Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Volume 19 , Issue 2 , PP: 187-193, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Enhancing IoT Intrusion Detection with a Hybrid Deep Learning-Evolutionary Algorithm: An Ensemble Strategy Approach

Basil Xavier 1 * , Jaspher Willsie Kathrine 2 , Priyadharsini 3 , Gladwin Rufus 4 , R. Venkatesan 5

  • 1 Karunya Institute of Technology and Sciences , Coimbatore, India - (basilxavier@karunya.edu)
  • 2 Karunya Institute of Technology and Sciences , Coimbatore, India - (Karthrine@karunya.edu)
  • 3 Karunya Institute of Technology and Sciences , Coimbatore, India - (priyadharsini@karunya.edu)
  • 4 Karunya Institute of Technology and Sciences , Coimbatore, India - (gladwinrufus@karunya.edu.in)
  • 5 Karunya Institute of Technology and Sciences , Coimbatore, India - (venkat.ishva@gmail.com)
  • Doi: https://doi.org/10.54216/FPA.190214

    Received: December 09, 2024 Revised: February 04, 2025 Accepted: March 02, 2025
    Abstract

    In the context of dynamic and highly diverse IoT (Internet of Things), the nature of threats and the amount of data that needs to be processed by IDSs (Intrusion Detection System) have become much greater and represent considerable problems for modern security systems. This work presents a new method called a Hybrid Deep Learning-Evolutionary Algorithm with an Ensemble Strategy (HDLE-EASE) for improving intrusion detection in IoT systems. Our method combines the spatial feature extraction capability of CNN (Convolutional Neural Networks) and temporal feature extraction of LSTM (Long Short-Term Memory) networks with the optimization feature of GA to optimize model parameters. We further incorporate a composite of boosting-bagging hybrid to enhance the stability and reliability of the intrusion detection mechanism. As privacy and scalability are critical issues in IoT networks, we propose a federated learning approach, allowing for model training on IoT networks while preserving data privacy. Furthermore, the presented approach includes a reinforcement-learning module for the capability of adapting to newly emerge and changing security threats. Initial tests show that the detection accuracy and model optimization capabilities of HDLE-EASE significantly outperform other methods, while its adaptability makes the tool a promising one for developing a holistic solution to protect IoT systems against a wide range of attacks.

    Keywords :

    Internet of Things (IoT) , Intrusion Detection Systems (IDS) , Convolutional Neural Networks (CNN) , Long Short-Term Memory (LSTM) , Genetic Algorithms (GA) , Ensemble Learning , Federated Learning , Reinforcement Learning , Cybersecurity

    References

    [1] M. Elrawy, A. Awad, and H. Hamed, “Intrusion detection systems for IoT-based smart environments: a survey,” J. Cloud Comput., vol. 7, no. 21, 2018. [Online]. Available: https://doi.org/10.1186/s13677-018-0123-6

    [2] F. Khraisat and A. Alazab, “A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges,” Cybersecur., vol. 4, no. 18, 2021. [Online]. Available: https://doi.org/10.1186/s42400-021-00077-7

    [3] P. Podder et al., “Artificial Neural Network for Cybersecurity: A Comprehensive Review,” J. Inf. Assur. Secur., 2021. ISSN: 1554-1010.

    [4] F. Arslan et al., “Anomaly Detection in Time Series: Current Focus and Future Challenges,” in Advances in Intelligent Systems and Computing, V. K. Parimala, Ed., IntechOpen, 2023. [Online]. Available: https://doi.org/10.5772/intechopen.111886

    [5] D. Sarkar, N. Mishra, and A. Biswas, “Genetic Algorithm-Based Deep Learning Models: A Design Perspective,” in Proc. Seventh Int. Conf. Math. Comput, Springer, vol. 1412, Adv. Intell. Syst. Comput., 2022.

    [6] D. Shulman, “Optimization Methods in Deep Learning: A Comprehensive Overview,” 2023, arXiv: 2302.09566 [cs.LG]. [Online]. Available: https://doi.org/10.48550/arXiv.2302.09566

    [7] M. Achouch et al., “On Predictive Maintenance in Industry 4.0: Overview, Models, and Challenges,” Appl. Sci., vol. 12, no. 16, art. no. 8081, 2022. [Online]. Available: https://doi.org/10.3390/app12168081

    [8] R. Ahmad, I. Alsmadi, and M. Al-Ramahi, “Optimization of deep learning models: benchmark and analysis,” Adv. Comput. Intell., vol. 3, no. 7, 2023. [Online]. Available: https://doi.org/10.1007/s43674-023-00055-1

    [9] Y. Ren et al., “Genetic-algorithm-based deep neural networks for highly efficient photonic device design,” Photon. Res., vol. 9, pp. B247–B252, 2021.

    [10] R. Dewan et al., “IoT-based energy efficient and longer lifetime compression approach for healthcare applications,” Trans. Emerg. Telecommun. Technol., 2024. [Online]. Available: https://doi.org/10.1002/ett.4843

    [11] K. P. Jadhav, T. Arjariya, and M. Gangwar, “Hybrid-IDS: An Approach for Intrusion Detection System with Hybrid Feature Extraction Technique Using Supervised Machine Learning,” Int. J. Intell. Syst. Appl. Eng., vol. 11, no. 5s, pp. 591–597, 2023. [Online]. Available: https://ijisae.org/index.php/IJISAE/article/view/2820

    [12] H. Odeh and A. Abu Taleb, “Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection,” Appl. Sci., vol. 13, no. 21, art. no. 11985, 2023. [Online]. Available: https://doi.org/10.3390/app132111985

    [13] U. Kumar et al., “Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network,” Wireless Pers. Commun., vol. 129, pp. 783–812, 2023. [Online]. Available: https://doi.org/10.1007/s11277-022-10155-9

    [14] M. Shahin et al., “A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems,” Int. J. Adv. Manuf. Technol., vol. 123, pp. 2017–2029, 2022.

    Cite This Article As :
    Xavier, Basil. , Willsie, Jaspher. , , Priyadharsini. , Rufus, Gladwin. , Venkatesan, R.. Enhancing IoT Intrusion Detection with a Hybrid Deep Learning-Evolutionary Algorithm: An Ensemble Strategy Approach. Fusion: Practice and Applications, vol. , no. , 2025, pp. 187-193. DOI: https://doi.org/10.54216/FPA.190214
    Xavier, B. Willsie, J. , P. Rufus, G. Venkatesan, R. (2025). Enhancing IoT Intrusion Detection with a Hybrid Deep Learning-Evolutionary Algorithm: An Ensemble Strategy Approach. Fusion: Practice and Applications, (), 187-193. DOI: https://doi.org/10.54216/FPA.190214
    Xavier, Basil. Willsie, Jaspher. , Priyadharsini. Rufus, Gladwin. Venkatesan, R.. Enhancing IoT Intrusion Detection with a Hybrid Deep Learning-Evolutionary Algorithm: An Ensemble Strategy Approach. Fusion: Practice and Applications , no. (2025): 187-193. DOI: https://doi.org/10.54216/FPA.190214
    Xavier, B. , Willsie, J. , , P. , Rufus, G. , Venkatesan, R. (2025) . Enhancing IoT Intrusion Detection with a Hybrid Deep Learning-Evolutionary Algorithm: An Ensemble Strategy Approach. Fusion: Practice and Applications , () , 187-193 . DOI: https://doi.org/10.54216/FPA.190214
    Xavier B. , Willsie J. , P. , Rufus G. , Venkatesan R. [2025]. Enhancing IoT Intrusion Detection with a Hybrid Deep Learning-Evolutionary Algorithm: An Ensemble Strategy Approach. Fusion: Practice and Applications. (): 187-193. DOI: https://doi.org/10.54216/FPA.190214
    Xavier, B. Willsie, J. , P. Rufus, G. Venkatesan, R. "Enhancing IoT Intrusion Detection with a Hybrid Deep Learning-Evolutionary Algorithm: An Ensemble Strategy Approach," Fusion: Practice and Applications, vol. , no. , pp. 187-193, 2025. DOI: https://doi.org/10.54216/FPA.190214