New featureless AI tool secures IoT devices in real-time

Beyond detection, the platform employs a large language model, specifically GPT-3.5, to recommend context-specific remediation strategies. Upon identifying vulnerable packets, the CyBERT model passes them to the LLM, which interprets protocol metadata, port numbers, and flow durations to match known vulnerabilities from the Ripple20 CVE repository. Using tailored prompts, the LLM generates mitigation recommendations, which are then verified through rule-based post-processing and alignment with industry best practices.


CO-EDP, VisionRICO-EDP, VisionRI | Updated: 04-04-2025 23:52 IST | Created: 04-04-2025 23:52 IST
New featureless AI tool secures IoT devices in real-time
Representative Image. Credit: ChatGPT

Researchers have developed a cutting-edge platform that harnesses artificial intelligence to detect and mitigate vulnerabilities in IoT devices with unprecedented speed and accuracy - a development that could reshape cybersecurity for connected systems worldwide. The study, "An IoT Featureless Vulnerability Detection and Mitigation Platform," published in Electronics, introduces an innovative approach that combines deep learning (DL) and large language models (LLMs) to identify zero-day security threats directly from raw network traffic data.

Developed by Sarah Bin Hulayyil and Shancang Li, the platform is the first of its kind to fully integrate featureless AI models into a user-friendly detection and mitigation system. Tested on public datasets from a smart home lab and the IoT23 collection, the platform achieves near-perfect detection rates while remaining lightweight and user-friendly.

How can IoT vulnerabilities be detected without manual feature engineering?

The core innovation of the platform lies in its featureless detection mechanism, which discards the traditional need for handcrafted feature selection. Instead, the system analyzes raw network traffic using two AI models: a lightweight one-dimensional convolutional neural network (1D-CNN) and a customized CyBERT model based on transformer architecture. These models automatically extract meaningful patterns from byte-level input data, offering a streamlined alternative to conventional machine learning techniques that depend on domain-specific knowledge and preprocessing.

This direct processing not only accelerates threat detection but also enhances accuracy, making it possible to identify nuanced or emerging threats that might elude signature-based or rule-based systems. 

The platform’s deep learning components were trained on extensive datasets, including 253,914 smart home traffic packets from the Cardiff University Smart Home Lab and 1.76 million packets from the IoT23 dataset. Both models achieved over 99.9% accuracy, with the CNN model processing inputs in 837.6 seconds and the CyBERT variant completing detection in 1,470.8 seconds.

Can AI models suggest mitigation steps in real-time?

Beyond detection, the platform employs a large language model, specifically GPT-3.5, to recommend context-specific remediation strategies. Upon identifying vulnerable packets, the CyBERT model passes them to the LLM, which interprets protocol metadata, port numbers, and flow durations to match known vulnerabilities from the Ripple20 CVE repository. Using tailored prompts, the LLM generates mitigation recommendations, which are then verified through rule-based post-processing and alignment with industry best practices.

For example, a detected TCP packet vulnerability linked to port 80 might trigger an LLM-generated recommendation to disable the affected service, update firmware, or restrict access based on known CVE descriptions. This end-to-end automation closes the loop between detection and response, a gap that has hindered many previous intrusion detection systems (IDS).

The mitigation process follows a multi-step logic: raw traffic is transformed into structured prompts, compared with Ripple20 vulnerabilities, and processed to yield defensive measures. Outputs include vulnerability classifications, CVE matches, CVSS scores, and suggested remediation steps - all integrated into a comprehensive interface that can be used by both experts and non-specialists.

What distinguishes this platform from previous IoT security tools?

Unlike traditional IDS platforms and detection models, many of which rely on resource-intensive CNN-LSTM or LSTM-TSO hybrids and static datasets like NSL-KDD, the novel system demonstrates superior performance in real-world IoT conditions. Existing tools often suffer from poor scalability, require heavy feature engineering, and offer no built-in mitigation capabilities.

Comparative benchmarks highlight the advantages: while models like SecureBERT and CySecBERT reached similar accuracy levels, they required over 11,000 seconds for training and validation, nearly eight times longer than the featureless CyBERT. Furthermore, the platform is optimized for deployment on constrained hardware, with model sizes of just 277.5 MB (CNN) and 334 MB (LLM), making it practical for use in smart home hubs, routers, and edge IoT devices.

The integrated mitigation engine also stands apart. Traditional systems might flag threats but leave remediation to manual processes or separate tools. In contrast, this platform applies AI-generated, CVE-specific mitigation strategies automatically within seconds of detection. This capacity for real-time defense addresses a critical demand in sectors such as healthcare, critical infrastructure, and manufacturing, where IoT devices often operate unattended and cannot afford delayed responses to cyber intrusions.

What's next?

Researchers suggest integrating adaptive learning, such as reinforcement techniques, to keep models current with evolving threats. Combining the platform with Explainable AI (XAI) could improve transparency, helping security professionals understand mitigation recommendations. Privacy-preserving methods like federated learning might enable training across multiple networks without compromising data, a critical step for broader adoption. Countermeasures against adversarial threats, including anomaly detection and ensemble methods, are also proposed to bolster resilience.

  • FIRST PUBLISHED IN:
  • Devdiscourse
Give Feedback