Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 15 , Issue 2 , PP: 76-90, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Ensemble of Machine Learning Model with Tuna Swarm Optimization-Driven Feature Selection for Cybersecurity Threat Detection and Classification Approach

K. Anitha 1 * , K. Rajiv Gandhi 2 *

  • 1 Research Scholar, Department of Computer Applications, Alagappa University, Karaikudi, 630003, Tamilnadu, India - (anitha.kalimuthu@gmail.com)
  • 2 Assistant Professor, Department of Computer Science , Government Arts and Science College For Women, Paramakudi, 623707, Tamilnadu, India - (dr.krajiv84@gmail.com)
  • Doi: https://doi.org/10.54216/JISIoT.150206

    Received: September 28, 2024 Revised: November 25, 2024 Accepted: January 14, 2025
    Abstract

    The initial identification of cybersecurity events like attacks is challenging provided the continuously growing threat environment. Despite state-of-the-art surveillance, advanced attackers can apply for more than 100 days in a system before being detected. Guaranteeing cyber security is a composite task that depends on area of interest and needs cognitive capabilities to control possible threats from larger quantities of network data. The most important task of a cyber-security analyst is to safeguard a network from damage. Numerous technological developments in network and information security have enabled progressive monitoring and threat detection for the predictors, but the responsibilities they carried out could not be automated completely. Hence, in recent times’ Artificial intelligence (AI), mainly deep learning (DL) and machine learning (ML) algorithms, has been utilized to expand a beneficial data-driven intrusion detection system (IDS). Many standard ML classification methods provide intelligent facilities in the area of cyber-security, mainly for intrusion detection. This study develops a Tuna Swarm Optimization-Driven Feature Selection with Ensemble of Machine Learning Models for Cybersecurity Threat Detection and Classification (TSOFSEML-CTDC) technique. The proposed TSOFSEML-CTDC model concentrates on detecting and classifying intrusions on the network. Initially, the TSOFSEML-CTDC algorithm performs data preprocessing using min-max normalization to convert an input data into a beneficial format. Then, the feature selection process has been carried out using tuna swarm optimization (TSO) algorithm. For the classification of intrusion detection, ensemble of ML techniques was employed such as support vector regression (SVR) approach, least-square support vector machines (LSSVM) method, and modified extreme learning machine (MELM) technique.  At last, the hyperactive parameter optimization process is executed by using the coati optimization algorithm (COA). The experimental evaluation of the TSOFSEML-CTDC model occurs using a benchmark dataset. The stimulated results emphasized the enhanced performance of the TSOFSEML-CTDC method compared to existing approaches.

    Keywords :

    Tuna Swarm Optimization , Ensemble of Machine Learning , Cybersecurity Threat Detection , Coati Optimization Algorithm , Data Preprocessing

    References

    [1] O. Y. Al-Jarrah, C. Maple, M. Dianati, D. Oxtoby, and A. Mouzakitis, "Intrusion detection systems for intra-vehicle networks: A review," IEEE Access, vol. 7, pp. 21266–21289, 2019.

    [2] L. Yang, A. Moubayed, and A. Shami, "MTH-IDS: A multitiered hybrid intrusion detection system for Internet of Vehicles," IEEE Internet of Things Journal, vol. 9, pp. 616–632, 2021.

    [3] W. Wu, R. Li, G. Xie, J. An, Y. Bai, J. Zhou, and K. Li, "A survey of intrusion detection for in-vehicle networks," IEEE Transactions on Intelligent Transportation Systems, vol. 21, pp. 919–933, 2019.

    [4] K. Agrawal, T. Alladi, A. Agrawal, V. Chamola, and A. Benslimane, "NovelADS: A novel anomaly detection system for intra-vehicular networks," IEEE Transactions on Intelligent Transportation Systems, vol. 23, pp. 22596–22606, 2022.

    [5] A. Goyal, S. Mishra, and V. K. Chaurasiya, "Intrusion detection in wireless sensor networks using deep learning," in Proc. 4th Int. Conf. Emerging Technologies (INCET), Belgaum, India, May 2023, pp. 1–13.

    [6] P. Muragod and V. Reddy, "Animal intrusion detection using various deep learning models," in Proc. IEEE North Karnataka Subsection Flagship Int. Conf. (NKCon), Vijaypur, India, Nov. 2022, pp. 1–12.

    [7] A. Alotaibi and M. A. Rassam, "Enhancing the sustainability of deep learning-based network intrusion detection classifiers against adversarial attacks," Sustainability, 2022.

    [8] J. Khan, D.-W. Lim, and Y.-S. Kim, "Intrusion detection system CANBus in-vehicle networks based on the statistical characteristics of attacks," Sensors, vol. 23, no. 8, p. 3554, 2023.

    [9] A. A. Alsulami, Q. Abu Al-Haija, A. Alqahtani, and R. Alsini, "Symmetrical simulation scheme for anomaly detection in autonomous vehicles based on LSTM model," Symmetry, vol. 14, no. 8, p. 1450, 2022.

    [10] A. Maseleno, "Design of optimal machine learning-based cybersecurity intrusion detection systems," Journal of Cybersecurity and Information Management, vol. 4, pp. 32–43, 2019.

    [11] A. Tedyyana, O. Ghazali, and O. Purbo, "Model design of intrusion detection system on web server using machine learning based," in Proc. 11th Int. Applied Business and Engineering Conf. (ABEC), Bengkalis, Indonesia, Sep. 2023.

    [12] Y. Han, Y. Wang, Y. Cao, Z. Geng, and Q. Zhu, "A novel wrapped feature selection framework for developing power system intrusion detection based on machine learning methods," IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2023.

    [13] A. V. Turukmane and R. Devendiran, "M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning," Computers & Security, vol. 137, p. 103587, 2024.

    [14] B. R. Chirra, "Advancing cyber defense: Machine learning techniques for next-generation intrusion detection," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 14, no. 1, pp. 550–573, 2023.

    [15] M. E. Manaa, S. M. Hussain, S. A. Alasadi, and H. A. Al-Khamees, "DDoS attacks detection based on machine learning algorithms in IoT environments," Inteligencia Artificial, vol. 27, no. 74, pp. 152–165, 2024.

    [16] H. Attou, A. Guezzaz, S. Benkirane, M. Azrour, and Y. Farhaoui, "Cloud-based intrusion detection approach using machine learning techniques," Big Data Mining and Analytics, vol. 6, no. 3, pp. 311–320, 2023.

    [17] Y. Brinkley, D. Thompson, and N. Simmons, "Machine learning-based intrusion detection for zero-day ransomware in unseen data," 2024.

    [18] M. S. Yadav and R. Kalpana, "Data preprocessing for intrusion detection system using encoding and normalization approaches," in Proc. 11th Int. Conf. Advanced Computing (ICoAC), Dec. 2019, pp. 265–269.

    [19] W. Li and R. K. Pandit, "Data-centric predictive control with tuna swarm optimization-backpropagation neural networks for enhanced wind turbine performance," Renewable Energy, vol. 215, p. 121821, 2024.

    [20] N. Alidadi and S. Pezeshk, "State of the art: Application of machine learning in ground motion modeling," SSRN, 2024. [Online]. Available: https://ssrn.com/abstract=5002073.

    [21] P. Manfredi and R. Trinchero, "Nonparametric formulation of polynomial chaos expansion based on least-square support-vector machines," Engineering Applications of Artificial Intelligence, vol. 133, p. 108182, 2024.

    [22] V. A. A. Daniel, K. Vijayalakshmi, P. P. Pawar, D. Kumar, A. Bhuvanesh, and A. J. Christilda, "Enhanced affinity propagation clustering with a modified extreme learning machine for segmentation and classification of hyperspectral imaging," e-Prime–Advances in Electrical Engineering, Electronics and Energy, vol. 9, p. 100704, 2024.

    [23] Y. Lv et al., "Rock dynamic strength prediction in cold regions using optimized hybrid algorithmic models," Geomechanics and Geophysics for Geo-Energy and Geo-Resources, vol. 10, no. 1, pp. 1–29, 2024.

    [24] Kaggle, "Network intrusion dataset." [Online]. Available: https://www.kaggle.com/datasets/ chethuhn/ network-intrusion-dataset.

    [25] N. Moustafa, "A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets," Sustainable Cities and Society, vol. 72, Sep. 2021, Art. no. 102994.

    [26] C. Park, J. Lee, Y. Kim, J. G. Park, H. Kim, and D. Hong, "An enhanced AI-based network intrusion detection system using generative adversarial networks," IEEE Internet of Things Journal, vol. 10, no. 3, pp. 2330–2345, 2022.

    [27] F. S. Alrayes et al., "Optimizing security protocol: A synergy of bio-inspired planet optimization algorithm with ensemble learning-based attack detection for connected and autonomous vehicles," IEEE Access, 2024.

     

    [28] R. Y. Aburasain, "Enhanced Black Widow Optimization with hybrid deep learning-enabled intrusion detection in Internet of Things-based smart farming," IEEE Access, 2024.

    Cite This Article As :
    Anitha, K.. , Rajiv, K.. Ensemble of Machine Learning Model with Tuna Swarm Optimization-Driven Feature Selection for Cybersecurity Threat Detection and Classification Approach. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2025, pp. 76-90. DOI: https://doi.org/10.54216/JISIoT.150206
    Anitha, K. Rajiv, K. (2025). Ensemble of Machine Learning Model with Tuna Swarm Optimization-Driven Feature Selection for Cybersecurity Threat Detection and Classification Approach. Journal of Intelligent Systems and Internet of Things, (), 76-90. DOI: https://doi.org/10.54216/JISIoT.150206
    Anitha, K.. Rajiv, K.. Ensemble of Machine Learning Model with Tuna Swarm Optimization-Driven Feature Selection for Cybersecurity Threat Detection and Classification Approach. Journal of Intelligent Systems and Internet of Things , no. (2025): 76-90. DOI: https://doi.org/10.54216/JISIoT.150206
    Anitha, K. , Rajiv, K. (2025) . Ensemble of Machine Learning Model with Tuna Swarm Optimization-Driven Feature Selection for Cybersecurity Threat Detection and Classification Approach. Journal of Intelligent Systems and Internet of Things , () , 76-90 . DOI: https://doi.org/10.54216/JISIoT.150206
    Anitha K. , Rajiv K. [2025]. Ensemble of Machine Learning Model with Tuna Swarm Optimization-Driven Feature Selection for Cybersecurity Threat Detection and Classification Approach. Journal of Intelligent Systems and Internet of Things. (): 76-90. DOI: https://doi.org/10.54216/JISIoT.150206
    Anitha, K. Rajiv, K. "Ensemble of Machine Learning Model with Tuna Swarm Optimization-Driven Feature Selection for Cybersecurity Threat Detection and Classification Approach," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 76-90, 2025. DOI: https://doi.org/10.54216/JISIoT.150206