Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Smart IoT applications of multi attack detection using cluster F1MI approach
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 26 January 2026

Smart IoT applications of multi attack detection using cluster F1MI approach

  • Vidhya Nagavel1,
  • P. T. V. Bhuvaneswari1 &
  • Parameswaran Ramesh1 

Scientific Reports , Article number:  (2026) Cite this article

  • 509 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Security infrastructure for Internet of Things (IoT) networks is still a major concern today, as they are constantly violated by cyber attacks. Machine Learning (ML)can efficiently scale to identify abnormal activity in large volumes of IoT traffic. The proposed Smart Secured IoT Framework (SSIF) is used to improve the security of smart IoT networks with the assist of the Bot-IoT dataset. The framework begins with data preprocessing to ensure high-quality input, followed by Cluster F1–MI feature engineering, which uses correlation-based F1–MI to select the most informative attributes and produce a robust, compact feature set. Cluster-based feature validation groups features that are related to cluster the features that are correlated with each other so that a representative feature is selected from the cluster and the correlation is removed to improve efficiency. Our framework uses a variety of ML classifiers, such as SVM, Random Forest, Gradient Boosting, XGBoost, and Neural Networks, for threat classification that is adaptable and accurate. The effectiveness of the classifiers can be tested using metrics like Accuracy, Precision, Recall, F1 Score, and AUC-PR. The random forest can classify attack types with accuracy of more than 0.97. The system also generates an email notification to the admin and activates the alarm when an anomaly is detected. The proposed SSIF proves to be an effective, cheap, and easy solution to secure smart IoT environments from Bot-IoT.

Similar content being viewed by others

Evaluating machine learning approaches for multiple attack classification with improved computational efficiency in IoT networks

Article Open access 14 November 2025

Using machine learning algorithms to enhance IoT system security

Article Open access 27 May 2024

Orchestrating machine learning models in a swarm architecture for IoT inline malware detection

Article Open access 20 December 2025

Data availability

The corresponding author, Vidhya Nagavel, can provide access to the data upon reasonable request.

References

  1. Koroniotis, N., Sitnikova, E. & NourMoustafa, and A new network forensic framework based on deep learning for internet of things networks: A particle deep framework. Future Generation Comput. Syst. 110, 91–106 (2020).

    Google Scholar 

  2. Illy, P. Georges Kaddoum, KuljeetKaur, and SahilGarg. ML-based IDPS enhancement with complementary features for home IoT networks. IEEE Trans. Netw. Serv. Manage. 19 (2), 772–783 (2022).

    Google Scholar 

  3. Nawir, M. Amiza Amir, NaimahYaakob, and Ong Bi Lynn. Effective and efficient network anomaly detection system using MLalgorithm. Bull. Electr. Eng. Inf. 8 (1), 46–51 (2019).

    Google Scholar 

  4. Hu, Y. et al. Graph-based semi-supervised learning for activity labeling in health smart home. IEEE Access. 8, 193655–193664 (2020).

    Google Scholar 

  5. Ramesh, P. et al. Detection of commercial crop weeds using machine learning algorithms. Sci. Rep. 15 (1), 38791 (2025).

    Google Scholar 

  6. Zhang, Y., MeikangQiu, C. W. & Tsai Mohammad mehedi Hassan, and AtifAlamri. Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11 (1), 88–95 (2015).

    Google Scholar 

  7. Wu, Y. et al. Masinet: network intrusion detection for Iot security based on meta-learning framework. IEEE Internet Things J. 11 (14), 25136–25146 (2024).

    Google Scholar 

  8. El-Sofany, H. & El-Seoud, S. A. Karam, and BelgacemBouallegue. Using MLalgorithms to enhance IoT system security. Sci. Rep. 14 (1), 12077 (2024).

    Google Scholar 

  9. Hossain, M. A. Deep learning-based intrusion detection for IoT networks: a scalable and efficient approach. EURASIP Journal on Information Security no. 1 (2025): 28. (2025).

  10. Kerrakchou, I., Hassan, A. A. E., Chadli, S. & Emharraf, M. Selection of efficient MLalgorithm on Bot-IoT dataset for intrusion detection in internet of things networks. Indones. J. Electr. Eng. Comput. Sci. 31 (3), 1784–1793 (2023).

    Google Scholar 

  11. Elayan, H. Digital twin for intelligent context-aware IoT healthcare systems. IEEE Internet Things J. 8 (23), 16749–16757 (2021).

    Google Scholar 

  12. Kaur, B. et al. Ghorbani. Internet of things (IoT) security dataset evolution: challenges and future directions. Internet Things. 22, 100780 (2023).

    Google Scholar 

  13. Qi, K. Advancing hospital healthcare: achieving IoT-based secure health monitoring through multilayer machine learning. J. Big Data. 12 (1), 1 (2025).

    Google Scholar 

  14. Ali, M., Ahmed & Salah Alawi Hussein Al-Sharafi. Intrusion detection in IoT networks using MLand deep learning approaches for MitM attack mitigation. Discover Internet Things. 5 (1), 1–13 (2025).

    Google Scholar 

  15. Otoum, Y., Liu, D. & AmiyaNayak DL-IDS: a deep learning–based intrusion detection framework for Securing IoT. Trans. Emerg. Telecommunications Technol. 33 (3), e3803 (2022).

    Google Scholar 

  16. Gajewski, M., JordiMongayBatalla, G., Mastorakis & Constandinos, X. Mavromoustakis. Anomaly traffic detection and correlation in smart home automation IoT systems. Trans. Emerg. Telecommunications Technol. 33 (6), e4053 (2022).

    Google Scholar 

  17. Diwan, T. D., Siddartha Choubey, H. S., Hota, S. B. & Goyal Sajjad Shaukat Jamal, Piyush Kumar Shukla, and Basant Tiwari. Feature entropy estimation (FEE) for malicious IoT traffic and detection using machine learning. Mob. Inf. Syst. 2021 (1), 8091363. (2021).

  18. Badawy, M., Ramadan, N. & Hesham Ahmed Hefny. Healthcare predictive analytics using MLand deep learning techniques: a survey. J. Electr. Syst. Inform. Technol. 10 (1), 40 (2023).

    Google Scholar 

  19. Khan, M., Mahsal & Alkhathami, M. Anomaly detection in IoT-based healthcare: MLfor enhanced security. Sci. Rep. 14 (1), 5872 (2024).

    Google Scholar 

  20. Makkar, A., SahilGarg, N., Kumar, M. & ShamimHossain Ahmed Ghoneim, and Mubarak Alrashoud. An efficient spam detection technique for IoT devices using machine learning. IEEE Trans. Industr. Inf. 17 (2), 903–912 (2020).

    Google Scholar 

  21. Shafiq, M., ZhihongTian, Y., Sun, X. D. & Guizani, M. Selection of effective MLalgorithms and Bot-IoT attacks traffic identification for internet of things in smart cities. Future Generation Comput. Syst. 107, 433–442 (2020).

    Google Scholar 

  22. Shareena, J., AiswaryaRamdas & Haripriya, A. P. Intrusion detection system for Iot botnet attacks using deep learning. SN Comput. Sci. 2 (3), 1–8 (2021).

    Google Scholar 

  23. Cvitić, I., DraganPerakovic, B. B. & Gupta Boosting-based DDoS detection in internet of things systems. IEEE Internet Things J. 9 (3), 2109–2123 (2021).

    Google Scholar 

  24. Bhatti, M., Ahmed, R. R. & Shokat, S. S. R. S. Farina Riaz, and se Jin Kwon. Outlier detection in indoor localization and internet of things (IoT) using machine learning. J. Commun. Netw. 22 (3), 236–243 (2020).

    Google Scholar 

  25. Manzano, C., Meneses, C. & Fukuda, H. Paul Leger, and An empirical evaluation of supervised learning methods for network malware identification based on feature selection. Complexity 2022 (2022).

  26. Kostas, K., Just, M. & Lones, M. A. IoTDevID: A behaviour-based device identification method for the IoT. IEEE Internet Things J. 9 (23), 23741–23749 (2022).

    Google Scholar 

  27. Ghaffari, A., NasimJelodari, S. & Pouralish NahideDerakhshanfard, and BahmanArasteh. Securing internet of things using machine and deep learning methods: a survey. Cluster Comput. 27 (7), 9065–9089 (2024).

    Google Scholar 

  28. Koroniotis, N., NourMoustafa, E. & Sitnikova and Benjamin Turnbull. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset.Fut. Gener. Comput. Syst. 100 779–796. (2019).

  29. Doghramachi, D. F., Siddeeq, Y. & Ameen Internet of things (IoT) security enhancement using XGboostMLTechniques. Computers. Mater. Continua. 77, 1 (2023).

    Google Scholar 

  30. Lal, Bechoo, S., Ravichandran, R., Kavin, N., Anil Kumar & DibyahashBordoloi Ganesh Kumar. IOT-BASED cyber security identification model through MLtechnique. Measurement: Sens. 27, 100791 (2023).

    Google Scholar 

  31. Bhayo, J. et al. Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks. Eng. Appl. Artif. Intell. 123, 106432 (2023).

    Google Scholar 

  32. Zakariyya, I., HarshaKalutarage & Omar Al-Kadri, M. Towards a robust, effective and resource efficient MLtechnique for IoT security monitoring. Computers Secur. 133, 103388 (2023).

    Google Scholar 

  33. Vidhya, N. and P. T. V. Bhuvaneswari. ADBIS: anomaly detection to bolster IoT security using machine learning. 2023 IEEE 3rd International Conference on Applied Electromagnetics, Signal Processing, & Communication (AESPC). (IEEE, 2023).

  34. Shafiq, M., ZhihongTian, A. K., Bashir, X., Du & Guizani, M. CorrAUC: A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J. 8 (5), 3242–3254 (2020).

    Google Scholar 

  35. García, J., Entrena, J. & Alesanco Álvaro Empirical evaluation of feature selection methods for ML based intrusion detection in IoT scenarios. Internet Things 28 101367. (2024).

  36. Hazman, C., AzidineGuezzaz, S., Benkirane & MouradeAzrour lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Cluster Comput. 26 (6), 4069–4083 (2023).

    Google Scholar 

  37. Douiba, M. & Benkirane, S. AzidineGuezzaz, and MouradeAzrour. An improved anomaly detection model for IoT security using decision tree and gradient boosting. J. Supercomputing. 79 (3), 3392–3411 (2023).

    Google Scholar 

  38. Habeeb, M. & Sayeeduddin Coarse and fine feature selection for network intrusion detection systems (IDS) in IoT networks. Trans. Emerg. Telecommunications Technol. 35 (4), e4961 (2024).

    Google Scholar 

  39. Sankaran, K., Sakthidasan, T. H., Kim & Renjith, P. N. An improved ai-based secure m-trust privacy protocol for medical internet of things in smart healthcare system. IEEE Internet Things J. 10 (21), 18477–18485 (2023).

    Google Scholar 

  40. Dash, P. B., JanmenjoyNayak, B. N., Hafizul Islam, S. K. & EtuariOram, and Model based IoT security framework using multiclass adaptive boosting with SMOTE. Secur. Priv. 3 (5), e112 (2020).

    Google Scholar 

  41. Abdeen, M. A. R., Ahmed, M. H., Seliem, H., TarekRahilSheltami & Turki, M. Alghamdi. Smart health systems components, challenges, and opportunities. IEEE Can. J. Electr. Comput. Eng. 45 (4), 436–441 (2022).

    Google Scholar 

  42. Foley, J. & Naghmeh Moradpoor and Henry Ochenyi. Employing a ML approach to detect combined internet of things attacks against two objective functions using a novel dataset. Secur. Commun. Netw. (1), 2804291. (2020).

  43. Saranya, S. S. & Sabiyath Fatima, N. IoT-based patient health data using improved context-aware data fusion and enhanced recursive feature elimination model. IEEE Access 10 128318–128335. (2022).

  44. Zonayed, M., Rumana Tasnim, S. S., Jhara, M. & Akter Mimona Molla Rashied Hussein, Md Hosne Mobarak, and Umme Salma. ML and IoT in healthcare: recent advancements, challenges & future direction. Adv. Biomark. Sci. Technol.(2025).

  45. Din, I. U., Almogren, A., Guizani, M. & Zuair, M. A decade of internet of things: analysis in the light of healthcare applications. Ieee Access. 7, 89967–89979 (2019).

    Google Scholar 

  46. Saheed, Y. & Kayode and Joshua Ebere Chukwuere. CPS-IIoT-P2Attention: explainable privacy-preserving with scaled dot-product attention in cyber physical system-industrial IoT network. IEEE Access (2025).

  47. Saheed, Y. K. A binary firefly algorithm based feature selection method on high dimensional intrusion detection data. In Illumination of Artificial Intelligence in Cybersecurity and Forensics, 273–288. Cham: Springer International Publishing, (2022).

    Google Scholar 

  48. Adeyiola, A., Qudus, Y. K., Saheed, S., Misra & Sabarathinam Chockalingam. Metaheuristic firefly and C5.0 algorithms based intrusion detection for critical infrastructures. In 2023 3rd International Conference on Applied Artificial Intelligence (ICAPAI) 1–7. (IEEE, 2023).

  49. Gurubaran, K. et al. Machine learning approach for soil nutrient prediction. 2023 IEEE Silchar Subsection Conference (SILCON). (IEEE, 2023).

  50. Saheed, Y. K. Xaiensembletl-iov: A new explainable artificial intelligence ensemble transfer learning for zero-day botnet attack detection in the internet of vehicles. Results Eng. 24, 103171 (2024).

    Google Scholar 

  51. Saheed, Y., Kayode, O. H., Abdulganiyu & Taha Ait Tchakoucht A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart City infrastructures. J. King Saud University-Computer Inform. Sci. 35 (5), 101532 (2023).

    Google Scholar 

  52. Saheed, Y., Kayode, S., Misra & Chockalingam, S. Autoencoder via DCNN and LSTM models for intrusion detection in industrial control systems of critical infrastructures. In 2023 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) 9–16. (IEEE, 2023).

Download references

Author information

Authors and Affiliations

  1. Department of Electronics Engineering, Madras Institute of Technology, Anna University, Chennai, India

    Vidhya Nagavel, P. T. V. Bhuvaneswari & Parameswaran Ramesh

Authors
  1. Vidhya Nagavel
    View author publications

    Search author on:PubMed Google Scholar

  2. P. T. V. Bhuvaneswari
    View author publications

    Search author on:PubMed Google Scholar

  3. Parameswaran Ramesh
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Vidhya Nagavel wrote the literature survey, investigation, methodology part and experimental analysis. Parameswaran Ramesh has reviewed the original draft. Bhuvaneswari PTV supervised the research work.

Corresponding author

Correspondence to Vidhya Nagavel.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nagavel, V., Bhuvaneswari, P.T.V. & Ramesh, P. Smart IoT applications of multi attack detection using cluster F1MI approach. Sci Rep (2026). https://doi.org/10.1038/s41598-026-37695-5

Download citation

  • Received: 26 November 2025

  • Accepted: 23 January 2026

  • Published: 26 January 2026

  • DOI: https://doi.org/10.1038/s41598-026-37695-5

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Internet of things
  • Anomaly detection
  • Smart IoT
  • Feature selection
  • ML
  • Security
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on Twitter
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics