Specific aspects of designing an information security system to protect IoT networks from attacks

Authors

DOI:

https://doi.org/10.46299/j.isjea.20250405.03

Keywords:

IoT security, machine learning, cyber threats, anomaly detection

Abstract

In today’s rapidly developing Internet of Things (IoT), the issue of ensuring reliable information security is of particular importance. IoT networks are characterized by many interconnected devices that generate significant amounts of traffic and data, which complicates the processes of monitoring and timely detection of cyberattacks. Traditional protection methods are insufficient, since they do not consider the high level of traffic dynamics and the specifics of resource-limited devices. In this context, a promising direction is the application of machine learning methods for designing intelligent attack detection systems that can respond adaptively to new threats. The study focuses on analyzing individual aspects of designing an information security system for IoT networks, particularly the use of the Decision Tree and K-Nearest Neighbor (KNN) algorithms. Both methods are well-known approaches in data classification, demonstrating high efficiency in intrusion detection tasks. The Decision Tree algorithm allows you to create a hierarchical decision-making model that provides a clear interpretation of the results and the ability to explain the classification process. The KNN method, in turn, is based on the analysis of the proximity of objects in a multidimensional feature space, which allows you to adaptively classify new input data, relying on already known examples. Special attention is paid to forming feature sets that affect the system's accuracy. The specifics of IoT traffic are considered: the protocols' heterogeneity, the data transmission frequency variability, and the presence of standard and attack behavior patterns. Representative data sets containing examples of both legitimate requests and modern common attacks on IoT networks were used for experiments. The test results showed that both algorithms provide a satisfactory level of accuracy, but demonstrate different characteristics in the context of speed, noise sensitivity, and computing resource requirements. The scientific novelty of the work lies in the comparative analysis of the effectiveness of the Decision Tree and KNN methods for detecting attacks in IoT networks and in identifying key aspects of designing security systems focused on working in conditions of limited resources. The practical significance lies in the possibility of using the obtained results to create lightweight IDS systems suitable for integration into modern IoT environments. Thus, the proposed approach increases the protection level of IoT networks, ensuring timely detection of potential attacks and reducing the risks of compromising data and services.

References

Kumar, Satendra & Kanchan, & Kumar, Amit & Aggarwal, Prachi. (2023). Internet of things (iot) applications and challenges: a review. 11. 359-367.

Hornos, M.J., Quinde, M. Development methodologies for IoT-based systems: challenges and research directions. J Reliable Intell Environ 10, 215–244 (2024). https://doi.org/10.1007/s40860-024-00229-9

Lan Luo, Christopher Morales-Gonzalez, Shan Wang, Zhen Ling, Xinwen Fu. A Unified View of IoT And CPS Security and Privacy. 2024 International Conference on Computing, Networking and Communications (ICNC).

https://doi.org/10.1109/ICNC59896.2024.10555966

Ameyed, D., Jaafar, F., Petrillo, . et al. Quality and Security Frameworks for IoT-Architecture Models Evaluation. SN COMPUT. SCI. 4, 394 (2023). https://doi.org/10.1007/s42979-023-01815-z

Almutairi, M., & Sheldon, F. T. (2025). IoT–Cloud Integration Security: A Survey of Challenges, Solutions, and Directions. Electronics, 14(7), 1394. https://doi.org/10.3390/electronics14071394

Tabi Fouda, B. M., Wang, L., Han, D., Ngoumou, P. C., & Atangana, J. (2025). Design and Implementation of a Novel IoT Architecture for Data Release System Between Multiple Platforms: Case of Smart Offshores. Sensors, 25(11), 3384. https://doi.org/10.3390/s25113384

R. Kumar Yadav and K. Karamveer, A Survey on IOT Botnets and their Detection Approaches. 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India, 2022, pp. 1901-1906, doi: 10.1109/ICAC3N56670.2022.10074482.

Gelgi, M., Guan, Y., Arunachala, S., Samba Siva Rao, M., & Dragoni, N. (2024). Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques. Sensors, 24(11), 3571. https://doi.org/10.3390/s24113571

W, Regis & G, Kirubavathi & K., Sridevi. (2023). Detection of IoT Botnet using Machine learning and Deep Learning Techniques. 10.21203/rs.3.rs-2630988/v1.

Sen, R., Heim, G., & Zhu, Q. (2022). Artificial Intelligence and Machine Learning in Cybersecurity: Applications, Challenges, and Opportunities for MIS Academics. Communications of the Association for Information Systems, 51, pp-pp. https://doi.org/10.17705/1CAIS.05109

V. Khatri, G. Agarwal, A. K. Gupta and A. Sanghi, Machine Learning and Artificial Intelligence in Cybersecurity: Innovations and Challenges. 2024 Second International Conference on Advanced Computing & Communication Technologies (ICACCTech), Sonipat, India, 2024, pp. 732-737, doi: 10.1109/ICACCTech65084.2024.00122.

Mohamed د. نشأت عبد اللطيف, Nachaat. (2025). Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms. Knowledge and Information Systems. 67. 6969-7055. 10.1007/s10115-025-02429-y.

Ashraf, Javed & Moustafa, Nour & Khurshid, Hasnat & Debie, Essam & Haider, Waqas & Wahab, Abdul. (2020). A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions. Electronics. 9. 10.3390/electronics9071177.

Decision Tree in Machine Learning. Available at: https://itwiki.dev/data-science/ml-reference/ml-glossary/decision-tree-in-machine-learning

K-Nearest Neighbor(KNN) Algorithm. Available at: https://www.geeksforgeeks.org/machine-learning/k-nearest-neighbours/

IoTNet24 Dataset for IDS. Available at: https://www.kaggle.com/datasets/wittigenz/hydras

Published

2025-10-01

How to Cite

Andrushchak, I., & Kosheliuk, V. (2025). Specific aspects of designing an information security system to protect IoT networks from attacks. International Science Journal of Engineering & Agriculture, 4(5), 27–39. https://doi.org/10.46299/j.isjea.20250405.03

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.