Enhancing IoT intrusion detection with genetic algorithm-optimized convolutional neural networks

被引:0
作者
Hakiki, Racha Ikram [1 ]
Azerine, Abdennour [2 ]
Tlemsani, Redouane [3 ]
Golabi, Mahmoud [2 ]
Idoumghar, Lhassane [2 ]
机构
[1] Univ Sci & Technol Oran Mohamed Boudiaf USTO MB, Dept Elect, LACOSI Lab, BP 1505, Oran 31000, Algeria
[2] Univ Haute Alsace, IRIMAS, UR 7499, F-68100 Mulhouse, France
[3] Univ Sci & Technol Oran Mohamed Boudiaf, Comp Sci Dept, ADASCA Lab, BP 1505, Oran 31000, Algeria
关键词
Intrusion detection; Convolutional neural network; Genetic algorithm; UNSW-NB15; TON_IoT; CICIoT2023; DETECTION SYSTEM; IIOT;
D O I
10.1007/s11227-025-07626-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing complexity and volume of cyberattacks necessitate the development of advanced Intrusion Detection Systems that are capable of efficient and scalable threat detection. As network infrastructures expand exponentially and the proliferation of Internet of Things (IoT) devices, traditional intrusion detection systems face significant challenges in adapting to evolving attack patterns. This paper introduces a novel intrusion detection framework, leveraging Neural Architecture Search to optimize the design of a convolutional neural network (CNN). Specifically, it proposes a system that integrates CNN with genetic algorithm for both synthesizing the neural architecture and systematically optimizing associated hyperparameters. This approach improves model performance by automating the search for the most effective neural architecture. The proposed approach was evaluated on UNSW-NB15, TON_IoT, and CICIoT2023 datasets. Experimental results demonstrate the efficacy and scalability of the method, with 85.7%, 99.93%, and 90.13% classification accuracies, respectively. Moreover, the high classification results on the TON_IoT and CICIoT2023 datasets confirm the approach efficiency and suitability for real-time applications, addressing the practical challenges of securing IoT networks.
引用
收藏
页数:34
相关论文
共 63 条
[1]   Exploring the Full Potentials of IoT for Better Financial Growth and Stability: A Comprehensive Survey [J].
Allioui, Hanane ;
Mourdi, Youssef .
SENSORS, 2023, 23 (19)
[2]   A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System [J].
Almomani, Omar .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01) :409-429
[3]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[4]   Optimizing Cyber Threat Detection in IoT: A Study of Artificial Bee Colony (ABC)-Based Hyperparameter Tuning for Machine Learning [J].
Alsarhan, Ayoub ;
Aljamal, Mahmoud ;
Harfoushi, Osama ;
Aljaidi, Mohammad ;
Barhoush, Malek Mahmoud ;
Mansour, Noureddin ;
Okour, Saif ;
Abu Ghazalah, Sarah ;
Al-Fraihat, Dimah .
TECHNOLOGIES, 2024, 12 (10)
[5]   A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks [J].
Altunay, Hakan Can ;
Albayrak, Zafer .
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2023, 38
[6]  
Avval SSP, 2025, ARTIF INTELL REV, V58, DOI 10.1007/s10462-024-11058-w
[7]  
Awadallah MA, 2025, ARCH COMPUT METHOD E, V32, P995, DOI 10.1007/s11831-024-10178-4
[8]  
Azizjon Meliboev, 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), P218, DOI 10.1109/ICAIIC48513.2020.9064976
[9]  
Bamou A, 2023, International Journal on Advanced Science Engineering and Information Technology, V13, P767, DOI [10.18517/ijaseit.13.2.17573, 10.18517/ijaseit.13.2.17573, DOI 10.18517/IJASEIT.13.2.17573]
[10]   Unknown area exploration for robots with energy constraints using a modified Butterfly Optimization Algorithm [J].
Bendahmane, Amine ;
Tlemsani, Redouane .
SOFT COMPUTING, 2023, 27 (07) :3785-3804