Abstract
The fast development of the Internet of Things (IoT) has introduced significant threats due to the growing number of connected devices and the vulnerability of data transmitted. Conventional security systems often fail to address the specific requirements of IoT networks because of the limited resources of individual devices and the complexity of the interconnected ecosystem in which they are implemented. The research introduces SecureNet-IoT, a modern security framework that will strengthen the security of connected systems and networks. The framework uses a tuned Intelligent Random Forest (ASSO-IRF) that uses an ASSO to predict the behaviour of IoT devices and distinguish between various types of attacks. SecureNet-IoT actively detects and neutralizes the possible vulnerabilities within the environments of IoT and fog computing. The information was gathered on IoT devices in smart homes and industrial IoTs, including device communication, communication logs, and network traffic, which were pre-processed with a Kalman filter to eliminate noise and normalization techniques to normalize the data. The model classifies devices as authentic, breached, or fake and uses a suggested model to forecast malicious acts. It approximates the possibilities of transitions between states, thus being able to detect threats early. In addition, the framework also analyses device communications to enhance predictive accuracy. The metrics used to assess performance were accuracy (98.96%), F1-score (96.31%), precision (98.78%), and recall (96.24%). The framework demonstrates the system’s effectiveness in preventing malicious behavior by successfully categorizing device states, estimating transition probabilities, and analyzing device communications, ultimately enhancing IoT system security and integrity.
References
I. H. Sarker, A. S. M. Kayes, S. Badsha, H. Alqahtani, P. Watters, and A. Ng, “Cybersecurity data science: an overview from a machine learning perspective,” J. Big Data, vol. 7, pp. 1–29, 2020. https://doi.org/10.1186/s40537-020-00318-5.
P. Formosa, M. Wilson, and D. Richards, “A principlist framework for cybersecurity ethics,” Comput. Security, vol. 109, p. 102382, 2021. https://doi.org/10.1016/j.cose.2021.102382.
R. J. Raimundo and A. T. Rosário, “Cybersecurity in the Internet of Things in industrial management,” Appl. Sci., vol. 12, no. 3, p. 1598, 2022. https://doi.org/10.3390/app12031598.
M. Kuzlu, C. Fair, and O. Guler, “Role of artificial intelligence in the Internet of Things (IoT) cybersecurity,” Discover Internet Things, vol. 1, no. 1, p. 7, 2021. https://doi.org/10.1007/s43926-020-00001-4.
H. El-Sofany, S. A. El-Seoud, O. H. Karam, and B. Bouallegue, “Using machine learning algorithms to enhance IoT system security,” Sci. Rep., vol. 14, no. 1, p. 12077, 2024. https://doi.org/10.1038/s41598-024-62861-y.
S. Ahmed and M. Khan, “Securing the Internet of Things (IoT): A comprehensive study on the intersection of cybersecurity, privacy, and connectivity in the IoT ecosystem,” AI, IoT Fourth Ind. Revolut. Rev., vol. 13, no. 9, pp. 1–17, 2023.
H. A. Alterazi et al., “Prevention of cybersecurity threats in IoT using particle swarm optimization,” Sensors, vol. 22, no. 16, p. 6117, 2022. https://doi.org/10.3390/s22166117.
D. K. Saini, H. Saini, P. Gupta, and A. B. Mabrouk, “Prediction of malicious objects using prey-predator model in IoT for smart cities,” Comput. Ind. Eng., vol. 168, p. 108061, 2022. https://doi.org/10.1016/j.cie.2022.108061.
S. Strecker, W. Van Haaften, and R. Dave, “An analysis of IoT cybersecurity driven by machine learning,” Proc. Int. Conf. Commun. Comput. Technol. (ICCCT 2021), pp. 725–753, 2021. https://doi.org/10.1007/978-981-16-3246-4_55.
M. Gopalsamy, “AI-based IoT-botnet attacks identification techniques to enhance cybersecurity,” Int. J. Res. Anal. Rev. (IJRAR), vol. 7, no. 4, pp. 414–420, 2020.
D. Kalla, D. S. Kuraku, and F. Samaah, “Enhancing cybersecurity by predicting malware using supervised machine learning models,” Int. J. Comput. Artif. Intell., vol. 2, no. 2, pp. 55–62, 2021. https://doi.org/10.33545/27076571.2021.v2.i2a.71.
A. Blowing, V. Stanislaw, R. Wagner, L. Ferrari, and S. Magomedov, “Performing ransomware detection through predictive behavioral mapping to autonomous threat identification,” 2024. https://doi.org/10.31219/osf.io/5zu9r.
Z. Umar et al., “Analysis of behavioral artifacts of malware for its detection using machine learning,” 2024 IEEE 9th Int. Conf. Converg. Technol. (I2CT), pp. 1–5, Apr. 2024. https://doi.org/10.1109/I2CT61223.2024.10543310.
Z. Jamadi and A. G. Aghdam, “Enhanced malware prediction and containment using Bayesian neural networks,” IEEE J. Radio Freq. Identif., 2024. https://doi.org/10.1109/JRFID.2024.3410881.
N. U. Prince et al., “IEEE standards and deep learning techniques for securing IoT devices against cyber attacks,” J. Comput. Anal. Appl., vol. 33, no. 7, 2024.
S. Rizvi, R. Pipetti, N. McIntyre, J. Todd, and I. Williams, “Threat model for securing IoT networks at the device level,” Internet Things, vol. 11, p. 100240, 2020. https://doi.org/10.1016/j.iot.2020.100240.
R. Kalaria, A. S. M. Kayes, W. Rahayu, E. Pardede, and A. Salehi, “IoTPredictor: A security framework for predicting IoT device behaviors and detecting malicious devices against cyber attacks,” Comput. Security, vol. 146, p. 104037, 2024. https://doi.org/10.1016/j.cose.2024.104037.
M. Asam et al., “IoT malware detection architecture using a novel channel boosted and squeezed CNN,” Sci. Rep., vol. 12, no. 1, p. 15498, 2022. https://doi.org/10.1038/s41598-022-18936-9.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2026 Journal of Cyber Security and Mobility
