BSCSO-STNN: A Big Data-Driven IoT Intrusion Detection Model

International Journal of Electrical and Electronics Engineering |
© 2025 by SSRG - IJEEE Journal |
Volume 12 Issue 7 |
Year of Publication : 2025 |
Authors : S. Ravishankar, P. Kanmani |
How to Cite?
S. Ravishankar, P. Kanmani, "BSCSO-STNN: A Big Data-Driven IoT Intrusion Detection Model," SSRG International Journal of Electrical and Electronics Engineering, vol. 12, no. 7, pp. 312-330, 2025. Crossref, https://doi.org/10.14445/23488379/IJEEE-V12I7P123
Abstract:
The rapid expansion of the Internet of Things (IoT) and Big Data (BD) has led to security challenges. Securing IoT-BD against cyberattacks is necessary. An increasing number of applications are being implemented on BD platforms due to the rapid proliferation of data on the Internet. As the volume of data increases, the possibility of intrusions on the platform correspondingly increases. Conventional Intrusion Detection Systems (IDS) are ineffective for managing the extensive volume of historical data and unable to fulfil the security demands of BD platforms. This research aims to propose a novel intrusion detection model using Binary Sand Cat Swarm Optimization and Spatiotemporal Transformer Neural Network (BSCSO-STNN) model to address these issues. The CIC-IoT-23 and Bot-IoT datasets are collected and applied to train the model for evaluation. The developed BSCSO-STNN model is deployed in an Apache Spark (APS) framework. The datasets are initially preprocessed in this framework with data cleaning, oversampling, label encoding, and normalization. After preprocessing, the data is applied to the BSCSO for feature selection. Using the selected features, the STNN model performs binary and multiclass classification for both datasets. The BSCSO-STNN model attained 99.08% accuracy, 98.78% detection rate, 99.02% precision, and 98.94% F1-score using the CIC-IoT-23 dataset. The model attained 99.04% accuracy, 98.81% detection rate, 98.97% precision, and 98.95% F1-score for the BoT-IoT dataset in multiclass classification. The developed model outperformed all the current models in this research and demonstrated its accuracy in detecting intrusions.
Keywords:
Intrusion detection, Big Data, IoT, Deep Learning, BSCSO, STNN, Apache spark.
References:
[1] Liyuan Sun, Hongyun Zhang, and Chao Fang, “Data Security Governance in the Era of Big Data: Status, Challenge, and Prospects,” Data Sciences and Management, vol. 2, pp. 41-44, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Fadi Salo et al., “Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review,” arXiv Preprints, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mohammed M. Alani, “Big Data in Cybersecurity: A Survey of Applications and Future Trend,” Journal of Reliable Intelligent Environment, vol. 7, no. 2, pp. 85-114, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Mohanad G. Yaseen, and A.S. Alabahri, “Mapping the Evolutions of Intrusion Detections in Big Data: A Bibliometric Analysis,” Mesopotamian Journals of Big Data, vol. 2023, pp. 138-148, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Imane Laassar, and Moulay Youssef Hadi, “Intrusion Detection System for Internet of Things-Based Big Data: A Review,” International Journal of Reconfigurable and Embedded Systems (IJRES), vol. 12, no. 1, pp. 87-96, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Sanaa Mouhim, and Fadwa Lachhab, “Toward a Contexts Awareness System Using IoTs, AI, and Big Data Technologies,” IEEE Access, vol. 13, pp. 40302-40315, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Dina Fawzy, Sherin M. Moussa, and Nagwa L. Badr, “The Internet of Things and Architecture of Big Data Analytics: Challenge of Intersections at Different Domains,” IEEE Access, vol. 10, pp. 4969-4992, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] KarthikKumar Vaigandla, Nilofar Azami, and Radha Krishna Karane, “Investigations on Intrusion Detection Systems (IDS) in IoTs,” International Journal of Emerging Trends in Engineering Research, vol. 10, no. 3, pp. 158-166, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Amjad Rehman Khan et al., “Deep Learning for Intrusion Detection and Security of Internet of Things (IoTs): Current Analysis, Challenge, and Possible Solution,” Security and Communications Networks, vol. 2022, no. 1, pp. 1-13, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Muhammadu Sathik Raja Sathik Raja M.S, “The Rise of AI-Driven Networks Intrusions Detections System: Innovation, Challenge, and Future Direction,” International Journal of AI, Big Data, Computational and Management Studies, vol. 6, no. 1, pp. 1-9, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Chao Li et al., “An Anomaly Detections Approach Based on Integrated LSTMs for IoTs Big Data,” Security and Communications Networks, vol. 2023, no. 1, pp. 1-10, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Abdelaziz Al Dawi et al., “An Approach to Botnet Attacks in the Fog Computing Layers and Apache Spark for Smart Cities,” The Journal of Supercomputing, vol. 81, no. 4, pp. 1-30, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Muhammad Babar et al., “An Improved Big Data Analytics Architecture for Intruder Classifications using Machine Learning,” Security and Communications Networks, vol. 2023, no. 1, pp. 1-7, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Janusz Granat et al., “Big Data Analytics for Event Detection in the IoTs-Multicriteria Approach,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4418-4430, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Sikha Bagui et al., “Detecting Reconnaissance and Discovery Tactic from the MITRE ATT&CK Frameworks in Zeek Conn Log using Spark’s Machine Learning in the Big Data Frameworks,” Sensors, vol. 22, no. 20, pp. 1-25, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ali Alferaidi et al., “Distributed Deep CNNâLSTM Models for Intrusion Detection Methods in IoT-Based Vehicle,” Mathematical Problems in Engineering, vol. 2022, no. 1, pp. 1-8, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Farhan Ullah et al., “Enhanced Networks Intrusion Detection Systems for Internet of Things Security using Multimodal Big Data Representations with Transfer Learning and Game Theory,” Sensors, vol. 24, no. 13, pp. 1-31, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Jie Wang et al., “Multicriteria Features Selection Based Intrusions Detections for Internet of Things Big Data,” Sensors, vol. 23, no. 17, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Fatma S. Alrayes et al., “Privacy-Preserving Approach for IoTs Network using Statistical Learning with Optimizations Algorithms on High-Dimension Big Data Environments,” Scientific Report, vol. 15, no. 1, pp. 1-27, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Mazhar Javed Awan et al., “Real-Time DDoS Attacks Detection Systems using Big Data Approach,” Sustainability, vol. 13, no. 19, pp. 1-19, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Lijuan Deng, Long Wan, and Jian Guo, “Research on Security Anomaly Detections for Big Data Platform based on Quantum Optimizations Clustering,” Mathematical Problems in Engineering, vol. 2022, no. 1, pp. 1-10, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Samed Al, and Murat Denner, “STL-HDL: A New Hybrid Network Intrusion Detection System for Imbalanced Datasets on Big Data Environments,” Computers & Security, vol. 110, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Farah Jemili, “Toward Data Fusion-Based Big Data Analytics for Intrusion Detection,” Journal of Information and Telecommunications, vol. 7, no. 4, pp. 409-436, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Ricardo Alejandro Manzano Sanchez et al., “Toward Developing A Robust Intrusion Detection Model using Hadoop Spark and Data Augmentations for IoT Network,” Sensors, vol. 22, no. 20, pp. 1-17, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Ahmed Alrefaei, and Mohammad Ilyas, “Using Machine Learning Multiclass Classification Techniques to Detect IoT Attacks in Real Time,” Sensors, vol. 24, no. 14, pp. 1-19, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Viet Anh Phan, Jan Jerabek, and Lukas Malina, “Comparisons of Multiple Feature Selection Techniques for Machine Learning-Based Detections of IoT Attacks,” ARES '24: Proceedings of the 19th International Conferences on Availability, Reliability and Security, Vienna Austria, pp. 1-10, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Xiangyu Liu, and Yanhui Du, “Toward Effective Feature Selections for IoT Botnet Attack Detection using a Genetic Algorithm,” Electronics, vol. 12, no. 5, pp. 1-12, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] L. Madhuridevi, and N.V.S. Sree Rathina Lakshmi, “Metaheuristics-Assisted Hybrid Deep Classifier for Intrusion Detection: A Big Data Perspective,” Wireless Networks, vol. 31, no. 2, pp. 1205-1225, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Thi-Thu-Huong Le et al., “Toward Unbalanced Multiclass Intrusion Detection with Hybrid Sampling Method and Ensembled Classifications,” Applied Soft Computing, vol. 157, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Nojood O. Aljehane et al., “Optimizing Intrusion Detections using Intelligent Feature Selections with Machine Learning Models,” Alexandria Engineering Journal, vol. 91, pp. 39-49, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Amir Seyyedabbasi, “Binary Sand Cats Swarm Optimizations Algorithm for Wrapper Features Selections on Biological Data,” Biomimetics, vol. 8, no. 3, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Elnaz Pashaei, “An Efficient Binary Sand Cats Swarm Optimizations for Feature Selection in High-Dimensional Biomedical Data,” Bioengineering, vol. 10, no. 10, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Junzhong Ji et al., “Spatio-Temporal Transformers Networks for Weather Forecasting,” IEEE Transactions on Big Data, vol. 11, no. 2, pp. 372-387, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Yujie You et al., “Spatiotemporal Transformers Neural Networks for Time-Series Forecasting,” Entropy, vol. 24, no. 11, pp. 1-18, 2022.
[CrossRef] [Google Scholar] [Publisher Link]