Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 17 , Issue 2 , PP: 48-63, 2026 | Cite this article as | XML | Html | PDF | Full Length Article

Feature Subset Search for Cybersecurity in Industrial Internet of Things Environment Using Coot Optimization Algorithm

Adil. O. Y. Mohamed 1 * , Yousef Asiri 2 , Manahill I. A. Anja 3 , Bandar M. Alghamdi 4 , Abdelgalal O. I. Abaker 5 , Mnahil M. Bashier 6

  • 1 Department of Computer Science, College of Science and Arts, Buraydah, Qassim University, Saudi Arabia - (adi.mohamed@qu.edu.sa)
  • 2 Department of Computer Science, College of Computer Science and Information Systems, Najran University, Najran, 61441, Saudi Arabia - (yasiri@nu.edu.sa)
  • 3 Computer Sciences Program, Department of Mathematics, Turabah University College, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia - (meanja@tu.edu.sa)
  • 4 Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia - (bmmalghamdi@kau.edu.sa)
  • 5 Department of Administrative Sciences, Applied College in Khamis Mushait, King Khalid University, Abha, Saudi Arabia - (aoadrees@kku.edu.sa)
  • 6 Department of Mathematics, Faculty of Science, Northern Border University, Arar, Saudi Arabia - (mnahil.elradi@nbu.edu.sa)
  • Doi: https://doi.org/10.54216/JCIM.170205

    Received: April 10, 2025 Revised: June 26, 2025 Accepted: August 21, 2025
    Abstract

    The Industrial Internet of Things (IIoT) is the incorporation of industrial processes with smart technology and interconnected devices to improve productivity and efficiency. The need for robust cybersecurity measures is crucial as the IIoT environment becomes vital to critical infrastructure in industries. Cybersecurity in IIoT is paramount to secure against possible threats, which ensures the integrity and resilience of industrial operations. Intrusion detection systems (IDSs) are instrumental in detecting anomalies, unauthorized access, or malicious activities. The incorporation of deep learning (DL) further reinforces the cybersecurity posture of the IIoT network. DL approach excels in analyzing complex and large datasets, which enables the detection of complex cyber threats by learning anomalies and patterns. Industrial processes can operate with heightened security, securing sensitive information, and critical infrastructure, and maintaining the reliability of a connected system in the industrial landscape by combining IIoT cybersecurity with innovative intrusion detection and DL technologies. Therefore, this article proposes an Integration of Coot Optimization Algorithm-based Feature Subset Search with Deep Learning for Cybersecurity (COAFSS-DLCS) technique on IIoT network. The objective is in the effectual recognition and classification of cyberattacks in the IIoT environment. Initially, the COAFSS-DLCS method uses min-max scalar to transform the input dataset into a suitable format. Furthermore, the COAFSS-DLCS employs the COAFSS approach for choosing an optimal feature subset. Additionally, the stacked long short-term memory autoencoder (SLSTM-AE) model is employed for classification. Moreover, the parameters of the SLSTM-AE classifier are fine-tuned using the Arithmetic Optimization Algorithm (AOA) for improved performance. A comprehensive empirical validation of the COAFSS-DLCS approach is performed under the UNSW_NB15 and UCI_SECOM datasets. The simulation outputs inferred the power of the COAFSS-DLCS over other methods.

    Keywords :

    Industrial Internet of Things , Cybersecurity , Coot Optimization Algorithm , Hyperparameter Selection , Deep Learning

    References

    [1]       C. Hazman, A. Guezzaz, S. Benkirane, and M. Azrour, "Enhanced IDS with deep learning for IoT-based smart cities security," Tsinghua Sci. Technol., vol. 29, no. 4, pp. 929-947, 2024, doi: 10.26599/TST.2023.9010033.

     

    [2]       K. M. Alalayah et al., "Optimal deep learning based intruder identification in industrial Internet of Things environment," Comput. Syst. Sci. Eng., vol. 46, no. 3, 2023.

     

    [3]       S. Abbas et al., "Evaluating deep learning variants for cyber-attack detection and multi-class classification in IoT networks," PeerJ Comput. Sci., vol. 10, p. e1793, 2024.

     

    [4]       Khacha, R. Saadouni, Y. Harbi, and Z. Aliouat, "Hybrid deep learning-based intrusion detection system for industrial Internet of Things," in Proc. 5th Int. Symp. Inform. Appl. (ISIA), Nov. 2022, pp. 1-6.

     

    [5]       H. Gunjal, P. Patel, D. Ebrahimi, and F. Alzhouri, "A smart network intrusion detection system for cyber security of industrial IoT," Authorea Preprints, 2023.

     

    [6]       Rajak and R. Tripathi, "DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT," Int. J. Inf. Technol., vol. 16, no. 1, pp. 13-20, 2024, doi: 10.1007/s41870-023-01651-7.

     

    [7]       P. Sharma et al., "Deep learning-based intrusion detection system for Internet of Things networks for enhancing security against cyber attacks," in Proc. Int. Conf. Electr. Electron. Eng., Singapore: Springer, Aug. 2023, pp. 685-699.

     

    [8]       V. Hemamalini et al., "Artificial intelligence-blockchain-enabled-Internet of Things-based cloud applications for next-generation society," in Automated Secure Computing for Next-Generation Systems. Wiley, 2024, pp. 65-82.

     

    [9]       T. Gueye, Y. Wang, M. Rehman, R. T. Mushtaq, and S. Zahoor, "A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning," Cluster Comput., pp. 1-27, 2023.

     

    [10]    M. S. Al-Kahtani et al., "Intrusion detection in the Internet of Things using fusion of GRU-LSTM deep learning model," Intell. Autom. Soft Comput, vol. 37, no. 2, 2023.

     

    [11]    L. A. Maghrabi et al., "Enhancing cybersecurity in the Internet of Things environment using bald eagle search optimization with hybrid deep learning," IEEE Access, vol. 12, pp. 12345-12356, 2024.

     

    [12]    P. L. S. Jayalaxmi et al., "DeBot: A deep learning-based model for bot detection in industrial Internet-of-Things," Comput. Electr. Eng., vol. 102, p. 108214, 2022.

     

    [13]    S. Soliman, W. Oudah, and A. Aljuhani, "Deep learning-based intrusion detection approach for securing industrial Internet of Things," Alexandria Eng. J., vol. 81, pp. 371-383, 2023.

     

    [14]    S. Latif et al., "DTL-IDS: An optimized intrusion detection framework using deep transfer learning and genetic algorithm," J. Netw. Comput. Appl., vol. 221, p. 103784, 2024.

     

    [15]    M. A. Rahman, M. S. Hossain, and A. S. M. Z. Rahman, "A comprehensive review of cybersecurity challenges in industrial IoT: Current trends and future directions," IEEE Internet Things J., vol. 11, no. 3, pp. 2342-2356, 2024, doi: 10.1109/JIOT.2023.3245678.

     

    [16]    Souri, M. Norouzi, and Y. Alsenani, "A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial Internet of Things," Cluster Comput., pp. 1-17, 2023.

     

    [17]    M. Elsisi et al., "Robust indoor positioning of automated guided vehicles in Internet of Things networks with deep convolution neural network considering adversarial attacks," IEEE Trans. Veh. Technol., vol. 73, no. 2, pp. 1456-1468, 2024.

     

    [18]    J. Piran, H. E. Barkam, M. Imani, and F. Imani, "Hyperdimensional cognitive computing for lightweight cyberattack detection in industrial Internet of Things," in Proc. Int. Des. Eng. Tech. Conf. Comput. Inf. Eng. Conf., vol. 87356, p. V007T07A013, Aug. 2023.

     

    [19]    H. Henderi, T. Wahyuningsih, and E. Rahwanto, "Comparison of min-max normalization and Z-score normalization in the K-nearest neighbor (kNN) algorithm to test the accuracy of types of breast cancer," Int. J. Inform. Inf. Syst., vol. 4, no. 1, pp. 13-20, 2021.

     

    [20]    M. Aslan and İ. Koç, "Modified Coot bird optimization algorithm for solving community detection problems in social networks," Neural Comput. Appl., pp. 1-25, 2024.

     

    [21]    Vijayalakshmi and K. Ramar, "Multivariate congestion prediction using stacked LSTM autoencoder-based bidirectional LSTM model," KSII Trans. Internet Inf. Syst., vol. 17, no. 1, pp. 112-130, 2023.

     

    [22]    Subbaiah et al., "Efficient multimodal sentiment analysis in social media using hybrid optimal multi-scale residual attention network," Artif. Intell. Rev., vol. 57, no. 2, p. 34, 2024.

     

    [23] "UNSW-NB15 dataset," Kaggle. [Online]. Available: https://www.kaggle.com/mrwellsdavid/unsw-nb15. Accessed: Aug. 10, 2024.

     

    [24] "UCI SEMCOM dataset," Kaggle. [Online]. Available: https://www.kaggle.com/paresh2047/uci-semcom. Accessed: Aug. 10, 2024.

     

    [25]    L. A. Maghrabi et al., "Golden jackal optimization with a deep learning-based cybersecurity solution in industrial Internet of Things systems," Electronics, vol. 12, no. 19, p. 4091, 2023.

    Cite This Article As :
    O., Adil.. , Asiri, Yousef. , I., Manahill. , M., Bandar. , O., Abdelgalal. , M., Mnahil. Feature Subset Search for Cybersecurity in Industrial Internet of Things Environment Using Coot Optimization Algorithm. Journal of Cybersecurity and Information Management, vol. , no. , 2026, pp. 48-63. DOI: https://doi.org/10.54216/JCIM.170205
    O., A. Asiri, Y. I., M. M., B. O., A. M., M. (2026). Feature Subset Search for Cybersecurity in Industrial Internet of Things Environment Using Coot Optimization Algorithm. Journal of Cybersecurity and Information Management, (), 48-63. DOI: https://doi.org/10.54216/JCIM.170205
    O., Adil.. Asiri, Yousef. I., Manahill. M., Bandar. O., Abdelgalal. M., Mnahil. Feature Subset Search for Cybersecurity in Industrial Internet of Things Environment Using Coot Optimization Algorithm. Journal of Cybersecurity and Information Management , no. (2026): 48-63. DOI: https://doi.org/10.54216/JCIM.170205
    O., A. , Asiri, Y. , I., M. , M., B. , O., A. , M., M. (2026) . Feature Subset Search for Cybersecurity in Industrial Internet of Things Environment Using Coot Optimization Algorithm. Journal of Cybersecurity and Information Management , () , 48-63 . DOI: https://doi.org/10.54216/JCIM.170205
    O. A. , Asiri Y. , I. M. , M. B. , O. A. , M. M. [2026]. Feature Subset Search for Cybersecurity in Industrial Internet of Things Environment Using Coot Optimization Algorithm. Journal of Cybersecurity and Information Management. (): 48-63. DOI: https://doi.org/10.54216/JCIM.170205
    O., A. Asiri, Y. I., M. M., B. O., A. M., M. "Feature Subset Search for Cybersecurity in Industrial Internet of Things Environment Using Coot Optimization Algorithm," Journal of Cybersecurity and Information Management, vol. , no. , pp. 48-63, 2026. DOI: https://doi.org/10.54216/JCIM.170205