REVIEW | OPEN ACCESS Discovery 61, e7d1519 (2025) 1 of 9 Moderation of cyber attacks in IoTs using deep learning techniques Feanyi Stanly Nwokoro 1 , Shafi’I M Abdulhamid 2 , Kwaku Zacciah Adom-Oduro 3 , Anayo Chukwu Ikegwu 4 , Augustina Nebechi Nwatu 5 ABSTRACT The widespread use of IoT devices in the modern day has simplified our lives and elevated our everyday routines to a new level. IoT devices are connected to communicate and share data with gateways or access points (APs) for additional data processing. On the other hand, this makes cybersecurity and zero-day assaults in IoT networks more prevalent. Deep learning models and datasets used to identify fraudulent data in IoT environments have been reviewed in this research. In the context of the Internet of Things, we found that the Long Short-Term Memory (LSTM), Convolution Neural Network (CNN) and stacking auto-encoders improve the accuracy and precision of malicious packet detection. We undertook a thorough theoretical examination of deep learning datasets and models. Our research finding serves as paradigm to researchers as a technique to investigate IoT security and privacy challenges. Keywords: Internet of Things (IOTs); Access Points (APs); Long Short-Term Memory (LSTM); Convolution Neural Network (CNN); Deep Learning. 1. INTRODUCTION Over the past ten years, the Internet of Things (IoT) has advanced to transform the world using a new technology paradigm. It has the power to transform the lives of all people on the planet. IoT devices can communicate with one another and gather data from their surroundings to transmit to gateways, sensors, or any other device with internet access (Stoyanova et al., 2020). Smart homes, smart cars, smart grids, smart cities, smart agriculture, health care, surveillance, and supply chain management are just a few of the many uses for IoT today (Lee and Lee, 2015; Shin et al., 2019). Over 50 billion Internet of Things devices are expected to be online by the end of 2024 (Al- Garadi et al., 2020; Mekki et al., 2019). The proliferation of internet-connected devices has been supported by sensor downsizing, still, it has also raised privacy and security issues with the Internet of Things and left them open to numerous security breaches (Stoyanova et al., 2020; Tawalbeh et al., 2020). Discovery To Cite: Nwokoro FS, Abdulhamid SM, Adom-Oduro KZ, Ikegwu AC, Nwatu AN. Moderation of cyber attacks in IoTs using deep learning techniques. Discovery 2025; 61: e7d1519 doi: Author Affiliation: 1 Department of Computer Science, Rhema University, Nigeria 2 Department of Cyber Security, National Open University of Nigeria 3 Department of Computer Science, Technical University, Ghana 4 Department of Software Engineering, Veritas University, Nigeria 5 Department of Biotechnology, Alex Ekwueme Federal University (AE-FUNAI), Nigeria Peer-Review History Received: 04 October 2024 Reviewed & Revised: 08/October/2024 to 23/January/2025 Accepted: 27 January 2025 Published: 31 January 2025 Peer-Review Model External peer-review was done through double-blind method. Discovery pISSN 22785469; eISSN 22785450 © The Author(s) 2025. Open Access. This article is licensed under a Creative Commons Attribution License 4.0 (CC BY 4.0)., which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. DISCOVERY SCIENTIFIC SOCIETY