Research Article Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms Hasan Alkahtani 1 and Theyazn H. H. Aldhyani 2 1 College of Computer Science and Information Technology, King Faisal University, P. O. Box 400, Al-Ahsa, Saudi Arabia 2 Community College of Abqaiq, King Faisal University, P. O. Box 400, Al-Ahsa, Saudi Arabia Correspondence should be addressed to eyazn H. H. Aldhyani; taldhyani@kfu.edu.sa Received 28 February 2021; Revised 23 March 2021; Accepted 17 April 2021; Published 7 July 2021 Academic Editor: M. Irfan Uddin Copyright © 2021 Hasan Alkahtani and eyazn H. H. Aldhyani. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Smart grids, advanced information technology, have become the favored intrusion targets due to the Internet of ings (IoT) using sensor devices to collect data from a smart grid environment. ese data are sent to the cloud, which is a huge network of super servers that provides different services to different smart infrastructures, such as smart homes and smart buildings. ese can provide a large space for attackers to launch destructive cyberattacks. e novelty of this proposed research is the development of a robust framework system for detecting intrusions based on the IoTenvironment. An IoTID20 dataset attack was employed to develop the proposed system; it is a newly generated dataset from the IoT infrastructure. In this framework, three advanced deep learning algorithms were applied to classify the intrusion: a convolution neural network (CNN), a long short-term memory (LSTM), and a hybrid convolution neural network with the long short-term memory (CNN-LSTM) model. e complexity of the network dataset was dimensionality reduced, and to improve the proposed system, the particle swarm optimization method (PSO) was used to select relevant features from the network dataset. e obtained features were processed using deep learning al- gorithms. e experimental results showed that the proposed systems achieved accuracy as follows: CNN 96.60%, LSTM 99.82%, and CNN-LSTM 98.80%. e proposed framework attained the desired performance on a new variable dataset, and the system will be implemented in our university IoT environment. e results of comparative predictions between the proposed framework and existing systems showed that the proposed system more efficiently and effectively enhanced the security of the IoT environment from attacks. e experimental results confirmed that the proposed framework based on deep learning algorithms for an intrusion detection system can effectively detect real-world attacks and is capable of enhancing the security of the IoT environment. 1. Introduction Currently, there are more than 25 billion devices connected to the Internet worldwide, three times as many human beings [1–3]. e Internet of ings (IoT) is based on interconnected smart devices, and different services are used to integrate them into a single network. is allows the smart devices to gather sensitive information and carry out im- portant functions, and these devices connect and commu- nicate with each other at high speeds and make decisions according to indicator information. e IoT environment uses cloud services as a backend for processing information and maintaining remote control. Client users use mobile applications or web services to access data and control the devices. e IoTinfrastructure uses large numbers of sensors to extract significant information, and this information is analyzed by artificial intelligence algorithms [4, 5]. Intrusion detection systems (IDSs) are the technical, regulatory, and administrative means used to prevent un- authorized use, abuse, and recovery of electronic informa- tion and communication systems and the information they contain, aimed at ensuring the availability and continuity of the work of the information systems and enhancing the protection, confidentiality, and privacy of personal data by taking all measures. Cybersecurity is the practice of defending computers, servers, mobile devices, electronic Hindawi Complexity Volume 2021, Article ID 5579851, 18 pages https://doi.org/10.1155/2021/5579851