Volume 19 , Issue 2 , PP: 187-193, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Basil Xavier 1 * , Jaspher Willsie Kathrine 2 , Priyadharsini 3 , Gladwin Rufus 4 , R. Venkatesan 5
Doi: https://doi.org/10.54216/FPA.190214
In the context of dynamic and highly diverse IoT (Internet of Things), the nature of threats and the amount of data that needs to be processed by IDSs (Intrusion Detection System) have become much greater and represent considerable problems for modern security systems. This work presents a new method called a Hybrid Deep Learning-Evolutionary Algorithm with an Ensemble Strategy (HDLE-EASE) for improving intrusion detection in IoT systems. Our method combines the spatial feature extraction capability of CNN (Convolutional Neural Networks) and temporal feature extraction of LSTM (Long Short-Term Memory) networks with the optimization feature of GA to optimize model parameters. We further incorporate a composite of boosting-bagging hybrid to enhance the stability and reliability of the intrusion detection mechanism. As privacy and scalability are critical issues in IoT networks, we propose a federated learning approach, allowing for model training on IoT networks while preserving data privacy. Furthermore, the presented approach includes a reinforcement-learning module for the capability of adapting to newly emerge and changing security threats. Initial tests show that the detection accuracy and model optimization capabilities of HDLE-EASE significantly outperform other methods, while its adaptability makes the tool a promising one for developing a holistic solution to protect IoT systems against a wide range of attacks.
Internet of Things (IoT) , Intrusion Detection Systems (IDS) , Convolutional Neural Networks (CNN) , Long Short-Term Memory (LSTM) , Genetic Algorithms (GA) , Ensemble Learning , Federated Learning , Reinforcement Learning , Cybersecurity
[1] M. Elrawy, A. Awad, and H. Hamed, “Intrusion detection systems for IoT-based smart environments: a survey,” J. Cloud Comput., vol. 7, no. 21, 2018. [Online]. Available: https://doi.org/10.1186/s13677-018-0123-6
[2] F. Khraisat and A. Alazab, “A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges,” Cybersecur., vol. 4, no. 18, 2021. [Online]. Available: https://doi.org/10.1186/s42400-021-00077-7
[3] P. Podder et al., “Artificial Neural Network for Cybersecurity: A Comprehensive Review,” J. Inf. Assur. Secur., 2021. ISSN: 1554-1010.
[4] F. Arslan et al., “Anomaly Detection in Time Series: Current Focus and Future Challenges,” in Advances in Intelligent Systems and Computing, V. K. Parimala, Ed., IntechOpen, 2023. [Online]. Available: https://doi.org/10.5772/intechopen.111886
[5] D. Sarkar, N. Mishra, and A. Biswas, “Genetic Algorithm-Based Deep Learning Models: A Design Perspective,” in Proc. Seventh Int. Conf. Math. Comput, Springer, vol. 1412, Adv. Intell. Syst. Comput., 2022.
[6] D. Shulman, “Optimization Methods in Deep Learning: A Comprehensive Overview,” 2023, arXiv: 2302.09566 [cs.LG]. [Online]. Available: https://doi.org/10.48550/arXiv.2302.09566
[7] M. Achouch et al., “On Predictive Maintenance in Industry 4.0: Overview, Models, and Challenges,” Appl. Sci., vol. 12, no. 16, art. no. 8081, 2022. [Online]. Available: https://doi.org/10.3390/app12168081
[8] R. Ahmad, I. Alsmadi, and M. Al-Ramahi, “Optimization of deep learning models: benchmark and analysis,” Adv. Comput. Intell., vol. 3, no. 7, 2023. [Online]. Available: https://doi.org/10.1007/s43674-023-00055-1
[9] Y. Ren et al., “Genetic-algorithm-based deep neural networks for highly efficient photonic device design,” Photon. Res., vol. 9, pp. B247–B252, 2021.
[10] R. Dewan et al., “IoT-based energy efficient and longer lifetime compression approach for healthcare applications,” Trans. Emerg. Telecommun. Technol., 2024. [Online]. Available: https://doi.org/10.1002/ett.4843
[11] K. P. Jadhav, T. Arjariya, and M. Gangwar, “Hybrid-IDS: An Approach for Intrusion Detection System with Hybrid Feature Extraction Technique Using Supervised Machine Learning,” Int. J. Intell. Syst. Appl. Eng., vol. 11, no. 5s, pp. 591–597, 2023. [Online]. Available: https://ijisae.org/index.php/IJISAE/article/view/2820
[12] H. Odeh and A. Abu Taleb, “Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection,” Appl. Sci., vol. 13, no. 21, art. no. 11985, 2023. [Online]. Available: https://doi.org/10.3390/app132111985
[13] U. Kumar et al., “Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network,” Wireless Pers. Commun., vol. 129, pp. 783–812, 2023. [Online]. Available: https://doi.org/10.1007/s11277-022-10155-9
[14] M. Shahin et al., “A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems,” Int. J. Adv. Manuf. Technol., vol. 123, pp. 2017–2029, 2022.