Securing Smart IoT Networks from Cyber Threats Using Explainable Zero Channel Attention-aided Ghost Convolution Neural Network Framework
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2026.17.4.21Keywords:
Internet of Things (IoT), Cyberattack Detection, Multiclass Classification, Data Normalization, Network Security, Deep learning, Explainable Artificial Intelligence (XAI).Dimensions Badge
Issue
Section
License
Copyright (c) 2026 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The rise of advancements driven by the Internet of Things (IoT), presents numerous benefits, such as improved efficiency and enhanced quality of life. However, this interconnectedness also exposes critical vulnerabilities, making robust cyber-attack detection essential. Hence, this manuscript emphasizes the innovative explainable deep learning (XAI-DL) model for detecting and classifying multiclass cyber threat attacks in Internet of Things (IoT) platforms. Initially, the raw data samples collected from the BCCC-CIC-IDS dataset are preprocessed by performing a Pareto Scaling Normalization (PSN) and one-hot encoding processto improve the data quality.After preprocessing, the Zero Channel Attention-aided Ghost Convolution Neural Network (ZCAtt-GCNN) is proposed to detect and classify the various cyber threat attacks like Denial of Service (DoS) Attacks, Distributed Denial of Service (DDoS) Attacks, Web Attacks, file transfer protocol (FTP) Attacks, and Botnet Attacks. Furthermore, three XAI models are investigated for enhanced visualizations over the cyberattack detection: Shapley additive explanations (SHAP), Partial Dependence Plot-Individual Conditional Expectation (PDP-ICE), and Permutation Feature Importance (PFI). The proposed method is simulated via the Python platform and various performance measures like G-mean, Accuracy, Matthews Correlation Coefficient (MCC), Negative Predictive Value (NPV), computation time (CT), and false positive rate (FPR) are scrutinized, and associated with other techniques. The overall accuracy of 99.48%, G-mean of 99.18%, and FPR of 0.322 are obtained by the suggested framework for identifying various IoT Cyberattacks.Abstract
How to Cite
Downloads
Similar Articles
- Temesgen A. Asfaw, Deep learning hyperparameter’s impact on potato disease detection , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Sabeerath K, Manikandasaran S. Sundaram, BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Priscilla I, Jayasimman Lawrence, Enhanced Symmetric Cryptography Technique (ESCTGPU) for Secure Communication between the IoT Gateway and the public Cloud Environment , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Syed Amin Jameel, Abdul Rahim Mohamed Shanavas, Deep-Ultranet: Diabetic Retinopathy Grading System Using Ultra-Widefield Retinal Images , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Neeraj ., Anita Singhrova, Quantum Key Distribution-based Techniques in IoT , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- A. Tamilmani, K. Muthuramalingam, An enhanced support vector machine bbased multiclass classification method for crop prediction , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Saritha Devi K, Dr. M. Chidambaram, Multi Linear Tensor and Graph Convoluted Attention Network Based Classifier for Fake News Detection , The Scientific Temper: Vol. 17 No. 04 (2026): The Scientific Temper
- Jayalakshmi K., M. Prabakaran, The role of big data in transforming human resource analytics: A literature review , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Sabeerath K, Manikandasaran S. Sundaram, ESPoW: Efficient and secured proof of ownership method to enable authentic deduplicated data access in public cloud storage , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
<< < 2 3 4 5 6 7 8 9 10 11 > >>
You may also start an advanced similarity search for this article.

