Anomaly Detection in IoT Based Satellite Networks: NidaDeepMix

PDF (1110KB), PP.1-13

Views: 0 Downloads: 0

Author(s)

Nida Canpolat 1,* Sengul Dogan 1 Mehmet Karakose 2 Turker Tuncer 1 Musa Yenilmez 2

1. Department of Digital Forensics Engineering, Technology Faculty, Firat University, Elazig, Turkey

2. Department of Computer Engineering, Firat University, Elazig, Turkey

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2025.06.01

Received: 1 Nov. 2024 / Revised: 20 Mar. 2025 / Accepted: 26 Aug. 2025 / Published: 8 Dec. 2025

Index Terms

Network Security, Satellite Security, Deep Learning, Cyber Security, Neural Network

Abstract

IOT based satellite networks are one of the modern cyber attack topics. This technology has important application areas such as data collection, monitoring and control without the need for close access. Especially the increasing use of IOT devices and their recent integration with satellite networks have made these devices the target of attacks. The fact that IOT devices have more than one type and require low processing power makes them vulnerable to attacks. The use of IOT devices together with satellite networks increases the complexity of this situation and the size of cyber attacks. This situation has made it necessary to increase the studies on preventing and detecting cyber attacks on IOT based networks. For this purpose, in this article, we propose a new deep learning architecture (NidaDeepMix) that provides high accuracy in order to detect cyber attacks on IOT based satellite networks. The designed layer structure and parameters of the NidaDeepMix architecture are adjusted to effectively cope with complex and difficult situations. The NidaDeepMix architecture has been tested on two separate comprehensive datasets, CSE-CIC-IDS-2018 and BCCC-CIRA-CIC-DoHBrw-2020. As a result of the training, a serious accuracy rate of %99.99 was achieved for the CSE-CIC-IDS-2018 dataset and %99.98 for the BCCC-CIRA-CIC-DoHBrw-2020 dataset. Considering these high accuracy rates, it has been demonstrated that the proposed architecture is quite effective in classifying attacks. These rates obtained on different datasets reveal the generalization success of the model. At the same time the model has also addressed the issue of cyber attacks on IOT based satellite networks with an innovative approach. In this context, a new and effective architecture has been provided to the literature for detecting attacks on IOT based satellite networks. It is envisaged that the proposed method NidaDeepMix will be an important reference model in important issues such as cyber attacks and anomaly detection in the future.

Cite This Paper

Nida Canpolat, Sengul Dogan, Mehmet Karakose, Turker Tuncer, Musa Yenilmez, "Anomaly Detection in IoT Based Satellite Networks: NidaDeepMix", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.15, No.6, pp. 1-13, 2025. DOI:10.5815/ijwmt.2025.06.01

Reference

[1]S. K. Routray and H. M. Hussein, “Satellite Based IoT Networks for Emerging Applications,” Mar. 2019.
[2]K. Sohraby, D. Minoli, B. Occhiogrosso, and W. Wang, “A Review of Wireless and Satellite-Based M2M/IoT Services in Support of Smart Grids,” Mob. Networks Appl., vol. 23, no. 4, pp. 881–895, Aug. 2018, doi: 10.1007/S11036-017-0955-1/TABLES/2.
[3]M. De Sanctis, E. Cianca, G. Araniti, I. Bisio, and R. Prasad, “Satellite communications supporting internet of remote things,” IEEE Internet Things J., vol. 3, no. 1, pp. 113–123, Feb. 2016, doi: 10.1109/JIOT.2015.2487046.
[4]B. Soret, I. Leyva-Mayorga, S. Cioni, and P. Popovski, “5G satellite networks for Internet of Things: Offloading and backhauling,” Int. J. Satell. Commun. Netw., vol. 39, no. 4, pp. 431–444, Jul. 2021, doi: 10.1002/SAT.1394.
[5]M. Gaikwad, M. Khanapurkar, and S. Untawale, “Recent development of nano-satellite constellation as iot communication platform,” AIP Conf. Proc., vol. 2424, no. 1, Mar. 2022, doi: 10.1063/5.0078153/2822190.
[6]F. Chai, Q. Zhang, H. Yao, X. Xin, R. Gao, and M. Guizani, “Joint Multi-Task Offloading and Resource Allocation for Mobile Edge Computing Systems in Satellite IoT,” IEEE Trans. Veh. Technol., vol. 72, no. 6, pp. 7783–7795, Jun. 2023, doi: 10.1109/TVT.2023.3238771.
[7]C. Zhou et al., “Delay-aware iot task scheduling in space-air-ground integrated network,” Proc. - IEEE Glob. Commun. Conf. GLOBECOM, 2019, doi: 10.1109/GLOBECOM38437.2019.9013393.
[8]S. K. Routray, A. Javali, A. Sahoo, K. P. Sharmila, and S. Anand, “Military applications of satellite based IoT,” Proc. 3rd Int. Conf. Smart Syst. Inven. Technol. ICSSIT 2020, pp. 122–127, Aug. 2020, doi: 10.1109/ICSSIT48917.2020.9214284.
[9]S. K. Routray, R. Tengshe, A. Javali, S. Sarkar, L. Sharma, and A. D. Ghosh, “Satellite Based IoT for MC Applications,” Mar. 2019.
[10]P. P. Ray, “Towards an internet of things based architectural framework for defence,” 2015 Int. Conf. Control Instrum. Commun. Comput. Technol. ICCICCT 2015, pp. 411–416, May 2016, doi: 10.1109/ICCICCT.2015.7475314.
[11]C. Han, A. Liu, H. Wang, L. Huo, and X. Liang, “Dynamic Anti-Jamming Coalition for Satellite-Enabled Army IoT: A Distributed Game Approach,” IEEE Internet Things J., vol. 7, no. 11, pp. 10932–10944, Nov. 2020, doi: 10.1109/JIOT.2020.2991585.
[12]S. K. Routray, R. Tengshe, A. Javali, S. Sarkar, L. Sharma, and A. D. Ghosh, “Satellite Based IoT for Mission Critical Applications,” 2019 Int. Conf. Data Sci. Commun. IconDSC 2019, Mar. 2019, doi: 10.1109/ICONDSC.2019.8817030.
[13]W. Jiang et al., “Enhanced Communications on Satellite-Based IoT Systems to Support Maritime Transportation Services,” Sensors 2022, Vol. 22, Page 6450, vol. 22, no. 17, p. 6450, Aug. 2022, doi: 10.3390/S22176450.
[14]I. Lysogor, L. Voskov, A. Rolich, and S. Efremov, “Study of Data Transfer in a Heterogeneous LoRa-Satellite Network for the Internet of Remote Things,” Sensors 2019, Vol. 19, Page 3384, vol. 19, no. 15, p. 3384, Aug. 2019, doi: 10.3390/S19153384.
[15]R. Damaševičius, N. Bacanin, and S. Misra, “From Sensors to Safety: Internet of Emergency Services (IoES) for Emergency Response and Disaster Management,” J. Sens. Actuator Networks 2023, Vol. 12, Page 41, vol. 12, no. 3, p. 41, May 2023, doi: 10.3390/JSAN12030041.
[16]U. Zafar, M. A. Shah, A. Wahid, A. Akhunzada, and S. Arif, “Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions,” EAI/Springer Innov. Commun. Comput., pp. 291–309, 2019, doi: 10.1007/978-3-319-99966-1_27.
[17]U. Inayat, M. F. Zia, S. Mahmood, H. M. Khalid, and M. Benbouzid, “Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects,” Electron. 2022, Vol. 11, Page 1502, vol. 11, no. 9, p. 1502, May 2022, doi: 10.3390/ELECTRONICS11091502.
[18]N. Moustafa, I. Khan, … M. H.-I. T., and  undefined 2022, “DFSat: Deep Federated Learning for Identifying Cyber Threats in IoT-based Satellite Networks,” ieeexplore.ieee.orgN Moustafa, IA Khan, M Hassanin, D Ormrod, D Pi, I Razzak, J SlayIEEE Trans. Ind. Informatics, 2022•ieeexplore.ieee.org.
[19]N. Koroniotis, N. Moustafa, and J. Slay, “A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks,” Comput. Electr. Eng., vol. 99, p. 107745, Apr. 2022, doi: 10.1016/J.COMPELECENG.2022.107745.
[20]J. Jose and D. V Jose, “Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset,” Int. J. Electr. Comput. Eng., vol. 13, no. 1, pp. 1134–1141, 2023, doi: 10.11591/ijece.v13i1.pp1134-1141.
[21]X. Zhang, J. Ran, and J. Mi, “An Intrusion Detection System Based on Convolutional Neural Network for Imbalanced Network Traffic,” Proc. IEEE 7th Int. Conf. Comput. Sci. Netw. Technol. ICCSNT 2019, pp. 456–460, Oct. 2019, doi: 10.1109/ICCSNT47585.2019.8962490.
[22]R. Uddin and S. A. P. Kumar, “SDN-Based Federated Learning Approach for Satellite-IoT Framework to Enhance Data Security and Privacy in Space Communication,” IEEE J. Radio Freq. Identif., vol. 7, pp. 424–440, 2023, doi: 10.1109/JRFID.2023.3279329.
[23]E. U. H. Qazi, M. H. Faheem, and T. Zia, “HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System,” Appl. Sci. 2023, Vol. 13, Page 4921, vol. 13, no. 8, p. 4921, Apr. 2023, doi: 10.3390/APP13084921.
[24]W. Guo, J. Xu, Y. Pei, L. Yin, C. Jiang, and N. Ge, “A Distributed Collaborative Entrance Defense Framework Against DDoS Attacks on Satellite Internet,” IEEE Internet Things J., vol. 9, no. 17, pp. 15497–15510, Sep. 2022, doi: 10.1109/JIOT.2022.3176121.
[25]I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization,” Int. Conf. Inf. Syst. Secur. Priv., vol. 2018-January, pp. 108–116, 2018, doi: 10.5220/0006639801080116.