An Efficient Intrusion Detection System using Dimensionality Reduction with Horse Optimization Based Ensemble Classifier for Internet of Things Devices

International Journal of Electronics and Communication Engineering
© 2026 by SSRG - IJECE Journal
Volume 13 Issue 2
Year of Publication : 2026
Authors : M. Arun, R. Balamurugan, S. Kannan
pdf
How to Cite?

M. Arun, R. Balamurugan, S. Kannan, "An Efficient Intrusion Detection System using Dimensionality Reduction with Horse Optimization Based Ensemble Classifier for Internet of Things Devices," SSRG International Journal of Electronics and Communication Engineering, vol. 13,  no. 2, pp. 254-263, 2026. Crossref, https://doi.org/10.14445/23488549/IJECE-V13I2P119

Abstract:

Cybersecurity has evolved progressively due to the proliferation of the Internet of Things (IoT), since numerous compact, intelligent gadgets transmit vast quantities of data to the Internet. Nevertheless, these systems have numerous defence faults that result from the absence of security tools and support for hardware security, making them vulnerable to cyberattacks. Hence, the growth of IoT devices to deliver security over resistance to threats is a requirement to create an IoT that is secure and effective. Defending these things is very significant for the security of the system. Moreover, it is significant to incorporate the Intrusion Detection System (IDS) with an IoT device. IDS aims to perceive and analyse network traffic from dissimilar sources and detect malicious actions. It is an important fragment of cybersecurity technology. Presently, the Deep Learning (DL)-based system plays a fundamental part in the IDS scheme to detect and classify attacks. This paper develops an Efficient Intrusion Detection System Using Dimensionality Reduction and an Ensemble-based Classification Model (EIDS-DRECM) for Internet of Things Devices. The main intention of the EIDS-DRECM paper is to enhance cybersecurity in IoT networks by developing efficient threat detection and mitigation mechanisms to ensure data integrity, confidentiality, and system resilience. The min-max scaler methodology has been employed initially in the data preprocessing stage by changing and organizing raw data into a suitable format. Followed by, the process of Feature Selection (FS) is executed by the Horse Optimization Algorithm (HOA) to retain the most relevant feature from a dataset. At last, the ensemble models of Graph Convolutional Network (GCN), Temporal Convolutional Network (TCN), and Deep Recurrent Q-Network (DRQN) are used for the attack detection process. An extensive set of simulations was involved in exhibiting the promising results of the EIDS-DRECM method. The experimentation results inferred the proficient performance of the EIDS-DRECM system in the attack detection procedure.

Keywords:

Cybersecurity, Feature Selection, Internet of Things, Ensemble models, Intrusion Detection System, Deep Learning.

References:

[1] Gangadhar Sadaram et al., “Internet of Things (IoT) Cybersecurity Enhancement through Artificial Intelligence: A Study on Intrusion Detection Systems,” Universal Library of Engineering Technology, pp. 1-9, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Xavier Larriva-Novo et al., “An IoT-Focused Intrusion Detection System Approach Based on Preprocessing Characterization for Cybersecurity Datasets,” Sensors, vol. 21, no. 2, pp. 1-15, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Xiao Chun Yin et al., “Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach,” Sensors, vol. 19, no. 22, pp. 1-22, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Syeda Nazia Ashraf et al., “IoT Empowered Smart Cybersecurity Framework for Intrusion Detection in Internet of Drones,” Scientific Reports, vol. 13, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Albara Awajan, “A Novel Deep Learning-Based Intrusion Detection System for IoT Networks,” Computers, vol. 12, no. 2, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Arash Heidari, and Mohammad Ali Jabraeil Jamali, “Internet of Things Intrusion Detection Systems: A Comprehensive Review and Future Directions,” Cluster Computing, vol. 26, pp. 3753-3780, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Irfan Ali Kandhro et al., “Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures,” IEEE Access, vol. 11, pp. 9136-9148, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Xuan-Ha Nguyen et al., “Realguard: A Lightweight Network Intrusion Detection System for IoT Gateways,” Sensors, vol. 22, no. 2, pp. 1-18, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Eirini Anthi et al., “A Supervised Intrusion Detection System for Smart Home IoT Devices,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 9042-9053, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Mohammed I. Alghamdi, “An Investigation into the Effect of Cybersecurity on Attack Prevention Strategies,” Journal of Cybersecurity and Information Management, vol. 3, no. 2, pp. 53-60, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Jawhara Aljabri, “Attack Resilient IoT Security Framework using Multi Head Attention based Representation Learning with Improved White Shark Optimization Algorithm,” Scientific Reports, vol. 15, pp. 1-21, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Haitham Assiri, “Piranha Foraging Optimization Algorithm with Deep Learning Enabled Fault Detection in Blockchain-Assisted Sustainable IoT Environment,” Sustainability, vol. 17, no. 4, pp. 1-124, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Mimouna Abdullah Alkhonaini et al., “Sandpiper Optimization with Hybrid Deep Learning Model for Blockchain-Assisted Intrusion Detection in Iot Environment,” Alexandria Engineering Journal, vol. 112, pp. 49-62, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Karam Hammadeh, M. Kavitha, and Nadim Ibrahim, “Enhancing Cybersecurity in Software-Defined Networking: A Hybrid Approach for Advanced DDoS Detection and Mitigation,” The Social and Ethical Implications of Nanotechnology and Engineering, vol. 20, no. S4, pp. 514-529, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Mohamed Amine Ould Rabah et al., “Detection and Mitigation of Distributed Denial of Service Attacks Using Ensemble Learning and Honeypots in a Novel SDN-UAV Network Architecture,” IEEE Access, vol. 12, pp. 128929-128940, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Mohamed Ali Setitra et al., “Optimized MLP-CNN Model to Enhance Detecting DDoS Attacks in SDN Environment,” Network, vol. 3, no. 4, pp. 538-562, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Xue Jun Li, Maode Ma, and Yihan Sun, “An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids,” Algorithms, vol. 16, no. 6, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] S. Kavitha, N. Uma Maheswari, and R. Venkatesh, “Intelligent Intrusion Detection System using Enhanced Arithmetic Optimization Algorithm with Deep Learning Model,” Technical Gazette, vol. 30, no. 4, pp. 1217-1224, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Madilyn Louisa, Gumgum Darmawan, and Bertho Tantular, “Enhancing Stock Price Forecasting with CNN-BiGRU-Attention: A Case Study on INDY,” Mathematics, vol. 13, no. 13, pp. 1-16, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Hamid Kardan Moghaddam et al., “Sustainable Water Allocation Under Climate Change: Deep Learning Approaches to Predict Drinking Water Shortages,” Journal of Environmental Management, vol. 385, pp. 1-20, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Fan Li et al., “Rolling Bearing Fault Diagnosis via Temporal-Graph Convolutional Fusion,” Sensors, vol. 25, no. 13, pp. 1-19, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Yongjie Wan et al., “Prediction of Typical Power Plant Circulating Cooling Tower Blowdown Water Quality Based on Explicable Integrated Machine Learning,” Processes, vol. 13, no. 6, pp. 1-14, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Yicheng Song, Wenbo Wang, and Song Yao, “Customer Acquisition via Explainable Deep Reinforcement Learning,” Information Systems Research, vol. 36, no. 1, pp. 1-50, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Mohamed Amine Ferrag et al., “Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning,” IEEE Access, vol. 10, pp. 40281-40306, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Nickolaos Koroniotis et al., “Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset,” Future Generation Computer Systems, vol. 100, pp. 779-796, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Urikhimbam Boby Clinton, and Nazrul Hoque, “MU-IoT: A New IoT Intrusion Dataset for Network and Application Layer Attacks Analysis,” IEEE Access, vol. 12, pp. 166068-166092, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Erol Gelenbe, and Mert Nakip, “IoT Network Cybersecurity Assessment with the Associated Random Neural Network,” IEEE Access, vol. 11, pp. 85501-85512, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Prabu Kaliyaperumal et al., “Enhancing Cybersecurity in Agriculture 4.0: A High-performance Hybrid Deep Learning-based Framework for DDoS Attack Detection,” Computers and Electrical Engineering, vol. 126, pp. 1-30, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Tasneem Qasem Al-Ghadi et al., “Leveraging Federated Learning for DoS Attack Detection in IoT Networks based on Ensemble Feature Selection and Deep Learning Models,” Cyber Security and Applications, vol. 3, pp. 1-19, 2025.
[CrossRef] [Google Scholar] [Publisher Link]