Wavelet-Based Intelligent Framework for Network Traffic Anomaly Detection in IoT Embedded Systems

Authors

  • Praveen Gujjar Management Studies, JAIN (Deemed-to-be University), Bengaluru, India https://orcid.org/0000-0003-0240-7827
  • Raghavendra M Devadas Department of Information Technology, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education (MAHE), Manipal, India
  • Nikitha K Management Studies, JAIN (Deemed-to-be University), Bengaluru, India https://orcid.org/0009-0005-5539-5817

DOI:

https://doi.org/10.59461/ijdiic.v5i1.242

Keywords:

IoT Security , Network Traffic , Wavelet Transform , Anomaly Detection , Deep Learning

Abstract

The rapid growth of the Internet of Things (IoT) and embedded systems has increased the vulnerability of network infrastructures to cyber-attacks, necessitating efficient real-time anomaly detection methods. In this study, we introduce a primary IoT network traffic dataset generated through controlled simulation of normal and malicious behaviors. Both time-domain features, including packet size, inter-arrival time, protocol type, and TCP flags, and frequency-domain features, such as spectral entropy and band energy derived via wavelet transform, were extracted to capture comprehensive traffic characteristics. These features were used to train a hybrid deep learning model, the Adaptive Differential Evolution Weighted Deep Belief Network (ADE-WDBN), which combines deep hierarchical feature learning with evolutionary weight optimization to enhance detection accuracy and computational efficiency. Experimental results demonstrate that ADE-WDBN outperforms traditional machine learning models and conventional deep learning approaches, achieving an accuracy of 98.37%, precision of 97.65%, recall of 98.02%, and F1-score of 97.83%. The low variability in performance across cross-validation folds indicates the model's robustness and generalizability. This research contributes a novel IoT traffic dataset and a cost-effective, adaptive anomaly detection framework capable of detecting subtle anomalies.

Downloads

Download data is not yet available.

References

Karthik V, Savita Chaudhary, and Radhika A D, “Feature Extraction in Music information retrival using Machine Learning Algorithms,” Int J Data Informatics Intell Comput, vol. 1, no. 1, pp. 1–10, May 2024, doi: 10.59461/ijdiic.v1i1.11.

N. Thangarasu, R. Rajalakshmi, G. Manivasagam, and V. Vijayalakshmi, “Performance of re-ranking techniques used for recommendation method to the user CF- Model,” Int J Data Informatics Intell Comput, vol. 1, no. 1, pp. 30–38, Sep. 2022, doi: 10.59461/ijdiic.v1i1.9.

A. Naouri, H. Wu, N. A. Nouri, S. Dhelim, and H. Ning, “A Novel Framework for Mobile-Edge Computing by Optimizing Task Offloading,” IEEE Internet Things J, vol. 8, no. 16, pp. 13065–13076, Aug. 2021, doi: 10.1109/JIOT.2021.3064225.

H. Liao, Y. Mu, Z. Zhou, M. Sun, Z. Wang, and C. Pan, “Blockchain and Learning-Based Secure and Intelligent Task Offloading for Vehicular Fog Computing,” IEEE Trans Intell Transp Syst, vol. 22, no. 7, pp. 4051–4063, Jul. 2021, doi: 10.1109/TITS.2020.3007770.

C. Ieracitano, A. Adeel, F. C. Morabito, and A. Hussain, “A novel statistical analysis and autoencoder driven intelligent intrusion detection approach,” Neurocomputing, vol. 387, pp. 51–62, Apr. 2020, doi: 10.1016/j.neucom.2019.11.016.

G. Marín, P. Caasas, and G. Capdehourat, “DeepMAL - Deep Learning Models for Malware Traffic Detection and Classification,” in Data Science – Analytics and Applications, Wiesbaden: Springer Fachmedien Wiesbaden, 2021, pp. 105–112. doi: 10.1007/978-3-658-32182-6_16.

F. Martinez-Plumed et al., “CRISP-DM Twenty Years Later: From Data Mining Processes to Data Science Trajectories,” IEEE Trans Knowl Data Eng, vol. 33, no. 8, pp. 3048–3061, Aug. 2021, doi: 10.1109/TKDE.2019.2962680.

M. Seyedan and F. Mafakheri, “Predictive big data analytics for supply chain demand forecasting: methods, applications, and research opportunities,” J Big Data, vol. 7, no. 1, p. 53, Dec. 2020, doi: 10.1186/s40537-020-00329-2.

M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, “Deep recurrent neural network for IoT intrusion detection system,” Simul Model Pract Theory, vol. 101, p. 102031, May 2020, doi: 10.1016/j.simpat.2019.102031.

A. Aleran, H. Almukhalfi, A. Noor, R. Alluhaibi, A. Hafez, and T. H. Noor, “An IoT-Based Predictive Maintenance Framework Using a Hybrid Deep Learning Model for Smart Industrial Systems,” Comput Mater Contin, pp. 1–10, 2025, doi: 10.32604/cmc.2025.070741.

U. Khadam, P. Davidsson, and R. Spalazzese, “A systematic literature review on AI in IoT systems: Tasks, applications, and deployment,” Internet of Things, vol. 34, p. 101779, Nov. 2025, doi: 10.1016/j.iot.2025.101779.

L. Tian, S. Santi, A. Seferagić, J. Lan, and J. Famaey, “Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research,” J Netw Comput Appl, vol. 182, p. 103036, May 2021, doi: 10.1016/j.jnca.2021.103036.

D. kumar sah, M. Vahabi, and H. Fotouhi, “Federated learning at the edge in Industrial Internet of Things: A review,” Sustain Comput Informatics Syst, vol. 46, p. 101087, Jun. 2025, doi: 10.1016/j.suscom.2025.101087.

O. O. Tooki and O. M. Popoola, “A critical review on intelligent-based techniques for detection and mitigation of cyberthreats and cascaded failures in cyber-physical power systems,” Renew Energy Focus, vol. 51, p. 100628, Oct. 2024, doi: 10.1016/j.ref.2024.100628.

G. S. Rady, S. S. Mohamed, M. F. Mohamed, and K. F. Hussain, “High dimensional autonomous computing on Arabic language classification,” Comput Electr Eng, vol. 100, p. 108020, May 2022, doi: 10.1016/j.compeleceng.2022.108020.

S. Hizal, U. Cavusoglu, and D. Akgun, “A novel deep learning-based intrusion detection system for IoT DDoS security,” Internet of Things, vol. 28, p. 101336, Dec. 2024, doi: 10.1016/j.iot.2024.101336.

A. Tripathi, P. Upadhyay, and P. K. Goel, “Deep Learning for Anomaly Detection in Industrial Networks,” 2025, pp. 103–130. doi: 10.4018/979-8-3373-3241-3.ch006.

E. Villar-Rodriguez, M. A. Pérez, A. I. Torre-Bastida, C. R. Senderos, and J. López-de-Armentia, “Edge intelligence secure frameworks: Current state and future challenges,” Comput Secur, vol. 130, p. 103278, Jul. 2023, doi: 10.1016/j.cose.2023.103278.

G. C. Shwethashree and S. Manjula, “Adaptive Cyberattack Detection in IoT-Edge-Cloud Environments Using Decision Tree Regressor,” Eng Technol Appl Sci Res, vol. 15, no. 4, pp. 25432–25437, Aug. 2025, doi: 10.48084/etasr.11184.

M. Ozdem, “A novel approach for real-time anomaly detection in dynamic computer networks using temporal graph networks and explainable artificial intelligence,” Alexandria Eng J, vol. 132, pp. 369–382, Nov. 2025, doi: 10.1016/j.aej.2025.11.001.

Downloads

Published

19-01-2026

How to Cite

Gujjar, P., Raghavendra M Devadas, & Nikitha K. (2026). Wavelet-Based Intelligent Framework for Network Traffic Anomaly Detection in IoT Embedded Systems. International Journal of Data Informatics and Intelligent Computing, 5(1), 1–10. https://doi.org/10.59461/ijdiic.v5i1.242

Issue

Section

Regular Issue