Table 2: Performance Evaluation of existing results over
UNSW-NB-15 dataset.
Model Accuracy Precision Recall F1
Score
AE 91.38 91.59 93.84 92.70
CNN 92.30 90.52 91.82 91.15
LSTM 95.97 94.13 96.74 95.41
MLP 93.51 92.88 96.57 94.69
Proposed
AGLCNet
98.75 97.83 98.92 98.35
Figure 2: Performance Evaluation over UNSW-NB-15
datasets.
The Table 2 shows the performance comparison of
proposed model with traditional models on UNSW-
NB-15 datasets. The Figure 2 show the visual
representation of performance evaluation.
5 CONCLUSIONS AND FUTURE
ENHANCEMENT
In this paper, a new attention-based GNN-LSTM-
CNN hybrid model (AGLCNet) for the detection of
cyberattacks in IoT networks was developed. The
model incorporates the strengths of each of these
architectures such as Graph Neural Networks (GNNs)
which model the spatial relationships among IoT
devices, Long Short-Term Memory networks
(LSTMs) which allow capturing of temporal trends in
the data and Convolutional Neural Networks (CNNs)
which structure the feature extraction. Through the
integration of an attention mechanism, the model
allocates resources to the most important features and
relationships, therefore improving its performance in
detecting different kinds of cyber threats. The
proposed model achieved better accuracy, precision,
recall, and F1 score metrics on the standard datasets
UNSW-NB-15. These findings demonstrate the
effectiveness of the model towards accurately
separating the benign and the malicious traffic in
heterogeneous IoT settings.
While the results are quite solid, the model still
struggles with certain attack types, especially those
which are more sophisticated, or those which occur
infrequently within the dataset. For instance, rare
attacks such as Worms produced slightly lower recall
scores with regard to that technique because of their
sparsity within the training set. Future work might
investigate the possibility of aggression towards such
rare classes of the model, with the use of techniques
such as data augmentation or synthetic minority over-
sampling SMOTE.
In addition, future studies could work towards the
improvement of GNN in order to enable real-time
application of the model when deployed in large
networks, as this complexity would be a challenge in
resource constrained environments.
REFERENCES
J.H.Lee, H. Kim, Security and Privacy challenges in the
internet of things [security and privacy matters], IEEE
consumer electronics magazine 6(3) (2017) 134-136
F. Panagiotis, K. Taxiarxchis, K. Georgios, L. Maglaras,
M.A. Farrag, Intrusion Detection in critical
infrastructures: a literature review. Smart Cities 4(3)
(2021) 1146-1157
M.A. Ferrag, L. Maglaras, S. Moschoyiannnis, H. Janicke
Deep Learning for cyber security intrusion detection:
approaches, datasets and comparative study, J. Inf.
Secur. Appl. 50 (2020), 102419.
K.A. Da Costa, J.P. Papa, C.O. Lisboa, R. Munoz, and
V.H.C. de Albuquerque Internet of Things: a survey on
machine learning-based intrusion detection approaches,
Comput. Network. 151 (2019), 147-157.
N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, P.
Faruki, Network Intrusion Detection for IoT security
based on learning techniques, IEEE Commuications
Surveys & Tutorials 21(3) (2019) 2671-2701.
S. Hajiheidari, K. Wakil, M. Badri, N.J. Navimipour,
Intrusion detection systems in the internet of things: a
comprehensive investigation, Comput. Network. 160
(2019) 165-191.
J.Asharf. N. Moustafa, H. Khurshid, E. Debie, W. Haider,
A review of intrusion detection systems using machine
and deep learning in internet of things: challenges,
solutions and future directions, Electronics 9(7) (2020)
1177.
Z. Ahmad, A. Shahid Khan, C. Wai Shiang, J. Abdullah, F.
Ahmad Network Intrusion Detection System: a
systematic study of machine learning and deep learning
approaches, Transactions on Emerging
Telecommunications Technologies 32(1) (2021) e4150.
80
100
Accuracy Precision Recall F1 Score
Performance Evaluation
AE CNN
LSTM MLP
Proposed AGLCNet