Volume 17 , Issue 2 , PP: 64-81, 2026 | Cite this article as | XML | Html | PDF | Full Length Article
Ishwarya K. 1 * , Saraswathı S. 2
Doi: https://doi.org/10.54216/JCIM.170206
Due to the massive data and communication progress, the usage of Internet of Things (IoT) devices has developed significantly. The extensive use of IoT systems heightens the complex interactions among devices and increases the data traffic, generating numerous possibilities for cyber challengers. Therefore, identifying and alleviating cyber-attacks focusing on IoT systems has appeared as an essential obligation in the context of cybersecurity. Academics and enterprises are contemplating means of machine learning (ML) and deep learning (DL) for cyberattack prevention because ML and DL exhibit great potential in numerous domains. Various DL teachings are executed to extract several patterns from multiple annotated datasets. DL is a beneficial tool for identifying cyberattacks. Timely network data detection and segregation become more fundamental than alleviating cyberattacks. Therefore, this paper proposes a novel Brown Bear Optimization method with an Ensemble of Machine Learning-based Cyber Attack Detections (BBOA-EMLCADs) method for secure IoT environment. The main aim of the BBOA-EMLCAD method relies on the automatic classification of the cyber threats in the IoT environment. Initially, the brown bear optimization (BBO) method is utilized for feature selection (FS). Moreover, an ensemble of two ML approaches namely XGBoost and least square support vector machine (LSSVM) are employed for the automatic identification of the cyber-attacks. Lastly, the salp swarm algorithms (SSAs) is implemented for the optimal hyperparameter tuning of the two ML techniques. The simulation validation of the BBOA-EMLCAD approach is performed under the WSN-DS dataset. The comparison assessment of the BBOA-EMLCAD approach portrayed a superior accuracy value of 99.62% over existing models.
Cyber Attack Detection , Brown Bear Optimization , Machine Learning , Hyperparameter Tuning , Internet of Things
[1] Al-Abassi, H. Karimipour, A. Dehghantanha, and R. M. Parizi, "An ensemble deep learning-based cyber-attack detection in industrial control system," IEEE Access, vol. 8, pp. 83965-83973, 2020.
[2] P. Kumar, G. P. Gupta, R. Tripathi, S. Garg, and M. M. Hassan, "DLTIF: Deep Learning-Driven Cyber Threat Intelligence Modeling and Identification Framework in IoT-Enabled Maritime Transportation Systems," IEEE Trans. Intell. Transp. Syst., vol. 24, no. 2, pp. 2472-2481, 2023.
[3] Bibi, A. Akhunzada, and N. Kumar, "Deep AI-powered cyber threat analysis in IIoT," IEEE Internet Things J., vol. 10, no. 9, pp. 7749-7760, 2023.
[4] A. Khan et al., "A new explainable deep learning framework for cyber threat discovery in industrial IoT networks," IEEE Internet Things J., vol. 9, no. 13, pp. 11604-11613, 2021.
[5] H. M. Rouzbahani, H. Karimiphan, and L. Lei, "Multi-layer defense algorithm against deep reinforcement learning-based intruders in smart grids," Int. J. Electr. Power Energy Syst., vol. 146, p. 108798, 2023.
[6] Ullah et al., "Software defined network enabled fog-to-things hybrid deep learning driven cyber threat detection system," Secur. Commun. Netw, vol. 2021, pp. 1-15, 2021.
[7] W. Ding, M. Abdel-Basset, and R. Mohamed, "DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks," Inf. Sci., vol. 634, pp. 157-171, 2023.
[8] K. Rahman et al., "Cognitive lightweight logistic regression-based IDS for IoT-enabled FANET to detect cyberattacks," Mobile Inf. Syst., vol. 2023, 2023.
[9] M. Ebrahimi, J. F. Nunamaker Jr, and H. Chen, "Semi-supervised cyber threat identification in dark net markets: A transductive and deep learning approach," J. Manage. Inf. Syst., vol. 37, no. 3, pp. 694-722, 2020.
[10] M. Al-Hawawreh and E. Sitnikova, "Leveraging deep learning models for ransomware detection in the industrial Internet of Things environment," in Proc. MilCIS, Canberra, ACT, Australia, 2019, pp. 1-6.
[11] S. C. Amirthabai, U. Malhotra, S. T. Rajeswari, and S. T. Natesan, "Concurrency and Computation: Practice and Experience," Concurrency Computat: Pract. Exper., vol. 34, no. 5, p. e6721, 2022.
[12] S. M. Naser, Y. H. Ali, and D. A. J. Obe, "Hybrid cyber-security model for attacks detection based on deep and machine learning," Int. J. Online Biomed. Eng., vol. 18, no. 11, pp. 84-96, 2022.
[13] R. Almajed et al., "Using machine learning algorithm for detection of cyber-attacks in cyber physical systems," Period. Eng. Nat. Sci., vol. 10, no. 3, pp. 261-275, 2022.
[14] S. Krishnasamy et al., "Development and validation of a cyber-physical system leveraging EFDPN for enhanced WSN-IoT network security," Sensors, vol. 23, no. 22, p. 9294, 2023.
[15] S. Ismail, D. Dawoud, and H. Reza, "A lightweight multilayer machine learning detection system for cyber-attacks in WSN," in Proc. IEEE CCWC, Las Vegas, NV, USA, 2022, pp. 481-486.
[16] Surbhi, N. R. Chauhan, and N. Dahiya, "Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT)," Cluster Comput., vol. 28, no. 4, p. 230, 2025.
[17] T. Vaiyapuri et al., "Automated cyberattack detection using optimal ensemble deep learning model," Trans. Emerg. Telecommun. Technol., vol. 35, no. 4, p. e4899, 2024.
[18] H. Alamro et al., "Feature enhancement model with up sampling based cyber threat attack detection and classification on imbalanced dataset in Industrial Internet of Things," Alexandria Eng. J., vol. 128, pp. 247-258, 2025.
[19] N. Alkhafaji, T. Viana, and A. Al-Sherbaz, "Integrated genetic algorithm and deep learning approach for effective cyber-attack detection and classification in Industrial Internet of Things (IIoT) environments," Arab. J. Sci. Eng., pp. 1-25, 2024.
[20] Y. Chen, Y. Guo, Y. Gao, and B. Liu, "A novel lightweight deep learning framework using enhanced pelican optimization for efficient cyberattack detection in the Internet of Things environments," J. Eng. Appl. Sci., vol. 72, no. 1, pp. 1-26, 2025.
[21] H. Alamro et al., "Modelling of Bayesian-based optimized transfer learning model for cyber-attack detection in Internet of Things assisted resource constrained systems," IEEE Access, vol. 12, pp. 12345-12356, 2024.
[22] R. Wani, A. A. Aziz, and R. Raut, "Enhanced detection of cyberattacks in wireless sensor networks and IoT-networks using powerful stacking ensemble," in Proc. ICSSES, 2025, pp. 1-9.
[23] S. Malathi and S. R. Begum, "Enhancing trustworthiness among IoT network nodes with ensemble deep learning-based cyber attack detection," Expert Syst. Appl., vol. 255, p. 124528, 2024.
[24] B. Gupta et al., "A hybrid ant lion optimization algorithm based lightweight deep learning framework for cyber attack detection in IoT environment," Comput. Electr. Eng., vol. 122, p. 109944, 2025.
[25] Alrefaei and M. Ilyas, "Ensemble deep learning model based on multi-class classification technique to detect cyber attacks in IoT environment," in Proc. Int. Conf. Smart Comput., IoT Mach. Learn. (SIML), 2024, pp. 174-179.
[26] S. E. Sorour et al., "Credit card fraud detection using the brown bear optimization algorithm," Alexandria Eng. J., vol. 104, pp. 171-192, 2024.
[27] P. Mani et al., "An efficient real-time vehicle classification from a complex image dataset using eXtreme gradient boosting and the multi-objective genetic algorithm," Processes, vol. 12, no. 6, p. 1251, 2024.
[28] F. A. Zaini et al., "A hybrid model based on LSSVM and the improved BFOA for sustainability of daily electricity load forecasting in Malaysia," Energies, vol. 17, no. 3, p. 567, 2024.
[29] S. E. W. Case, "Salp swarm algorithm application in excitation controllers for power system rotor angle stability enhancement: WSCC case study," IEEE Trans. Power Syst., vol. 38, no. 2, pp. 1234-1245, 2023.
[30] Almomani, M. Al-Kasasbeh, and M. AL-Akhras, "WSN-DS: A dataset for intrusion detection systems in wireless sensor networks," J. Sensors, vol. 2016, pp. 1-16, 2016.
[31] Murugesh and S. Murugan, "Moth search optimizer with deep learning enabled intrusion detection system in wireless sensor networks," SSRG Int. J. Electr. Electron. Eng., vol. 10, no. 4, pp. 77-90, 2023.
[32] G. Liu et al., "An enhanced intrusion detection model based on improved kNN in WSNs," Sensors, vol. 22, no. 4, p. 1407, 2022.
[33] M. Alqahtani et al., "A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks," Sensors, vol. 19, no. 20, p. 4383, 2019.