{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T23:09:13Z","timestamp":1775603353654,"version":"3.50.1"},"reference-count":34,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T00:00:00Z","timestamp":1556323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Cyber-attacks on the Internet of Things (IoT) are growing at an alarming rate as devices, applications, and communication networks are becoming increasingly connected and integrated. When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. It is imperative to detect attacks on IoT systems in near real time to provide effective security and defense. In this paper, we develop an intelligent intrusion-detection system tailored to the IoT environment. Specifically, we use a deep-learning algorithm to detect malicious traffic in IoT networks. The detection solution provides security as a service and facilitates interoperability between various network communication protocols used in IoT. We evaluate our proposed detection framework using both real-network traces for providing a proof of concept, and using simulation for providing evidence of its scalability. Our experimental results confirm that the proposed intrusion-detection system can detect real-world intrusions effectively.<\/jats:p>","DOI":"10.3390\/s19091977","type":"journal-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T02:57:32Z","timestamp":1556506652000},"page":"1977","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":255,"title":["Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things"],"prefix":"10.3390","volume":"19","author":[{"given":"Geethapriya","family":"Thamilarasu","sequence":"first","affiliation":[{"name":"School of STEM, University of Washington Bothell, Bothell, WA 98011, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0583-6494","authenticated-orcid":false,"given":"Shiven","family":"Chawla","sequence":"additional","affiliation":[{"name":"School of STEM, University of Washington Bothell, Bothell, WA 98011, USA"}]}],"member":"1968","published-online":{"date-parts":[[2019,4,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of Things: Vision, applications and research challenges","volume":"10","author":"Miorandi","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"ref_3","unstructured":"Smith, S. (2015). IoT Connected Devices to Triple to Over 38Bn Units, Juniper Research."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","article-title":"On the features and challenges of security and privacy in distributed Internet of Things","volume":"57","author":"Roman","year":"2013","journal-title":"Comput. Netw."},{"key":"ref_5","unstructured":"Khan, A. (2016, January 10). Overview of Security in Internet of Things. Proceedings of the 3rd International Conference on Recent Trends in Engineering Science and Management, Bundi, Rajasthan, India."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","article-title":"Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks","volume":"4","author":"Abomhara","year":"2015","journal-title":"J. Cyber Secur. Mobil."},{"key":"ref_7","unstructured":"Shieh, S.W. (2015, January 14\u201317). Emerging Security Threats and Countermeasures in IoT. Proceedings of the ACM Asia Conference on Computer and Communications Security, Singapore."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Williams, R., McMahon, E., Samtani, S., Patton, M., and Chen, H. (2017, January 22\u201324). Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, China.","DOI":"10.1109\/ISI.2017.8004904"},{"key":"ref_9","unstructured":"Hilton, S. (Dyn Blog, 2016). Dyn Analysis Summary Of Friday October 21 Attack, Dyn Blog."},{"key":"ref_10","unstructured":"Solon, O. (The Guardian, 2016). Team of hackers take remote control of Tesla Model S from 12 miles away, The Guardian."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1080\/17434440.2018.1483235","article-title":"Security of implantable medical devices with wireless connections: The dangers of cyber-attacks","volume":"15","author":"Pycroft","year":"2018","journal-title":"Expert Rev. Med. Devices"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., and Spirito, M.A. (2013, January 4\u20138). DEMO: An IDS Framework for Internet of Things Empowered by 6LoWPAN. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany.","DOI":"10.1145\/2508859.2512494"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Krimmling, J., and Peter, S. (2014, January 29\u201331). Integration and Evaluation of Intrusion Detection for CoAP in smart city applications. Proceedings of the IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, USA.","DOI":"10.1109\/CNS.2014.6997468"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1002\/dac.2356","article-title":"6LoWPAN: A study on QoS security threats and countermeasures using intrusion detection system approach","volume":"25","author":"Le","year":"2012","journal-title":"Int. J. Commun. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Chawla, S., and Thamilarasu, G. (2018, January 9\u201311). Security As a Service: Real-time Intrusion Detection in Internet of Things. Proceedings of the Fifth Cybersecurity Symposium, CyberSec \u201918, Coeur d\u2019 Alene, ID, USA.","DOI":"10.1145\/3212687.3212872"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Khan, R., Khan, S.U., Zaheer, R., and Khan, S. (2012, January 17\u201319). Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges. Proceedings of the 10th International Conference on Frontiers of Information Technology, Islamabad, India.","DOI":"10.1109\/FIT.2012.53"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Xu, T., Wendt, J.B., and Potkonjak, M. (2014, January 3\u20136). Security of IoT Systems: Design Challenges and Opportunities. Proceedings of the International Conference on Computer-Aided Design, San Jose, CA, USA.","DOI":"10.1109\/ICCAD.2014.7001385"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s11277-011-0385-5","article-title":"Security Challenges in the IP-based Internet of Things","volume":"61","author":"Heer","year":"2011","journal-title":"Wirel. Person. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","article-title":"A roadmap for security challenges in the Internet of Things","volume":"4","author":"Sfar","year":"2018","journal-title":"Digit. Commun. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Zhou, W., Jia, Y., Peng, A., Zhang, Y., and Liu, P. (2018). The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Zhao, K., and Ge, L. (2013, January 14\u201315). A Survey on the Internet of Things Security. Proceedings of the 2013 9th International Conference on Computational Intelligence and Security (CIS), Leshan, Sichuan, China.","DOI":"10.1109\/CIS.2013.145"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M.A., and Vinkovits, M. (2013, January 7\u20139). Denial-of-Service detection in 6LoWPAN based Internet of Things. Proceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France.","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Danda, J.M.R., and Hota, C. (2016). Attack Identification Framework for IoT Devices. Information Systems Design and Intelligent Applications, Springer India.","DOI":"10.1007\/978-81-322-2752-6_49"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Le, A., Loo, J., Chai, K.K., and Aiash, M. (2016). A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology. Information, 7.","DOI":"10.3390\/info7020025"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Surendar, M., and Umamakeswari, A. (2016, January 23\u201325). InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN. Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India.","DOI":"10.1109\/WiSPNET.2016.7566473"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.comcom.2016.12.001","article-title":"Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach","volume":"98","author":"Bostani","year":"2017","journal-title":"Comput. Commun."},{"key":"ref_27","first-page":"1750637","article-title":"An Automata Based Intrusion Detection Method for Internet of Things","volume":"2017","author":"Fu","year":"2017","journal-title":"Mobile Inf. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","article-title":"SVELTE: Real-time Intrusion Detection in the Internet of Things","volume":"11","author":"Raza","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Liu, C., Yang, J., Chen, R., Zhang, Y., and Zeng, J. (2011, January 26\u201328). Research on immunity-based intrusion detection technology for the Internet of Things. Proceedings of the 2011 Seventh International Conference on Natural Computation, Shanghai, China.","DOI":"10.1109\/ICNC.2011.6022060"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Arrington, B., Barnett, L., Rufus, R., and Esterline, A. (2016, January 1\u20134). Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms. Proceedings of the 2016 25th International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA.","DOI":"10.1109\/ICCCN.2016.7568495"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1186\/s13638-018-1128-z","article-title":"An intrusion detection method for internet of things based on suppressed fuzzy clustering","volume":"2018","author":"Liu","year":"2018","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_32","unstructured":"Nielsen, M.A. (2015). Neural Networks and Deep Learning, Determination Press. Available online: http:\/\/neuralnetworksanddeeplearning.com\/."},{"key":"ref_33","unstructured":"Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., and Wadhaj, I. (2016). Cooja Simulator Manual, Edinburgh Napier University."},{"key":"ref_34","unstructured":"Alghuried, A. (2017). A Model for Anomalies Detection in Internet of Things (IoT) Using Inverse Weight Clustering and Decision Tree. [Masters\u2019s Thesis, Dublin Institute of Technology]."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/9\/1977\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:47:36Z","timestamp":1760186856000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/9\/1977"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,27]]},"references-count":34,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2019,5]]}},"alternative-id":["s19091977"],"URL":"https:\/\/doi.org\/10.3390\/s19091977","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,27]]}}}