llamas, “SQL injection attack detection in network flow data,” Computers & Security, vol. 127, p. 103093, Apr. 2023, doi: 10.1016/j.cose.2023.103093.
  18. M. Kravchik and A. Shabtai, “Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 4, pp. 2179–2197, Jul. 2022, doi: 10.1109/tdsc.2021.3050101.
  19. Y. A. Farrukh, Z. Ahmad, I. Khan, and R. M. Elavarasan, “A Sequential Supervised Machine Learning Approach for Cyber Attack Detection in a Smart Grid System,” 2021 North American Power Symposium (NAPS), Nov. 2021, doi: 10.1109/naps52732.2021.9654767.
  20. S. L. V. Tummala and R. Kiran Inapakurthi, “A Two-stage Kalman Filter for Cyber-attack Detection in Automatic Generation Control System,” Journal of Modern Power Systems and Clean Energy, vol. 10, no. 1, pp. 50–59, 2022, doi: 10.35833/mpce.2019.000119.
  21. Y. Jia et al., “Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model,” Knowledge-Based Systems, vol. 276, p. 110781, Sep. 2023, doi: 10.1016/j.knosys.2023.110781.
  22. P. Semwal and A. Handa, “Cyber-Attack Detection in Cyber-Physical Systems Using Supervised Machine Learning,” Handbook of Big Data Analytics and Forensics, pp. 131–140, 2022, doi: 10.1007/978-3-030-74753-4_9.
  23. D. Prabakar, M. Sundarrajan, R. Manikandan, N. Z. Jhanjhi, M. Masud, and A. Alqhatani, “Energy Analysis-Based Cyber Attack Detection by IoT with Artificial Intelligence in a Sustainable Smart City,” Sustainability, vol. 15, no. 7, p. 6031, Mar. 2023, doi: 10.3390/su15076031.
  24. E. C. Balta, M. Pease, J. Moyne, K. Barton, and D. M. Tilbury, “Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems,” IEEE Transactions on Automation Science and Engineering, vol. 21, no. 2, pp. 1695–1712, Apr. 2024, doi: 10.1109/tase.2023.3243147.
  25. Q. Li, J. Zhang, J. Zhao, J. Ye, W. Song, and F. Li, “Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems,” IEEE Transactions on Smart Grid, vol. 13, no. 3, pp. 2369–2380, May 2022, doi: 10.1109/tsg.2022.3148233.
  26. Salam, F. Ullah, F. Amin, and M. Abrar, “Deep Learning Techniques for Web-Based Attack Detection in Industry 5.0: A Novel Approach,” Technologies, vol. 11, no. 4, p. 107, Aug. 2023, doi: 10.3390/technologies11040107.
  27. O. Jullian, B. Otero, E. Rodriguez, N. Gutierrez, H. Antona, and R. Canal, “Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework,” Journal of Network and Systems Management, vol. 31, no. 2, Feb. 2023, doi: 10.1007/s10922-023-09722-7.
  28. M. K. Raghunath, V. V. Kumar, M. Venkatesan, K. K. Singh, T. R. Mahesh, and A. Singh, “XGBoost Regression Classifier (XRC) Model for Cyber Attack Detection and Classification Using Inception V4,” Journal of Web Engineering, Apr. 2022, doi: 10.13052/jwe1540-9589.21413.
  29. F. B. Saghezchi, G. Mantas, M. A. Violas, A. M. de Oliveira Duarte, and J. Rodriguez, “Machine Learning for DDoS Attack Detection in Industry 4.0 CPPSs,” Electronics, vol. 11, no. 4, p. 602, Feb. 2022, doi: 10.3390/electronics11040602.
  30. Y. Alaca and Y. Çelik, “Cyber attack detection with QR code images using lightweight deep learning models,” Computers & Security, vol. 126, p. 103065, Mar. 2023, doi: 10.1016/j.cose.2022.103065.
  31. B. Deepa and K. Ramesh, “Epileptic seizure detection using deep learning through min max scaler normalization,” International journal of health sciences, pp. 10981–10996, May 2022, doi: 10.53730/ijhs.v6ns1.7801.
  32. X. Wu, W. Zhou, M. Fei, Y. Du, and H. Zhou, “Banyan tree growth optimization and application,” Cluster Computing, vol. 27, no. 1, pp. 411–441, Jan. 2023, doi: 10.1007/s10586-022-03953-0.
  33. R. Abu Khurma, D. Albashish, M. Braik, A. Alzaqebah, A. Qasem, and O. Adwan, “An augmented Snake Optimizer for diseases and COVID-19 diagnosis,” Biomedical Signal Processing and Control, vol. 84, p. 104718, Jul. 2023, doi: 10.1016/j.bspc.2023.104718.
  34. Dang, P. Pang, and J. Lee, “Depth-Wise Separable Convolution Neural Network with Residual Connection for Hyperspectral Image Classification,” Remote Sensing, vol. 12, no. 20, p. 3408, Oct. 2020, doi: 10.3390/rs12203408.
  35. J. Zhang, J. Ren, Q. Zhang, J. Liu, and X. Jiang, “Spatial Context-Aware Object-Attentional Network for Multi-Label Image Classification,” IEEE Transactions on Image Processing, vol. 32, pp. 3000–3012, 2023, doi: 10.1109/tip.2023.3266161.
  36. E. H. Houssein, D. Oliva, E. Çelik, M. M. Emam, and R. M. Ghoniem, “Boosted sooty tern optimization algorithm for global optimization and feature selection,” Expert Systems with Applications, vol. 213, p. 119015, Mar. 2023, doi: 10.1016/j.eswa.2022.119015.
  37. S. Al-Daweri, K. A. Zainol Ariffin, S. Abdullah, and M. F. E. Md. Senan, “An Analysis of the KDD99 and UNSW-NB15 Datasets for the Intrusion Detection System,” Symmetry, vol. 12, no. 10, p. 1666, Oct. 2020, doi: 10.3390/sym12101666.
  38. R. Dube, “Faulty use of the CIC-IDS 2017 dataset in information security research,” Journal of Computer Virology and Hacking Techniques, vol. 20, no. 1, pp. 203–211, Dec. 2023, doi: 10.1007/s11416-023-00509-7.
  39. R. Krishnan et al., “An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks,” Wireless Personal Communications, vol. 124, no. 4, pp. 3461–3483, Mar. 2022, doi: 10.1007/s11277-022-09521-4.
  40. S. Subramani and M. Selvi, “Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks,” Optik, vol. 273, p. 170419, Feb. 2023, doi: 10.1016/j.ijleo.2022.170419.
  41. H. M. Saleh, H. Marouane, and A. Fakhfakh, “Stochastic Gradient Descent Intrusions Detection for Wireless Sensor Network Attack Detection System Using Machine Learning,” IEEE Access, vol. 12, pp. 3825–3836, 2024, doi: 10.1109/access.2023.3349248.
  42. H. Shahid, H. Ashraf, H. Javed, M. Humayun, N. Jhanjhi, and M. A. AlZain, “Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks,” Computers, Materials & Continua, vol. 68, no. 2, pp. 1967–1981, 2021, doi: 10.32604/cmc.2021.015259.
  43. U. Panahi and C. Bayılmış, “Enabling secure data transmission for wireless sensor networks based IoT applications,” Ain Shams Engineering Journal, vol. 14, no. 2, p. 101866, Mar. 2023, doi: 10.1016/j.asej.2022.101866.

CRediT Author Statement


The author reviewed the results and approved the final version of the manuscript.


Acknowledgements


Authors thank Reviewers for taking the time and effort necessary to review the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Bangar Raju Cherukuri, “Advanced Multi Class Cyber Security Attack Classification in IoT Based Wireless Sensor Networks Using Context Aware Depthwise Separable Convolutional Neural Network”, Journal of Machine and Computing, pp. 814-830, April 2025, doi: 10.53759/7669/jmc202505064.


Copyright


© 2025 Bangar Raju Cherukuri. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.