Next Article in Journal
Thickness Uniformity Improvement in Superplastic Hemispherical Shell Using Truncated Conical Blanks: Numerical and Experimental Analysis
Previous Article in Journal
Lightweight Vision Transformer for Real-Time Threat Level Assessment in Φ-OTDR-Based Pipeline Monitoring
Previous Article in Special Issue
Research on Dependency-Aware Service Migration Strategy in the Internet of Vehicles Integrating a Graph Attention Network and Deep Reinforcement Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Towards Privacy-Preserving Deep Learning for Intelligent IoT Botnet Detection

by
Ariwan M. Rasool
1,*,
Nader Sohrabi Safa
2,* and
Consolee Mbarushimana
1
1
Department of Computing and Mathematical Sciences, University of Wolverhampton, Wolverhampton WV1 1LY, UK
2
Department of Computing, University of Worcester, Worcester WR2 6AJ, UK
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2026, 16(3), 1665; https://doi.org/10.3390/app16031665 (registering DOI)
Submission received: 1 December 2025 / Revised: 24 January 2026 / Accepted: 30 January 2026 / Published: 6 February 2026
(This article belongs to the Special Issue Mobile Computing and Intelligent Sensing, 2nd Edition)

Abstract

Internet of Things (IoT) botnets are networks of infected smart devices controlled by attackers and posing a serious cybersecurity challenge. Developing detection approaches that maintain high accuracy while protecting privacy presents considerable challenges, particularly in large and heterogeneous IoT networks. This paper empirically compares three modelling approaches on Bot-IoT and N-BaIoT in binary and multiclass settings: handcrafted machine learning with random forest (RF), centralised deep learning (CDL) with DNN/LSTM/BiLSTM, and federated deep learning (FDL) with the same architectures. Model hyperparameters are selected via randomised search on stratified subsets and then fixed for final training. Results show near-perfect performance for all approaches in binary detection: on Bot-IoT, CDL-DNN attains perfect accuracy, and RF is virtually perfect (only four benign-to-attack false positives), while FDL models are similarly strong with only small false-positive and false-negative counts. On N-BaIoT, RF and CDL (especially LSTM) are near-perfect, and FDL is very close to CDL. For multiclass detection, CDL-DNN leads on Bot-IoT, RF remains near perfect with minimal cross-class confusion, and FDL trails slightly; on N-BaIoT, FDL-BiLSTM and RF are essentially perfect, with CDL-LSTM close behind. Overall, the findings validate RF as a competitive classical approach, show where centralised representation learning adds value, and demonstrate that federated training preserves most of the centralised accuracy while avoiding raw data centralization (data locality) for scalable deployment.
Keywords: IoT; machine learning; deep learning; security and privacy; botnet detection; federated learning IoT; machine learning; deep learning; security and privacy; botnet detection; federated learning

Share and Cite

MDPI and ACS Style

Rasool, A.M.; Safa, N.S.; Mbarushimana, C. Towards Privacy-Preserving Deep Learning for Intelligent IoT Botnet Detection. Appl. Sci. 2026, 16, 1665. https://doi.org/10.3390/app16031665

AMA Style

Rasool AM, Safa NS, Mbarushimana C. Towards Privacy-Preserving Deep Learning for Intelligent IoT Botnet Detection. Applied Sciences. 2026; 16(3):1665. https://doi.org/10.3390/app16031665

Chicago/Turabian Style

Rasool, Ariwan M., Nader Sohrabi Safa, and Consolee Mbarushimana. 2026. "Towards Privacy-Preserving Deep Learning for Intelligent IoT Botnet Detection" Applied Sciences 16, no. 3: 1665. https://doi.org/10.3390/app16031665

APA Style

Rasool, A. M., Safa, N. S., & Mbarushimana, C. (2026). Towards Privacy-Preserving Deep Learning for Intelligent IoT Botnet Detection. Applied Sciences, 16(3), 1665. https://doi.org/10.3390/app16031665

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop