Authors :
Venkateswaran Radhakrishnan; S. Baghavathi Priya; Rajalakshmi. G. R.; Mohammed Ghouse Haneef Maqsood; Rogelio Gutierrez; Chithik Raja Mohamed; Mohamed Ashik
Volume/Issue :
Volume 10 - 2025, Issue 11 - November
Google Scholar :
https://tinyurl.com/mrxkxuh6
Scribd :
https://tinyurl.com/yfujfsch
DOI :
https://doi.org/10.38124/ijisrt/25nov1032
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
The swift spread of Internet of Things (IoT), alike the wildfire has forced us all into cybersecurity challenges and
therefore requires proper security tools for detecting and responding to real-time threats. Instead, this study moves in a
different sequence way-the sequence-based pattern analysis is a novel way to both identify and mitigate the possible cyber
threats that are associated with IoT networks. In the first stage of the study, a hybrid approach implementing the sequential
pattern mining and machine learning algorithms is followed the extraction of patterns related to the anomalies. At first, data
preprocessing is processed via the feature selection scheme to impetus the quality of generated patterns. Thereafter, the
frequent sequence mining technique is a move that is it applied; thus, to determine the repetition of attack patterns in the
IoT traffic data. Besides, a supervisor learning-based anomaly detection model is installed to classify threats on the basis of
temporal sequence anomalies. Further, the reinforcement based learning procured is the one that is adaptively applied such
that changes in the cyber threats get the system to learn and ultimately improve its detection accuracy. The plan has been
tested on a few large datasets of the IoT network that are the most common, to show its effectiveness by comparison with
methods in operation. The study findings in the line of sequence-based pattern analysis; plus, the machine learning are single
skills for this set of processes to perform IOT cyberattack detection that enables IoT secure environments
Keywords :
Cyber Threat Identification, Iot Security, Sequence -Depending Pattern Analysis, Anomaly Determination, Supervisor Learning, Reinforcement Based Learning, Network Infrastructure Security, Frequently Sequence Mining, Real-Time Threat Avoiding.
References :
- Zhong, M., Zhou, Y., & Chen, G. (2021). Sequential model based intrusion detection system for IoT servers using deep learning methods. Sensors, 21(4), 1113.
- S. R. Sagili and T. B. Kinsman, “Drive Dash: Vehicle Crash Insights Reporting System,” 2024 International Conference on Intelligent Systems and Advanced Applications (ICISAA), Pune, India, 2024, pp. 1-6
- S. R. Sagili, C. Goswami, V. C. Bharathi, S. Ananthi, K. Rani and R. Sathya, “Identification of Diabetic Retinopathy by Transfer Learning Based Retinal Images,” 2024 9th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 2024, pp. 1149-1154
- Altaf, T., Wang, X., Ni, W., Yu, G., Liu, R. P., & Braun, R. (2024). GNN-Based Network Traffic Analysis for the Detection of Sequential Attacks in IoT. Electronics, 13(12), 2274.
- Saharkhizan, M., Azmoodeh, A., Dehghantanha, A., Choo, K. K. R., & Parizi, R. M. (2020). An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet of Things Journal, 7(9), 8852-8859.
- Inuwa, M. M., & Das, R. (2024). A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks. Internet of Things, 26, 101162.
- Wheelus, C., & Zhu, X. (2020). IoT network security: Threats, risks, and a data-driven defense framework. IoT, 1(2), 259-285.
- Sudheera, K. L. K., Divakaran, D. M., Singh, R. P., & Gurusamy, M. (2021). ADEPT: Detection and identification of correlated attack stages in IoT networks. IEEE Internet of Things Journal, 8(8), 6591-6607.
- Wu, C. J., Huang, S. Y., Yoshioka, K., & Matsumoto, T. (2020). IoT malware analysis and new pattern discovery through sequence analysis using meta-feature information. IEICE Transactions on Communications, 103(1), 32-42.
- Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, S., & Khayami, R. (2017). Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence. IEEE transactions on emerging topics in computing, 8(2), 341-351.
- Shahin, M., Maghanaki, M., Hosseinzadeh, A., & Chen, F. F. (2024). Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems. Advanced Engineering Informatics, 62, 102685.
- Mahboubi, A., Luong, K., Aboutorab, H., Bui, H. T., Jarrad, G., Bahutair, M., ... & Gately, H. (2024). Evolving techniques in cyber threat hunting: A systematic review. Journal of Network and Computer Applications, 104004.
- Gueriani, A., Kheddar, H., & Mazari, A. C. (2024, April). Enhancing iot security with cnn and lstm-based intrusion detection systems. In 2024 6th International Conference on Pattern Analysis and Intelligent Systems (PAIS) (pp. 1-7). IEEE.
- Sy, I., Diouf, B., Diop, A. K., Drocourt, C., & Durand, D. (2023, October). Enhancing security in connected medical IoT networks through deep learning-based anomaly detection. In International Conference on Mobile, Secure, and Programmable Networking (pp. 87-99). Cham: Springer Nature Switzerland.
- Sangeetha, S., & Umarani, B. (2025). MRI Image-Based Parkinson’s disease classification using Deep Maxout fuzzy EfficientNet. Biomedical Signal Processing and Control, 103, 107416.
- Sangeetha, S., & Soundararajan, S. D. CHALLENGES OF ENTREPRENEURS IN MANUFACTURING SECTOR: A STUDY OF COIMBATORE DISTRICT. Age, 52, 35.
- Aiswarya, S., & Sangeetha, S. ROLE OF SELF-HELP GROUPS IN ACHIEVING GENDER EQUALITY: A STUDY BASED ON KUDUMBASHREE IN KERALA.
- De Azambuja, A. J. G., Plesker, C., Schützer, K., Anderl, R., Schleich, B., & Almeida, V. R. (2023). Artificial intelligence-based cyber security in the context of industry 4.0—a survey. Electronics, 12(8), 1920.
- Myilswamy, K., & Sangeetha, S. DIFFICULTIES FACED BY HEALTH–CARE WORKERS DURING COVID 19 PANDEMIC PERIOD. Journal of Huazhong University of Science and Technology ISSN NO, 1671, 4512.
- Sheeja, S. (2023). Intrusion detection system and mitigation of threats in IoT networks using AI techniques: A review. Engineering and Applied Science Research, 50(6), 633-645.
- Radhakrishnan, V., & Palarimath, S. (2025). Blockchain-Enabled Zero-Trust Cybersecurity Models: A Survey of Approaches and Trends. International Journal of Research and Review in Applied Science, Humanities, and Technology, 278-281.
- Radhakrishnan, V., & Kumar, P. (2025). Homomorphic Encryption for Cloud Data Security: A Comprehensive Review. International Journal of Research and Review in Applied Science, Humanities, and Technology, 282-286.
The swift spread of Internet of Things (IoT), alike the wildfire has forced us all into cybersecurity challenges and
therefore requires proper security tools for detecting and responding to real-time threats. Instead, this study moves in a
different sequence way-the sequence-based pattern analysis is a novel way to both identify and mitigate the possible cyber
threats that are associated with IoT networks. In the first stage of the study, a hybrid approach implementing the sequential
pattern mining and machine learning algorithms is followed the extraction of patterns related to the anomalies. At first, data
preprocessing is processed via the feature selection scheme to impetus the quality of generated patterns. Thereafter, the
frequent sequence mining technique is a move that is it applied; thus, to determine the repetition of attack patterns in the
IoT traffic data. Besides, a supervisor learning-based anomaly detection model is installed to classify threats on the basis of
temporal sequence anomalies. Further, the reinforcement based learning procured is the one that is adaptively applied such
that changes in the cyber threats get the system to learn and ultimately improve its detection accuracy. The plan has been
tested on a few large datasets of the IoT network that are the most common, to show its effectiveness by comparison with
methods in operation. The study findings in the line of sequence-based pattern analysis; plus, the machine learning are single
skills for this set of processes to perform IOT cyberattack detection that enables IoT secure environments
Keywords :
Cyber Threat Identification, Iot Security, Sequence -Depending Pattern Analysis, Anomaly Determination, Supervisor Learning, Reinforcement Based Learning, Network Infrastructure Security, Frequently Sequence Mining, Real-Time Threat Avoiding.