Comparative Analysis of LSTM-Based Variant Models for Detecting Attacks in IoT Networks

Authors

  • Mosleh Abualhaj Department of Networks and Cybersecurity, Al-Ahliyya Amman University, Amman, Jordan.
  • Hannan Adeel Faculty of Artificial Intelligence and Cyber Security, Universiti Teknikal Malaysia Melaka, Melaka 76100, Malaysia.
  • Khalid Masood Faculty of Computer Science and IT, Minhaj University Lahore, Pakistan.
  • Hama Soltani Laboratory of Mathematics, Informatics and Systems (LAMIS), University of Tebessa, Tebessa, Algeria.
  • Hadjir Zemmouri MISC Laboratory, Abdelhamid Mehri University, Constantine, Algeria.
  • Mohamed M. Reda Aly Central Lab of Agriculture Expert Systems (CLAES), Agriculture Research Center (ARC), Giza, Egypt.
  • Abdullah T. Elgammal Department of Mechanical Engineering, The British University in Egypt, El-Sherouk City, Egypt.
  • Shahid Mehmood Department of Computer Science, Bahria University, Lahore, 54000, Pakistan.

DOI:

https://doi.org/10.56979/1001/2025/1169

Keywords:

Internet of Things, Recurrent Neural Network, Deep BLSTM, BLSTM, LSTM, IoT attacks

Abstract

Internet of Things (IoT) networks have established unparalleled connection possibilities and convenient features and have set new challenges associated with dubious security barriers and potential attacks. This study evaluates attack detection performance of LSTM-Based Variant models namely LSTM, DeepBiLSTM and BLSTM recurrent neural networks by bringing up experiment analysis of the IoT networks. We evaluate the three models using benchmark IoT dataset in terms of detection accuracy, precision, recall and F1 measure. The experiment results indicate that the three LSTM-based models, LSTM, BiLSTM, and DeepBiLSTM, demonstrate a high level of performance, regardless of the batch size (32, 64, 128, 256, and 512). DeepBiLSTM has a little better overall performance, which validates its soundness and suitability towards scale in detecting attacks in large IoT networks.

Downloads

Published

2025-12-01

How to Cite

Abualhaj, M., Adeel, H., Masood, K., Soltani, H., Zemmouri, H., Reda Aly, M. M., T. Elgammal, A., & Mehmood, S. (2025). Comparative Analysis of LSTM-Based Variant Models for Detecting Attacks in IoT Networks. Journal of Computing & Biomedical Informatics, 10(01). https://doi.org/10.56979/1001/2025/1169