Research Article

Leveraging Graph Neural Networks for IoT Attack Detection

Volume: 8 Number: 2 June 30, 2025
EN

Leveraging Graph Neural Networks for IoT Attack Detection

Abstract

The widespread adoption of Internet of Things (IoT) devices in multiple sectors has driven technological progress; however, it has simultaneously rendered networks vulnerable to advanced cyber threats. Conventional intrusion detection systems face challenges adjusting to IoT environments' ever-changing and diverse characteristics. To address this challenge, researchers propose a novel hybrid approach combining Graph Neural Networks and XGBoost algorithm for robust intrusion detection in IoT ecosystems. This paper presents a comprehensive methodology for integrating GNNs and XGBoost in IoT intrusion detection and evaluates its effectiveness using diverse datasets. The proposed model preprocesses data by standardization, handling missing values, and encoding categorical features. It leverages GNNs to model spatial dependencies and interactions within IoT networks and utilizes XGBoost to distill complex features for predictive analysis. The late fusion technique combines predictions from both models to enhance overall performance. Experimental results on four datasets, including CICIoT-2023, CICIDS-2017, UNSW-NB15, and IoMT-2024, demonstrate the efficacy of the hybrid model. High accuracy, precision, recall, and AUC values indicate the model's robustness in detecting attacks while minimizing false alarms. The study advances IoT security by introducing synergistic solutions and provides practical insights for implementing intrusion detection systems in real-world IoT environments.

Keywords

References

  1. K. V. V. N. L. Sai Kiran, R. N. K. Devisetty, N. P. Kalyan, K. Mukundini, and R. Karthi, ‘Building an Intrusion Detection System for IoT Environment using Machine Learning Techniques’, Procedia Computer Science, vol. 171, pp. 2372–2379, 2020, doi: 10.1016/j.procs.2020.04.257.
  2. G. A. Mukhaini, M. Anbar, S. Manickam, T. A. Al-Amiedy, and A. A. Momani, ‘A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks’, Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 1, p. 101866, Jan. 2024, doi: 10.1016/j.jksuci.2023.101866.
  3. E. Anthi, L. Williams, M. Slowinska, G. Theodorakopoulos, and P. Burnap, ‘A Supervised Intrusion Detection System for Smart Home IoT Devices’, IEEE Internet Things J., vol. 6, no. 5, pp. 9042–9053, Oct. 2019, doi: 10.1109/JIOT.2019.2926365.
  4. A. Nazir et al., ‘Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets’, Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 10, p. 101820, Dec. 2023, doi: 10.1016/j.jksuci.2023.101820.
  5. I. Cvitić, D. Peraković, M. Periša, and B. Gupta, ‘Ensemble machine learning approach for classification of IoT devices in smart home’, Int. J. Mach. Learn. & Cyber., vol. 12, no. 11, pp. 3179–3202, Nov. 2021, doi: 10.1007/s13042-020-01241-0.
  6. W. W. Lo, G. Kulatilleke, M. Sarhan, S. Layeghy, and M. Portmann, ‘XG-BoT: An explainable deep graph neural network for botnet detection and forensics’, Internet of Things, vol. 22, p. 100747, Jul. 2023, doi: 10.1016/j.iot.2023.100747.
  7. T. Altaf, X. Wang, W. Ni, R. P. Liu, and R. Braun, ‘NE-GConv: A lightweight node edge graph convolutional network for intrusion detection’, Computers & Security, vol. 130, p. 103285, Jul. 2023, doi: 10.1016/j.cose.2023.103285.
  8. K. Qian, H. Yang, R. Li, W. Chen, X. Luo, and L. Yin, ‘Distributed Detection of Large-Scale Internet of Things Botnets Based on Graph Partitioning’, Applied Sciences, vol. 14, no. 4, p. 1615, Feb. 2024, doi: 10.3390/app14041615.

Details

Primary Language

English

Subjects

Software Engineering (Other)

Journal Section

Research Article

Early Pub Date

June 16, 2025

Publication Date

June 30, 2025

Submission Date

March 22, 2025

Acceptance Date

May 28, 2025

Published in Issue

Year 2025 Volume: 8 Number: 2

APA
Ceran, O., Özdoğan, E., & Uysal, M. (2025). Leveraging Graph Neural Networks for IoT Attack Detection. Sakarya University Journal of Computer and Information Sciences, 8(2), 223-244. https://doi.org/10.35377/saucis...1663435
AMA
1.Ceran O, Özdoğan E, Uysal M. Leveraging Graph Neural Networks for IoT Attack Detection. SAUCIS. 2025;8(2):223-244. doi:10.35377/saucis.1663435
Chicago
Ceran, Onur, Erdal Özdoğan, and Mevlüt Uysal. 2025. “Leveraging Graph Neural Networks for IoT Attack Detection”. Sakarya University Journal of Computer and Information Sciences 8 (2): 223-44. https://doi.org/10.35377/saucis. 1663435.
EndNote
Ceran O, Özdoğan E, Uysal M (June 1, 2025) Leveraging Graph Neural Networks for IoT Attack Detection. Sakarya University Journal of Computer and Information Sciences 8 2 223–244.
IEEE
[1]O. Ceran, E. Özdoğan, and M. Uysal, “Leveraging Graph Neural Networks for IoT Attack Detection”, SAUCIS, vol. 8, no. 2, pp. 223–244, June 2025, doi: 10.35377/saucis...1663435.
ISNAD
Ceran, Onur - Özdoğan, Erdal - Uysal, Mevlüt. “Leveraging Graph Neural Networks for IoT Attack Detection”. Sakarya University Journal of Computer and Information Sciences 8/2 (June 1, 2025): 223-244. https://doi.org/10.35377/saucis. 1663435.
JAMA
1.Ceran O, Özdoğan E, Uysal M. Leveraging Graph Neural Networks for IoT Attack Detection. SAUCIS. 2025;8:223–244.
MLA
Ceran, Onur, et al. “Leveraging Graph Neural Networks for IoT Attack Detection”. Sakarya University Journal of Computer and Information Sciences, vol. 8, no. 2, June 2025, pp. 223-44, doi:10.35377/saucis. 1663435.
Vancouver
1.Onur Ceran, Erdal Özdoğan, Mevlüt Uysal. Leveraging Graph Neural Networks for IoT Attack Detection. SAUCIS. 2025 Jun. 1;8(2):223-44. doi:10.35377/saucis. 1663435

 

INDEXING & ABSTRACTING & ARCHIVING

 

31045 31044   ResimLink - Resim Yükle  31047 

31043 28939 28938 34240
 

 

29070    The papers in this journal are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License