Detection of Attack Behaviors in IoT Networks Using Temporal Convolutional Networks (TCN)
Main Article Content
Abstract
This research aims to (1) develop a framework for detecting attack behaviors in IoT networks using the Temporal Convolutional Networks (TCN) model and (2) evaluate the performance of the TCN model by comparing it with RNN, LSTM, GRU, and DNN models. The experiment was conducted over a 12-week period using Python as the primary programming language. A synthetic dataset was utilized, simulating Denial-of-Service (DoS) and Man-in-the-Middle (MITM) cyberattacks. The research process involved data transformation and preprocessing, followed by training the models using TensorFlow/Keras on Google Colab. The experimental results revealed that the TCN model achieved a high recall score (0.9986), indicating its ability to detect nearly all attack events. However, its accuracy (≈0.50) and precision (0.4978) were low, leading to a high false positive rate. Additionally, the loss values exhibited significant fluctuations, reflecting the model's instability in learning the data effectively. In comparison, the RNN model provided balanced results, LSTM and GRU demonstrated high efficiency in handling complex data, and DNN achieved the highest accuracy. These findings suggest that while the
TCN model performs well in detecting attack behaviors in terms of recall, it requires further improvements to enhance precision and accuracy. To address these issues, improving dataset quality, applying hyperparameter tuning, implementing regularization techniques to reduce overfitting, and testing the framework with real-world datasets are recommended. These improvements will contribute to a more reliable and effective security system for IoT networks.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The content within the published articles, including images and tables, is copyrighted by Rajamangala University of Technology Rattanakosin. Any use of the article's content, text, ideas, images, or tables for commercial purposes in various formats requires permission from the journal's editorial board.
Rajamangala University of Technology Rattanakosin permits the use and dissemination of article files under the condition that proper attribution to the journal is provided and the content is not used for commercial purposes.
The opinions and views expressed in the articles are solely those of the respective authors and are not associated with Rajamangala University of Technology Rattanakosin or other faculty members in the university. The authors bear full responsibility for the content of their articles, including any errors, and are responsible for the content and editorial review. The editorial board is not responsible for the content or views expressed in the articles.
References
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787-2805.
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497-1516.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. B. (2020). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 107, 964-975.
Su, S., Tian, H., Huang, H., & Tong, X. (2019). IoT security and privacy: Challenges and solutions. Journal of Network and Computer Applications, 144, 101-109.
Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network anomaly detection: Methods, systems and tools. IEEE Communications Surveys & Tutorials, 16(1), 303-336.
Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy. Technical report, 99(15), 1-39.
Debar, H., Dacier, M., & Wespi, A. (1999). Towards a taxonomy of intrusion-detection systems. Computer Networks, 31(8), 805-822.
Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. 2010 IEEE symposium on security and privacy, 305-316.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., ... & Wang, C. (2018). Machine learning and deep learning methods for cybersecurity. IEEE Access, 6, 35365-35381.
Ingre, B., & Yadav, A. (2015). Performance analysis of NSL-KDD dataset using ANN. 2015 International Conference on Signal Processing and Communication Engineering Systems (SPACES), 92-96.
Moustafa, N., Adi, E., Turnbull, B., & Hu, J. (2018). Deep learning for anomaly detection and classification in IoT sensors. 2018 IEEE International Conference on Big Data (Big Data), 3333-3342.
Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. 4th international conference on information systems security and privacy (ICISSP), 108-116.
Li, Z., Qin, Z., Huang, K., Ye, X., & Ye, D. (2019). Intrusion detection system based on convolutional neural networks and gated recurrent unit. IEEE Access, 7, 138175-138188.
Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954-21961.
Bai, S., Kolter, J. Z., & Koltun, V. (2018). An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint, arXiv:1803.01271.
Lea, C., Vidal, R., Reiter, A., & Hager, G. D. (2016). Temporal convolutional networks: A unified approach to action segmentation. European conference on computer vision, 473-487.
van den Oord, A., Dieleman, S., Zen, H., Simonyan, K., Vinyals, O., Graves, A., ... & Kavukcuoglu, K. (2016). Wavenet: A generative model for raw audio. arXiv preprint, arXiv:1609.03499.
Yu, F., & Koltun, V. (2015). Multi-scale context aggregation by dilated convolutions. arXiv preprint, arXiv:1511.07122.
Lara-Benítez, P., Carranza-García, M., Luna-Romera, J. M., & Riquelme, J. C. (2020). Temporal Convolutional Networks Applied to Energy-Related Time Series Forecasting. Applied Sciences, 10(7), 2322.