2.5. Current Detection Platforms in IoT Security
Several previous works have designed platforms to enhance IoT security. In one paper [
19], researchers highlight the necessary security and privacy issues in IoT, noting well-known vulnerabilities since most IoT devices belong to wireless sensor networks (WSNs). The paper presents a passive network traffic-based security intrusion detection model to monitor threats, including Denial of Service (DoS) attacks, brute-force attempts, and device tampering. This model uses sniffing tools to identify irregular patterns, unauthorized access, and unusual device activity or behavior. It incorporates mechanisms such as automated responses (alerts or device isolation), which, combined with an iterative feedback loop for continual improvement in threat detection, make it responsive to changes in attack types and vectors.
However, this study points out some limitations. The model may be harder to deploy due to real-time network monitoring, and approximations in congestion estimation using sniffing tools introduce privacy concerns. While these tools are ideal for security purposes, they can inadvertently capture sensitive information, leading to ethically concerning data privacy issues. Additionally, the complexities involved in deploying a successful network monitoring setup make real-world implementation challenging. Despite these challenges, the model presented illustrates an attempt to address IoT security from a proactive standpoint, balancing the need for robust intrusion detection with privacy considerations.
Secondly, in the study in [
20], the researchers proposed an intrusion detection system (IDS) using Raspberry Pi for IoT devices to address this gap. The study aims to understand how effectively an IDS can identify various network attacks, enhance its configuration for improved performance, and evaluate its vulnerabilities. A simulated IoT environment utilizing the Raspberry Pi IDS, a temperature sensor, and background traffic generators is employed to conduct experiments and analyze system performance through metrics derived from log files. Finally, the expected outcomes of this research include demonstrating the concept of securing IoT devices with a Raspberry Pi-based IDS and providing recommendations on tuning the Snort IDS for optimal performance on a Raspberry Pi device.
However, securing IoT networks requires more comprehensive solutions than the specific lightweight Raspberry Pi-based intrusion detection system (IDS), particularly in larger or more diverse IoT environments. Additionally, IDS evaluation is limited to specific network attacks, which may hinder its effectiveness against novel or more sophisticated threats. It also depends on proper configuration and necessitates further investigation into the optimal settings. Finally, the results cannot be fully generalized to all IoT scenarios, as this study was conducted using a particular setup, indicating that special adaptations are needed for various IoT applications.
Harwalkar et al. addressed the major security issues facing IoT networks due to the large-scale data exchange between connected devices [
21]. The authors proposed a neural network-based IDS that employs Long Short-Term Memory (LSTM) and Tuna Swarm Optimization to enhance intrusion detection accuracy in an IoT environment. The model utilized the NSL-KDD dataset, which was preprocessed using SMOTE for balancing and RFE for feature filtering. Feature selection was refined further through the Moth Flame Optimization (MFO) process. Next, they implemented the TSO-LSTM model for attack detection and used TSO optimization to identify attacks based on LSTM outputs, achieving a detection accuracy of 99.98%. This model outperformed several benchmark approaches, including DBN, SMO-HPSO, CNN-LSTM, and BFO-RF, which achieved accuracies ranging from 98.8% to 99.96%. However, this study has limitations regarding the proposed model. Its reliance on the NSL-KDD dataset may restrict generalization, as it might not accurately represent realistic IoT environments.
Furthermore, the complex combination of LSTM and TSO in the model may be challenging to implement and tune in real-world applications. Another concern is that the system may not scale well and could perform poorly as the number of IoT devices increases. Furthermore, the study lacks sufficient information to identify which types of attacks intentionally targeting the model would be effective, limiting its performance against a broader range of threats. Finally, the absence of real-time testing overlooks a crucial aspect of the model’s practical performance, significantly important in IoT dynamic environments that require real-time responsiveness.
Finally, the work in [
22] proposed a real-time security monitoring (RSM) platform that utilizes deep learning models such as CNN, LSTM, and Deep Neural Networks (DNN) to predict and visualize attacks on IoT networks. The models are evaluated using the IoT23 dataset based on precision, recall rate, and F1-score values. The practical experiment employs a Raspberry Pi to collect log data. An edge router sends this data to the server, enabling real-time predictions, while Power BI serves as the dashboard for monitoring IoT performance. As a result, the RSM platform demonstrates improved performance for attack prediction.
Table 1 presents a comparative analysis of the latest related works and explains how this paper enhances them.
In conclusion, many works demonstrate that conventional methods, such as CNN or LSTM models, can effectively identify known security issues in network traffic. These studies have provided valuable insights into the effectiveness of data-driven detection in controlled settings. However, a major limitation of these approaches is their heavy reliance on manually defined steps to extract features from raw data. This process not only demands expert knowledge but also makes the systems less adaptable to new or evolving threats. Additionally, many methods face challenges when deployed in environments with limited resources, as they tend to be computationally intensive. Another gap in the existing literature is the lack of integration between detection and mitigation. While many methods focus solely on identifying vulnerabilities, few offer built-in solutions or recommendations to address these issues in real time.
Finally, several limitations affect the robustness and practicality of existing platforms. Deep learning-based models are central to many real-time security monitoring systems, but their performance can vary significantly depending on the dataset and type of attack used during testing. For example, the IoT23 dataset is only one instance and may not encompass all possible IoT attack methods, which can impact the overall robustness of the platform. Moreover, in massive IoT networks involving numerous devices, real-time processing can pose significant challenges. Additionally, issues with integration and standardization may arise when attempting to incorporate a real-time security monitoring platform into various existing IoT architectures and systems, leading to further complications.
As summarized in
Table 2, our research addresses important gaps in the literature on IoT security and intrusion detection through an innovative, featureless AI-based methodology. Previous research has demonstrated that standard IDS is limited in IoT scenarios. For example, a low-resource Raspberry Pi-based intrusion detection system, optimized for IoT environments, has been introduced. However, its restricted scalability, dependence on specific network setups, and challenges in adapting to complex IoT ecosystems with diverse device types limit its effectiveness. Additionally, research has explored the use of DL approaches for intrusion detection; however, these studies often rely on feature extraction techniques or complex optimization algorithms, which hinder real-time flexibility and increase implementation complexity. The limited capacity of these models to effectively address zero-day threats arises from their reliance on complex, manually created features to detect vulnerabilities.
In order to overcome these challenges, we have developed the first platform that combines featureless methods with DL and LLM models. These models examine unprocessed network traffic data to identify zero-day IoT vulnerabilities. In contrast to traditional methods that rely on manual feature extraction, our platform directly extracts and analyses vulnerability factors from the dataset using pre-trained AI models. This approach increases scalability and simplifies the detection process, allowing our lightweight models to perform efficiently even in IoT environments with limited resources. Furthermore, we integrate a user-friendly interface that addresses the accessibility gap noted in previous research, enabling non-technical individuals to utilize complex IoT security measures. Our study directly addresses the problems identified in earlier studies by offering a scalable, effective, and flexible solution for IoT security.