
Int J Performability Eng ›› 2026, Vol. 22 ›› Issue (3): 128-137.doi: 10.23940/ijpe.26.03.p2.128137
• Original article • Previous Articles Next Articles
Santosh Kumar Upadhyaya,* and Vikasb
Submitted on
;
Revised on
;
Accepted on
Contact:
Santosh Kumar Upadhyay
About author:Santosh Kumar Upadhyay and Vikas. Performance-Efficient Intrusion Detection for IoT Using CNN-BiLSTM and Incremental Principal Component Analysis [J]. Int J Performability Eng, 2026, 22(3): 128-137.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
| [1] |
Miloslavskaya N., and Tolstoy A., 2019. Internet of things: information security challenges and solutions. Cluster Computing, 22(1), pp. 103-119.
|
| [2] |
Luo S., Zeng P., Ma C., and Wei Y., 2025. Anomaly detection for industrial internet of things devices based on self-adaptive blockchain sharding and federated learning. Journal of Communications and Networks, 27(2), pp. 92-102.
|
| [3] |
Misrak S.F., and Melaku H.M., 2025. Lightweight intrusion detection system for IoT with improved feature engineering and advanced dynamic quantization. Discover Internet of Things, 5(1), 97.
|
| [4] |
Wang Z., Chen H., Yang S., Luo X., Li D., and Wang J., 2023. A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization. PeerJ Computer Science, 9, e1569.
|
| [5] |
Zyad E., and Mohammed A.B., 2024. Evaluation of pca variants for intrusion detection in IoT networks. In 2024 Sixth International Conference on Intelligent Computing in Data Sciences (ICDS), pp. 1-5.
|
| [6] |
Al-Sarem M., Saeed F., Alkhammash E.H., and Alghamdi N.S., 2021. An aggregated mutual information based feature selection with machine learning methods for enhancing IoT botnet attack detection. Sensors, 22(1), 185.
|
| [7] |
Achbarou O., Datsi T., and Bourkoukou O., 2025. Enhanced intrusion detection system using feature selection and hybrid learning models for high performance and efficiency in an IoT environment. Journal of Engineering Research.
|
| [8] |
Wang X., Ren X., Qiu C., Xiong Z., Yao H., and Leung V.C., 2022. Integrating edge intelligence and blockchain: what, why, and how. IEEE Communications Surveys & Tutorials, 24(4), pp. 2193-2229.
|
| [9] |
Zarpelão B.B., Miani R.S., Kawakani C.T., and De Alvarenga S.C., 2017. A survey of intrusion detection in internet of things. Journal of Network and Computer Applications, 84, pp. 25-37.
|
| [10] |
Light R.A., 2017. Mosquitto: server and client implementation of the MQTT protocol. Journal of Open Source Software, 2(13), 265.
|
| [11] |
Syarif I., Prugel-Bennett A., and Wills G., 2016. SVM parameter optimization using grid search and genetic algorithm to improve classification performance. TELKOMNIKA (Telecommunication Computing Electronics and Control), 14(4), pp. 1502-1509.
|
| [12] |
Sharafaldin I., Lashkari A.H., and Ghorbani A.A., 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1( 2018), pp. 108-116.
|
| [13] |
Schonlau M., and Zou R.Y., 2020. The random forest algorithm for statistical learning. the Stata Journal, 20(1), pp. 3-29.
|
| [14] |
Rahman M.M., Al Shakil S., and Mustakim M.R., 2025. A survey on intrusion detection system in IoT networks. Cyber Security and Applications, 3, 100082.
|
| [15] |
Dina A.S., Siddique A.B., and Manivannan D., 2023. A deep learning approach for intrusion detection in internet of things using focal loss function. Internet of Things, 22, 100699.
|
| [16] |
Alsubaei F.S., 2025. Smart deep learning model for enhanced IoT intrusion detection. Scientific Reports, 15(1), 20577.
|
| [17] |
Yang K., Wang J., and Li M., 2024. An improved intrusion detection method for IIoT using attention mechanisms, BiGRU, and inception-CNN. Scientific Reports, 14(1), 19339.
|
| [18] |
Farhan M., Waheed Ud Din H., Ullah S., Hussain M.S., Khan M.A., Mazhar T., Khattak U.F., and Jaghdam I.H., 2025. Network-based intrusion detection using deep learning technique. Scientific Reports, 15(1), 25550.
|
| [19] |
Fenjan A., Almashhadany M.T.M., Ahmed S.R., Fadel H.A., Sekhar R., Shah P., and Veena B.S., 2024. Adaptive intrusion detection system using deep learning for network security. In Proceedings of the Cognitive Models and Artificial Intelligence Conference, pp. 279-284.
|
| [20] |
Kaggle, CICIoT2023: A Modern Dataset for Intelligent IoT Threat Detection, https://www.kaggle.com/datasets/himadri07/ciciot2023, accessed on February 1, 2026.
|
| [21] |
Garcia S., Parmisano A., and Erquiaga M.J., 2020. IoT-23: A labeled dataset with malicious and benign IoT network traffic.
|
| [1] | Ukamaka Okonkwo Ngozi, Tochukwu Ikwuazom Callistus, Amina Onyeabor Grace, Ada Ukaigwe Jane and Okeahialam Temple. Robust Network Anomaly Detection through Meta-Ensemble Learning: Comparative Evaluation of Eight Classifiers [J]. Int J Performability Eng, 2026, 22(3): 119-127. |
| [2] | Vaishali N. Rane, and Arunkumar M S. Autoencoder-Guided ML for Real-Time IoT Anomaly Detection [J]. Int J Performability Eng, 2026, 22(2): 67-76. |
| [3] | Callistus Tochukwu Ikwuazom, Francisca Nonyelum Ogwueleka, Mohammed Baba Hammawa, and Rajesh Prasad. HEA-NIDS: A Hybrid-Ensemble Anomaly Detection System for Mitigating Network Intrusions and DDoS Precursors in Cloud Storage Environments [J]. Int J Performability Eng, 2026, 22(2): 77-87. |
| [4] | Shashank D. Biradar, Sanjay L. Nalbalwar, Shankar B. Deosarkar, and Brijesh R. Iyer. Channel Selection Strategies for High-Accuracy EEG-Based Biometric Authentication [J]. Int J Performability Eng, 2026, 22(1): 19-28. |
| [5] | Umoru Yahaya Ibrahim, Rajesh Prasad, Bisallah Hashim Ibrahim, and Ogwueleka Francisca Nonyelum. Ensemble Meta-Learning Framework with BERT for Fake News Detection in Social Media [J]. Int J Performability Eng, 2026, 22(1): 40-49. |
| [6] | Bhupendra Ram, Suraj Malik, and Nidhi Bansal. IoT-Based Smart Parking: Comparative Analysis of Scheduling Approaches [J]. Int J Performability Eng, 2026, 22(1): 50-56. |
| [7] | Ankur Sisodia and Swati Vishnoi. ASEIP: Adaptive Secure Energy-Efficient IoT Protocol for Unified Terrestrial and Underwater IoT Environments [J]. Int J Performability Eng, 2025, 21(9): 521-528. |
| [8] | Rajesh Prasad, Gracy Gupta, Kanishka Agarwal, Malika Garg, and Mohd Asjad Raza Ansari. Real-Time Fault Detection in Industrial Machinery using Thermal Imaging and Machine Learning [J]. Int J Performability Eng, 2025, 21(9): 529-539. |
| [9] | Baljeet Singh. Enhancing Software Reliability in Industrial Mechatronics through Anomaly Detection Models [J]. Int J Performability Eng, 2025, 21(8): 429-437. |
| [10] | Vikas, Rajesh Prasad, Santosh Kumar Upadhyay, Amit Kumar. Zero Trust-Driven Anomaly Detection Framework for Wireless Sensor Networks [J]. Int J Performability Eng, 2025, 21(8): 463-471. |
| [11] | Sharma Ji and Abhishek Mishra. A Hybrid Deep Learning-Based IoT System Security Framework for 5G-Enabled Smart Cities [J]. Int J Performability Eng, 2025, 21(7): 361-371. |
| [12] | Ramya Rajamanickam, Renu Mishra, and Saumya Chaturvedi. A Hybrid Cryptographic Framework for Privacy-Preserving and Securing Blockchain Transactions [J]. Int J Performability Eng, 2025, 21(6): 308-315. |
| [13] | Sharma Ji and Abhishek Kumar Mishra. An Efficient Security Framework for 5G DDoS Attack using Machine Learning and Deep Learning [J]. Int J Performability Eng, 2025, 21(6): 316-325. |
| [14] | Vikas, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Trust Management in WSN using ML for Detection of DDoS Attacks [J]. Int J Performability Eng, 2025, 21(3): 157-167. |
| [15] | Pancham Singh, Updesh Kumar Jaiswal, Eshank Jain, Nikhil Kumar, and Vimlesh Mishra. A Novel Methodology Utilizing Modern CCTV Cameras and Software as a Service Model for Crime Detection and Prediction [J]. Int J Performability Eng, 2025, 21(2): 112-121. |
|