MQTTNET-IDS: Deep-Fuzzy Fusion for Intelligent Threat Detection

International Journal of Emerging Research in Science, Engineering, and Management
Vol. 1, Issue 6, pp. 55-62, December 2025.

https://doi.org/10.58482/ijersem.v1i6.7

MQTTNET-IDS: Deep-Fuzzy Fusion for Intelligent Threat Detection

M.A. Manivasagam

S. Sai Ram

C. Lakshmikanth Reddy

E. Ram Charan

P. Venkata Charan

M. Prabhash

Department of CSE, Siddartha Institute of Science and Technology, Puttur, India.

Abstract: Message Queuing Telemetry Transport (MQTT) is a lightweight communication protocol widely adopted in Internet of Things (IoT) environments due to its low bandwidth consumption and efficient publish-subscribe architecture. Despite these advantages, MQTT-based IoT networks are highly vulnerable to cyberattacks, including denial-of-service, flooding, brute-force authentication attempts, malformed packet injection, and protocol misuse. Traditional intrusion detection systems (IDS) often rely on single machine learning models and raw traffic features, which limits their robustness and detection capability under complex and uncertain IoT traffic conditions. This paper proposes an optimized ensemble-based intrusion detection system for MQTT-based IoT networks using XGBoost and LightGBM classifiers. A multi-stage feature extraction strategy is employed, integrating raw MQTT protocol features, statistical traffic descriptors, and deep latent representations learned through an autoencoder. An optimization-driven feature selection and weighted fusion mechanism is applied to generate a compact and discriminative feature space. The final intrusion detection is performed using an ensemble of XGBoost and LightGBM to leverage their complementary learning capabilities. Experimental results demonstrate that the proposed ensemble IDS achieves high detection accuracy, low false positive rate, and strong Matthews Correlation Coefficient (MCC) across multiple test scenarios, confirming its effectiveness and reliability for securing MQTT-based IoT environments.

Keywords: MQTT security, Internet of Things, intrusion detection system, ensemble learning, XGBoost, LightGBM, IoT cybersecurity.

References: 

  1. R. Alabdan et al., “Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics,” Alexandria Engineering Journal, vol. 110, pp. 153-167, Oct. 2024, doi: 10.1016/j.aej.2024.09.117.
  2. A. S. Albahri et al., “Fuzzy decision-making framework for explainable golden multi-machine learning models for real-time adversarial attack detection in vehicular ad-hoc networks,” Information Fusion, vol. 105, p. 102208, Dec. 2023, doi: 10.1016/j.inffus.2023.102208.
  3. B. Karaduman, B. T. Tezel, and M. Challenger, “On the impact of fuzzy-logic based BDI agent model for cyber-physical systems,” Expert Systems with Applications, vol. 238, p. 122265, Oct. 2023, doi: 10.1016/j.eswa.2023.122265.
  4. W. Xiao, G. Xie, H. Liu, W. Chen, and R. Li, “FDAN: Fuzzy deep attention networks for driver behavior recognition,” Journal of Systems Architecture, vol. 147, p. 103063, Jan. 2024, doi: 10.1016/j.sysarc.2023.103063.
  5. A. B. Kathole, S. Lonare, J. Katti, K. Vhatkar, and G. Dharmale, “Efficient fuzzy ranking with ensemble machine learning network for attack detection and classification in VANET,” Expert Systems with Applications, vol. 279, p. 127295, Apr. 2025, doi: 10.1016/j.eswa.2025.127295.
  6. P. Vidyasri and S. Suresh, “FDN-SA: Fuzzy deep neural-stacked autoencoder-based phishing attack detection in social engineering,” Computers & Security, vol. 148, p. 104188, Nov. 2024, doi: 10.1016/j.cose.2024.104188.
  7. W. Ding, S. Geng, H. Wang, J. Huang, and T. Zhou, “FDiff-Fusion: Denoising diffusion fusion network based on fuzzy learning for 3D medical image segmentation,” Information Fusion, vol. 112, p. 102540, Jul. 2024, doi: 10.1016/j.inffus.2024.102540.
  8. Y. Ma, Y. Dou, X. Xu, Y. Tan, and K. Yang, “Requirements prioritization for complex products based on fuzzy associative predicate representation learning,” Advanced Engineering Informatics, vol. 62, p. 102621, Jun. 2024, doi: 10.1016/j.aei.2024.102621.
  9. S. R. Mohandes et al., “Application of a hybrid fuzzy-based algorithm to investigate the environmental impact of sewer overflow,” Smart and Sustainable Built Environment, vol. 14, no. 6, pp. 1950-1990, Oct. 2024, doi: 10.1108/SASBE-09-2023-0281.
  10. Y. Sun and A. Pezzola, “Trusted computing and privacy protection of computer internet of things nodes based on deep fuzzy control of dynamic learning rate,” International Journal of Fuzzy System Applications, vol. 13, no. 1, pp. 1-18, Jul. 2024, doi: 10.4018/IJFSA.348655.
  11. A. Yazdinejad, A. Dehghantanha, R. M. Parizi, and G. Epiphaniou, “An optimized fuzzy deep learning model for data classification based on NSGA-II,” Neurocomputing, vol. 522, pp. 116-128, Dec. 2022, doi: 10.1016/j.neucom.2022.12.027.
  12. D. D. Patil, M. P. Lokhande, and N. M. Mule, “An intelligent system with fuzzy-based inference engine for secured tele-robotic surgery,” Healthcare Analytics, vol. 4, p. 100264, Sep. 2023, doi: 10.1016/j.health.2023.100264.