Int J Performability Eng ›› 2026, Vol. 22 ›› Issue (3): 128-137.doi: 10.23940/ijpe.26.03.p2.128137

• Original article • Previous Articles     Next Articles

Performance-Efficient Intrusion Detection for IoT Using CNN-BiLSTM and Incremental Principal Component Analysis

Santosh Kumar Upadhyaya,*  and Vikasb   

  1. a Department of CSE, Ajay Kumar Garg Engineering College, Uttar Pradesh, India
    b Department of Computer Science and Engineering, School of Engineering and Technology, Vivekananda Institute of Professional Studies- Technical Campus, Delhi, India
  • Submitted on ; Revised on ; Accepted on
  • Contact: Santosh Kumar Upadhyay
  • About author:
    * Corresponding author.
    E-mail address: upadhyaysantosh@akgec.ac.in

Abstract:

The intensive growth of Internet of Things (IoT) devices has exponentially increased cyber-attack surfaces, and the resource-constrained nature of IoT-based devices strongly restricts the ability to deploy traditional deep-intrusion detection systems (IDS). In this paper, a lightweight hybrid IDS is proposed, which consists of a light convolutional neural network (CNN) combined with bidirectional long short-term memory (BiLSTM) and Incremental Principal Component Analysis (IPCA) to perform online dimensionality reduction on features. The offered method is considered in detail using both real-world datasets of IoT intrusion, namely CICIoT2023 (large-scale lab-generated IoT attacks with 33 attack types) and IoT-23 (realistic long-duration malware scenarios on commercial IoT devices). The model achieves a detection accuracy of 98.23% and a recall of 98.6% on CICIoT2023. On the IoT-23 dataset, it yields a detection accuracy of 97.15% and a recall of 97.1%, indicating that it can generalize more strongly across different distributions of IoT traffic. The method reduces model size by 60% and inference time by 65% compared to full-feature deep baselines, and achieves better accuracy than the current state-of-the-art lightweight methods. The findings indicate the feasibility of the method in effective and real-time IoT intrusion detection using a limited edge infrastructure.

Key words: intrusion, detection, IoT, attack, security, CNN