Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 17 , Issue 2 , PP: 101-118, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Ensemble Learning-Based Intrusion Detection and Classification for Securing IoT Networks: An Optimized Strategy for Threat Detection and Prevention

Kumaresh Sheelavant 1 , Charan K. V. 2 , B. Yamini Supriya 3 , Purshottam J. Assudani 4 , Chandra Bhushan Mahato 5 , Sanjay Kumar Suman 6 *

  • 1 Associate Professor, Dept. of CSE (AI&ML), Sai Vidya Institute of Technology, Visvesvaraya Technological University, Bengaluru, Karnataka, India - (kumaresh.s@saividya.ac.in)
  • 2 Associate Professor, Dept. of ISE, Shridevi Institute of Engineering and Technology, Visvesvaraya Technological University, Karnataka, India - (charan.kv@shrideviengineering.org)
  • 3 Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India - (yamini.bommisetti@gmail.com)
  • 4 Assistant Professor, School of Computer Science and Engineering, Ramdeobaba University, Nagpur, Maharashtra, India - (pjassudani@gmail.com)
  • 5 Principal, MIT Muzaffarpur, Bihar, India - (cbmahto1960@gmail.com)
  • 6 Professor, Dept. of AI&DS, Sri Shanmugha College of Engineering and Technology And Director Research, Sri Shanmugha Educational Institutions, Sankari, Salem, TN, India - (director.research@shanmugha.edu.in)
  • Doi: https://doi.org/10.54216/JISIoT.170208

    Received: January 19, 2025 Revised: March 17, 2025 Accepted: May 30, 2025
    Abstract

    The Internet of Things (IoT) advancement has created new security holes, which require intrusion detection systems to defend networks effectively. The complex structure of IoT networks causes traditional security methods to fail because they produce high amounts of incorrect detections and limited ability to accurately identify threats. The authors introduce ID-ELC: Ensemble Learning and Classification framework for Intrusion Detection, which aims to strengthen IoT environment security. A new ID-ELC model uses CS optimization with composite variance to choose network features that boost their detection capabilities. The cybersecurity evaluation of the system utilized Kyoto network records that included 91,000 intrusion-prone records and 59,000 benign logs from 150,000 total records. Experiments revealed ID-ELC surpasses Statistical Flow Features (SFF) and Two-layer Dimension Reduction and Two-tier Classification (TDRTC) through precision 0.98, accuracy 0.98, sensitivity 0.99 and specificity 0.97. Science-based evaluations confirm ID-ELC represents a flexible and resilient tool for IoT intrusion protection that shows practical value for citywide security systems and medicine networks and manufacturing operations. Future investigation will concentrate on enhancing the selection of features alongside classification methods to address rising cyber threats.

    Keywords :

    Intrusion Detection System (IDS) , Machine Learning , Internet of Things (IoT) , Cybersecurity , Cuckoo Search Algorithm (CS) , Statistical Flow Features (SFF) , TDRTC , Kyoto Dataset , Feature Optimization

    References

    [1]       K. Wang, A. Zhang, H. Sun, and B. Wang, “Analysis of recent deep learning-based intrusion detection methods for in-vehicle network,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 2, pp. 1843–1854, Feb. 2023.

    [2]       A. Prasanth and S. Jayachitra, “A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications,” Peer-to-Peer Networking and Applications, vol. 13, no. 6, pp. 1905-1920, 2020.

    [3]       A. Smith, B. Johnson, and C. Lee, “A Machine Learning Approach for Cyber Threat Detection in IoT Environments,” Journal of Network and Computer Applications, vol. 175, pp. 102900, Jan. 2023.

    [4]       C. Kalaiselvi and G. M. Nasira, “A new approach for diagnosis of diabetes and prediction of cancer using ANFIS,” in Proc. World Congress on Computing and Communication Technologies, WCCCT 2014, pp. 188-190, 2014.

    [5]       M. Thiruvengadam et al., “Bioactive compounds in oxidative stress-mediated diseases: Targeting the nrf2/are signaling pathway and epigenetic regulation,” Antioxidants, vol. 10, no. 12, pp. 1-12, 2021.

    [6]       M. Zakariah, S. A. AlQahtani, and M. S. Al-Rakhami, “Machine learning-based adaptive synthetic sampling technique for intrusion detection,” Applied Sciences, vol. 13, no. 11, p. 6504, 2023.

    [7]       V. D. P. Jasti et al., “Computational technique based on machine learning and image processing for medical image analysis of breast cancer diagnosis,” Security and Communication Networks, vol. 2022, pp. 1-12, 2022.

    [8]       V. Roy, L. Roy, R. Ahluwalia, G. Khambra, M. Ramesh, and K. Rajasekhar, “An advance implementation of machine learning techniques for the prediction of cervical cancer,” in Proc. 3rd IEEE Int. Conf. ICT in Business Industry and Government, ICTBIG 2023, 2023.

    [9]       S. K. Suman et al., “Game theoretical approach for improving throughput capacity in wireless ad hoc networks,” in Proc. Int. Conf. Recent Trends in Information Technology, ICRTIT 2014, pp. 10-12, 2014.

    [10]    H. K. Shakya et al., “Energy-proficient cluster enrichment in wireless sensor networks via categorized fuzzy clustering and multi-hop routing optimization,” SN Comput. Sci., vol. 6, no. 25, 2025.

    [11]    M. Alrizq et al., “Optimization of sensor node location utilizing artificial intelligence for mobile wireless sensor network,” Wireless Networks, pp. 1-13, 2023.

    [12]    S. B. Sasi and N. Sivanandam, “A survey on cryptography using optimization algorithms in WSNs,” Indian Journal of Science and Technology, vol. 8, no. 3, pp. 216-221, 2015.

    [13]    N. Dey et al., “Parameter optimization for local polynomial approximation based intersection confidence interval filter using genetic algorithm: An application for brain MRI image de-noising,” Journal of Imaging, vol. 1, no. 1, pp. 60-84, 2015.

    [14]    V. A. Bhagyalakshmi et al., “Review of detecting diabetes mellitus and diabetic retinopathy using tongue images and its features,” Research Journal of Pharmaceutical Biological and Chemical Sciences, vol. 8, no. 2, pp. 378-386, Apr. 2017.

    [15]    D. Musleh et al., “Intrusion detection system using feature extraction with machine learning algorithms in IoT,” J. Sensor Actuator Netw., vol. 12, no. 2, p. 29, Mar. 2023.

    [16]    L. Bhagyalakshmi et al., “Improving spectral efficiency and coverage capacity of 5G networks: A review,” Advances in Mathematics: Scientific Journal, vol. 9, no. 6, pp. 3387-3397, 2020.

    [17]    A. Kashyap and J. Raghuvanshi, “A preliminary study on exploring the critical success factors for developing COVID-19 preventive strategy with an economy-centric approach,” Management Research: Journal of the Iberoamerican Academy of Management, vol. 18, no. 4, pp. 357–377, Sep. 2020.

    [18]    G. Chauhan and V. Chauhan, “A phase-wise approach to implement lean manufacturing,” International Journal of Lean Six Sigma, vol. 10, no. 1, pp. 106–122, Mar. 2019.

    [19]    P. K. Srivastava et al., “Internet of thing uses in materialistic ameliorate farming through AI,” AIP Conference Proceedings, Jan. 2023.

    [20]    P. Shukla et al., “A wavelet features and machine learning founded error analysis of sound and trembling signal,” SN Computer Science, vol. 4, 2023.

    [21]    N. Malik, “Authentic leadership – an antecedent for contextual performance of Indian nurses,” Personnel Review, vol. 47, no. 6, pp. 1244–1260, Sep. 2018.

    [22]    S. Kala et al., “Shadow and weak gravitational lensing of a rotating regular black hole in a non-minimally coupled Einstein-Yang-Mills theory in the presence of plasma,” The European Physical Journal Plus, vol. 137, no. 4, Apr. 2022.

    [23]    K. Sood et al., “Identification of Asymmetric DDoS Attacks at Layer 7 with Idle Hyperlink,” ECS Transactions, vol. 107, no. 1, pp. 2171–2181, Apr. 2022.

    [24]    C. Prabhu et al., “A novel approach to extend KM models with object knowledge model (OKM) and Kafka for big data and semantic web with greater semantics,” Advances in Intelligent Systems and Computing, pp. 544–554, Jun. 2019.

    [25]    Y. N. Prajapati and M. Sharma, “Designing AI to predict Covid-19 outcomes by gender,” Dec. 2023.

    [26]    Y. N. Prajapati and M. Sharma, “Novel machine learning algorithms for predicting COVID-19 clinical outcomes with gender analysis,” Communications in Computer and Information Science, pp. 296–310, Jan. 2024.

    [27]    J. A. Khan et al., “Diversity of antibiotic-resistant Shiga toxin-producing Escherichia coli serogroups in foodstuffs of animal origin in northern India,” Journal of Food Safety, vol. 38, no. 6, p. e12566, Oct. 2018.

    [28]    H. Gupta and C. Sharma, “Face mask detection using transfer learning and OpenCV in live videos,” in Proc. 2022 Int. Conf. Fourth Industrial Revolution Based Technology and Practices, ICFIRTP, pp. 115–119, Nov. 2022.

    [29]    V. Singh et al., “Big-Data Analytics,” pp. 275–291, Oct. 2022.

    [30]    A. Saini et al., “A proposed method of machine learning based framework for software product line testing,” Nov. 2022.

    [31]    H. Gupta et al., “A machine learning framework for detection of fake news,” Communications in Computer and Information Science, pp. 64–78, 2022.

    [32]    H. Jain and M. Mahadev, “An analysis of SMS spam detection using machine learning model,” in Proc. 2022 Fifth Int. Conf. Computational Intelligence and Communication Technologies, CCICT, Jul. 2022.

    Cite This Article As :
    Sheelavant, Kumaresh. , K., Charan. , Yamini, B.. , J., Purshottam. , Bhushan, Chandra. , Kumar, Sanjay. Ensemble Learning-Based Intrusion Detection and Classification for Securing IoT Networks: An Optimized Strategy for Threat Detection and Prevention. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2025, pp. 101-118. DOI: https://doi.org/10.54216/JISIoT.170208
    Sheelavant, K. K., C. Yamini, B. J., P. Bhushan, C. Kumar, S. (2025). Ensemble Learning-Based Intrusion Detection and Classification for Securing IoT Networks: An Optimized Strategy for Threat Detection and Prevention. Journal of Intelligent Systems and Internet of Things, (), 101-118. DOI: https://doi.org/10.54216/JISIoT.170208
    Sheelavant, Kumaresh. K., Charan. Yamini, B.. J., Purshottam. Bhushan, Chandra. Kumar, Sanjay. Ensemble Learning-Based Intrusion Detection and Classification for Securing IoT Networks: An Optimized Strategy for Threat Detection and Prevention. Journal of Intelligent Systems and Internet of Things , no. (2025): 101-118. DOI: https://doi.org/10.54216/JISIoT.170208
    Sheelavant, K. , K., C. , Yamini, B. , J., P. , Bhushan, C. , Kumar, S. (2025) . Ensemble Learning-Based Intrusion Detection and Classification for Securing IoT Networks: An Optimized Strategy for Threat Detection and Prevention. Journal of Intelligent Systems and Internet of Things , () , 101-118 . DOI: https://doi.org/10.54216/JISIoT.170208
    Sheelavant K. , K. C. , Yamini B. , J. P. , Bhushan C. , Kumar S. [2025]. Ensemble Learning-Based Intrusion Detection and Classification for Securing IoT Networks: An Optimized Strategy for Threat Detection and Prevention. Journal of Intelligent Systems and Internet of Things. (): 101-118. DOI: https://doi.org/10.54216/JISIoT.170208
    Sheelavant, K. K., C. Yamini, B. J., P. Bhushan, C. Kumar, S. "Ensemble Learning-Based Intrusion Detection and Classification for Securing IoT Networks: An Optimized Strategy for Threat Detection and Prevention," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 101-118, 2025. DOI: https://doi.org/10.54216/JISIoT.170208