Development and Evaluation of Anomaly-Based IDS model for IoT with Hybrid ML Algorithms
Nabeel Abdulrazaq Yaseen , University of Misan, IraqAbstract
Background: The rapidly expanding concept, the Internet of Things (IoT), connects a large number of devices to the internet for effective real-time data sharing and communication. But as IoT technology advances, new security risks also arise, and for this reason, machine learning (ML)-based intrusion detection systems (IDS), particularly anomaly-based ones, have emerged as a crucial defence against these new dangers to IoT networks.
Objective: The primary goal of this study is to develop and assess anomaly-based IDS based on ML techniques for use in Internet of Things environments. The goal is to improve the models' performance in terms of accuracy and usefulness.
Methods: The first phase of the study is a thorough review of the recent studies in the field to support the model design. The steps of the experimental stage include data preprocessing, encoding, and normalization. Data balancing was achieved using the SMOTEENN technique. The experiments and validation studies were performed on the UNSW-NB15 dataset. The employed ML algorithms for the study include DT, DNN, RF, XGBoost, and KNN, and the performance was in terms of precision, recall, accuracy, and F1-score.
Results: XGBoost recorded the best detection accuracy (96.37%), followed by RF and DNN. The models were evaluated on both normal and attack traffic, and the suggested model outperformed many existing approaches in recent literature.
Conclusion: The experimental findings confirm the suitability of hybrid and ensemble ML models in improving intrusion detection performance in IoT systems. Future research should consider integrating real-time datasets and combining deep learning with ensemble methods to develop more robust and adaptive models.
Keywords
IoTs, IDS, Machine Learning, Anomaly Detection, SMOTEENN
References
Bajaber, F., Adaptive Density Control Based on Random Sensing Range for Energy Efficiency in IoT Sensor Networks. Pertanika Journal of Science Technology, 2023. 31(4).
Javadi, A., et al., Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications. Internet of Things, 2025: p. 101499.
Singh, S., et al., Analysis of Soil Viability Monitoring System for In-House Plantation Growth Using an Internet of Things Approach. Pertanika Journal of Science Technology, 2024. 32(6).
Altulaihan, E., M.A. Almaiah, and A. Aljughaiman, Anomaly detection IDS for detecting DoS attacks in IoT networks based on machine learning algorithms. Sensors, 2024. 24(2): p. 713.
Al-Majdi, K., et al., MLCM: An efficient image encryption technique for IoT application based on multi-layer chaotic maps. International Journal of Nonlinear Analysis Applications, 2022. 13(2): p. 1591-1615.
Li, C., et al., A review of IoT applications in healthcare. Neurocomputing, 2024. 565: p. 127017.
Hmissi, F. and S. Ouni. A review of application protocol enhancements for Internet of things. in UBICOMM 2021: The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies. 2021.
Mishra, N. and S. Pandya, Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access, 2021. 9: p. 59353-59377.
Hajiheidari, S., et al., Intrusion detection systems in the Internet of things: A comprehensive investigation. Computer Networks, 2019. 160: p. 165-191.
Yaseen, N.A., A.A.-A. Hadad, and M.S. Taha. An anomaly detection model using principal component analysis technique for medical wireless sensor networks. in 2021 International Conference on Data Science and Its Applications (ICoDSA). 2021. IEEE.
Heidari, A. and M.A. Jabraeil Jamali, Internet of Things intrusion detection systems: a comprehensive review and future directions. Cluster Computing, 2023. 26(6): p. 3753-3780.
Asharf, J., et al., A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions. Electronics, 2020. 9(7): p. 1177.
Li, J., et al., Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning. Journal of Big Datas, 2024. 11(1): p. 36.
Mendialdua, I., et al., Classifier Subset Selection to construct multi-classifiers by means of estimation of distribution algorithms. Neurocomputing, 2015. 157: p. 46-60.
Choobdar, P., M. Naderan, and M. Naderan, Detection and multi-class classification of intrusion in software defined networks using stacked auto-encoders and CICIDS2017 dataset. Wireless Personal Communications, 2022. 123(1): p. 437-471.
Hadad, A.A.-A., et al., A robust color image watermarking scheme based on discrete wavelet transform domain and discrete slantlet transform technique. Ingenierie des Systemes d'Information, 2022. 27(2): p. 313.
Rahman, R.U. and D.S. Tomar, Security attacks on wireless networks and their detection techniques, in Emerging wireless communication and network technologies: principle, paradigm and performance. 2018, Springer. p. 241-270.
Diro, A., et al., Anomaly detection for space information networks: A survey of challenges, techniques, and future directions. Computers Security, 2024. 139: p. 103705.
Alsoufi, M.A., et al., Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review. Applied sciences, 2021. 11(18): p. 8383.
Martins, I., et al., Host-based IDS: A review and open issues of an anomaly detection system in IoT. Future Generation Computer Systems, 2022. 133: p. 95-113.
Saba, T., et al., Anomaly-based intrusion detection system for IoT networks through deep learning model. Computers Electrical Engineering, 2022. 99: p. 107810.
Natarajan, Y., et al., Enhancing building energy efficiency with iot-driven hybrid deep learning models for accurate energy consumption prediction. Sustainability, 2024. 16(5): p. 1925.
Kasongo, S.M. and Y. Sun, A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE access, 2019. 7: p. 38597-38607.
Bae, G., et al. Autoencoder-based on anomaly detection with intrusion scoring for smart factory environments. in International conference on parallel and distributed computing: Applications and technologies. 2018. Springer.
Ferrag, M.A., et al., Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security Applications, 2020. 50: p. 102419.
Sharma, B., et al., Anomaly based network intrusion detection for IoT attacks using deep learning technique. Computers Electrical Engineering, 2023. 107: p. 108626.
Thamilarasu, G. and S. Chawla, Towards deep-learning-driven intrusion detection for the internet of things. Sensors, 2019. 19(9): p. 1977.
Ge, M., et al., Towards a deep learning-driven intrusion detection approach for Internet of Things. Computer Networks, 2021. 186: p. 107784.
Nagisetty, A. and G.P. Gupta. Framework for detection of malicious activities in IoT networks using keras deep learning library. in 2019 3rd international conference on computing methodologies and communication (ICCMC). 2019. IEEE.
Sharma, B., et al., Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach. Expert Systems with Applications, 2024. 238: p. 121751.
Qiu, H., et al., Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet of Things Journal, 2020. 8(13): p. 10327-10335.
Zhao, F., et al., Application of deep learning-based intrusion detection system (IDS) in network anomaly traffic detection. 2024.
Sun, P., et al., DL‐IDS: Extracting Features Using CNN‐LSTM Hybrid Network for Intrusion Detection System. Security communication networks, 2020. 2020(1): p. 8890306.
Aswad, F.M., et al., Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks. Journal of Intelligent Systems, 2023. 32(1): p. 20220155.
Osa, E., P.E. Orukpe, and U. Iruansi, Design and implementation of a deep neural network approach for intrusion detection systems. e-Prime-Advances in Electrical Engineering, Electronics Energy, 2024. 7: p. 100434.
Fenanir, S., F. Semchedine, and A. Baadache, A Machine Learning-Based Lightweight Intrusion Detection System for the Internet of Things. Revue d'Intelligence Artificielle, 2019. 33(3).
Almaiah, M.A., et al., A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS. Sensors, 2022. 22(4): p. 1448.
Siam, A.I., et al., Secure health monitoring communication systems based on IoT and cloud computing for medical emergency applications. Computational Intelligence Neuroscience, 2021. 2021(1): p. 8016525.
Ali, A., et al., An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors, 2022. 22(2): p. 572.
Al Hwaitat, A.K., et al., Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks. International Journal of Advanced Computer Science Applications, 2020. 11(4).
Disha, R.A. and S. Waheed, Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity, 2022. 5(1): p. 1.
Dhal, P. and C. Azad, A comprehensive survey on feature selection in the various fields of machine learning. Applied intelligence, 2022. 52(4): p. 4543-4581.
Zhang, H., et al. Research on network intrusion detection based on SMOTEENN and improved CatBoost algorithm. in Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023). 2023. SPIE.
Meenal, R., et al., Weather prediction using random forest machine learning model. Indonesian Journal of Electrical Engineering Computer Science, 2021. 22(2): p. 1208-1215.
Charbuty, B. and A. Abdulazeez, Classification based on decision tree algorithm for machine learning. Journal of applied science technology trends, 2021. 2(01): p. 20-28.
Uddin, S., et al., Comparative performance analysis of K-nearest neighbour (KNN) algorithm and its different variants for disease prediction. Scientific Reports, 2022. 12(1): p. 6256.
Li, J., et al., Application of XGBoost algorithm in the optimization of pollutant concentration. Atmospheric Research, 2022. 276: p. 106238.
Hussain, H., P. Tamizharasan, and C. Rahul, Design possibilities and challenges of DNN models: a review on the perspective of end devices. Artificial Intelligence Review, 2022. 55(7): p. 5109-5167.
Mazziotta, M. and A. Pareto, Normalization methods for spatio‐temporal analysis of environmental performance: Revisiting the Min–Max method. Environmetrics, 2022. 33(5): p. e2730.
Zhou, Y., et al. Deep learning approach for cyberattack detection. in IEEE infocom 2018-ieee conference on computer communications workshops (INFOCOM WKSHPS). 2018. IEEE.
Article Statistics
Downloads
Copyright License
Copyright (c) 2025 Nabeel Abdulrazaq Yaseen

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.


Applied Sciences
| Open Access |
DOI: