Wavelet-Based Intelligent Framework for Network Traffic Anomaly Detection in IoT Embedded Systems
DOI:
https://doi.org/10.59461/ijdiic.v5i1.242Keywords:
IoT Security , Network Traffic , Wavelet Transform , Anomaly Detection , Deep LearningAbstract
The rapid growth of the Internet of Things (IoT) and embedded systems has increased the vulnerability of network infrastructures to cyber-attacks, necessitating efficient real-time anomaly detection methods. In this study, we introduce a primary IoT network traffic dataset generated through controlled simulation of normal and malicious behaviors. Both time-domain features, including packet size, inter-arrival time, protocol type, and TCP flags, and frequency-domain features, such as spectral entropy and band energy derived via wavelet transform, were extracted to capture comprehensive traffic characteristics. These features were used to train a hybrid deep learning model, the Adaptive Differential Evolution Weighted Deep Belief Network (ADE-WDBN), which combines deep hierarchical feature learning with evolutionary weight optimization to enhance detection accuracy and computational efficiency. Experimental results demonstrate that ADE-WDBN outperforms traditional machine learning models and conventional deep learning approaches, achieving an accuracy of 98.37%, precision of 97.65%, recall of 98.02%, and F1-score of 97.83%. The low variability in performance across cross-validation folds indicates the model's robustness and generalizability. This research contributes a novel IoT traffic dataset and a cost-effective, adaptive anomaly detection framework capable of detecting subtle anomalies.
Downloads
References
Karthik V, Savita Chaudhary, and Radhika A D, “Feature Extraction in Music information retrival using Machine Learning Algorithms,” Int J Data Informatics Intell Comput, vol. 1, no. 1, pp. 1–10, May 2024, doi: 10.59461/ijdiic.v1i1.11.
N. Thangarasu, R. Rajalakshmi, G. Manivasagam, and V. Vijayalakshmi, “Performance of re-ranking techniques used for recommendation method to the user CF- Model,” Int J Data Informatics Intell Comput, vol. 1, no. 1, pp. 30–38, Sep. 2022, doi: 10.59461/ijdiic.v1i1.9.
A. Naouri, H. Wu, N. A. Nouri, S. Dhelim, and H. Ning, “A Novel Framework for Mobile-Edge Computing by Optimizing Task Offloading,” IEEE Internet Things J, vol. 8, no. 16, pp. 13065–13076, Aug. 2021, doi: 10.1109/JIOT.2021.3064225.
H. Liao, Y. Mu, Z. Zhou, M. Sun, Z. Wang, and C. Pan, “Blockchain and Learning-Based Secure and Intelligent Task Offloading for Vehicular Fog Computing,” IEEE Trans Intell Transp Syst, vol. 22, no. 7, pp. 4051–4063, Jul. 2021, doi: 10.1109/TITS.2020.3007770.
C. Ieracitano, A. Adeel, F. C. Morabito, and A. Hussain, “A novel statistical analysis and autoencoder driven intelligent intrusion detection approach,” Neurocomputing, vol. 387, pp. 51–62, Apr. 2020, doi: 10.1016/j.neucom.2019.11.016.
G. Marín, P. Caasas, and G. Capdehourat, “DeepMAL - Deep Learning Models for Malware Traffic Detection and Classification,” in Data Science – Analytics and Applications, Wiesbaden: Springer Fachmedien Wiesbaden, 2021, pp. 105–112. doi: 10.1007/978-3-658-32182-6_16.
F. Martinez-Plumed et al., “CRISP-DM Twenty Years Later: From Data Mining Processes to Data Science Trajectories,” IEEE Trans Knowl Data Eng, vol. 33, no. 8, pp. 3048–3061, Aug. 2021, doi: 10.1109/TKDE.2019.2962680.
M. Seyedan and F. Mafakheri, “Predictive big data analytics for supply chain demand forecasting: methods, applications, and research opportunities,” J Big Data, vol. 7, no. 1, p. 53, Dec. 2020, doi: 10.1186/s40537-020-00329-2.
M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, “Deep recurrent neural network for IoT intrusion detection system,” Simul Model Pract Theory, vol. 101, p. 102031, May 2020, doi: 10.1016/j.simpat.2019.102031.
A. Aleran, H. Almukhalfi, A. Noor, R. Alluhaibi, A. Hafez, and T. H. Noor, “An IoT-Based Predictive Maintenance Framework Using a Hybrid Deep Learning Model for Smart Industrial Systems,” Comput Mater Contin, pp. 1–10, 2025, doi: 10.32604/cmc.2025.070741.
U. Khadam, P. Davidsson, and R. Spalazzese, “A systematic literature review on AI in IoT systems: Tasks, applications, and deployment,” Internet of Things, vol. 34, p. 101779, Nov. 2025, doi: 10.1016/j.iot.2025.101779.
L. Tian, S. Santi, A. Seferagić, J. Lan, and J. Famaey, “Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research,” J Netw Comput Appl, vol. 182, p. 103036, May 2021, doi: 10.1016/j.jnca.2021.103036.
D. kumar sah, M. Vahabi, and H. Fotouhi, “Federated learning at the edge in Industrial Internet of Things: A review,” Sustain Comput Informatics Syst, vol. 46, p. 101087, Jun. 2025, doi: 10.1016/j.suscom.2025.101087.
O. O. Tooki and O. M. Popoola, “A critical review on intelligent-based techniques for detection and mitigation of cyberthreats and cascaded failures in cyber-physical power systems,” Renew Energy Focus, vol. 51, p. 100628, Oct. 2024, doi: 10.1016/j.ref.2024.100628.
G. S. Rady, S. S. Mohamed, M. F. Mohamed, and K. F. Hussain, “High dimensional autonomous computing on Arabic language classification,” Comput Electr Eng, vol. 100, p. 108020, May 2022, doi: 10.1016/j.compeleceng.2022.108020.
S. Hizal, U. Cavusoglu, and D. Akgun, “A novel deep learning-based intrusion detection system for IoT DDoS security,” Internet of Things, vol. 28, p. 101336, Dec. 2024, doi: 10.1016/j.iot.2024.101336.
A. Tripathi, P. Upadhyay, and P. K. Goel, “Deep Learning for Anomaly Detection in Industrial Networks,” 2025, pp. 103–130. doi: 10.4018/979-8-3373-3241-3.ch006.
E. Villar-Rodriguez, M. A. Pérez, A. I. Torre-Bastida, C. R. Senderos, and J. López-de-Armentia, “Edge intelligence secure frameworks: Current state and future challenges,” Comput Secur, vol. 130, p. 103278, Jul. 2023, doi: 10.1016/j.cose.2023.103278.
G. C. Shwethashree and S. Manjula, “Adaptive Cyberattack Detection in IoT-Edge-Cloud Environments Using Decision Tree Regressor,” Eng Technol Appl Sci Res, vol. 15, no. 4, pp. 25432–25437, Aug. 2025, doi: 10.48084/etasr.11184.
M. Ozdem, “A novel approach for real-time anomaly detection in dynamic computer networks using temporal graph networks and explainable artificial intelligence,” Alexandria Eng J, vol. 132, pp. 369–382, Nov. 2025, doi: 10.1016/j.aej.2025.11.001.
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Praveen Gujjar, Raghavendra M Devadas, Nikitha K

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
