Optimized Cascading Long Short-Term Memory model with Latin Sampling Satin Bowerbird Optimization Algorithm for Intrusion Detection in Internet of Things

International Journal of Electrical and Electronics Engineering
© 2025 by SSRG - IJEEE Journal
Volume 12 Issue 7
Year of Publication : 2025
Authors : Naveen Thimmahanumaiah Hosur, Vasantha Kumara Mahadevachar, Venkatesh Prasad BS, Thirthe Gowda MT
pdf
How to Cite?

Naveen Thimmahanumaiah Hosur, Vasantha Kumara Mahadevachar, Venkatesh Prasad BS, Thirthe Gowda MT, "Optimized Cascading Long Short-Term Memory model with Latin Sampling Satin Bowerbird Optimization Algorithm for Intrusion Detection in Internet of Things," SSRG International Journal of Electrical and Electronics Engineering, vol. 12,  no. 7, pp. 274-286, 2025. Crossref, https://doi.org/10.14445/23488379/IJEEE-V12I7P120

Abstract:

The rapid development of Internet of Things (IoT) networks has significantly increased their vulnerability to cyberattacks, so it is essential to develop effective Intrusion Detection Systems (IDS). Traditional algorithms often struggle with a high false positive rate and scalability issues in dynamic IoT environments. For addressing these challenges, this article proposed Optimized Cascading Long Short-Term Memory with Latin Sampling Satin Bowerbird Optimization (OCLSTM-LSBO) algorithm to effectively identify intrusions. The deep cascading LSTM framework captures the deep temporal dependencies in network traffic and improves the identification of difficult intrusion patterns in IoT networks. Then, employed the LSBO algorithm to fine-tune the hyperparameters of the LSTM model, which improves classification accuracy and enhances the generalization ability of the model. In the pre-processing phase, the Min-Max normalization technique is used to normalise the features in a uniform range. The OCLSTM-LSBO algorithm obtained the highest accuracy of 98.97% using the CICIoT2023 dataset and 95.62% using ToNIoT dataset for multiclass classification when compared to existing algorithms like Federated Multi Layered Deep-Learning (Fed-MLDL).

Keywords:

Internet of Things, Intrusion Detection System, Latin sampling satin bowerbird optimization, Multiclass classification, Optimized Cascading Long Short-Term Memory model.

References:

[1] Louai A. Maghrabi, “Automated Network Intrusion Detection for Internet of Things: Security Enhancements,” IEEE Access, vol. 12, pp. 30839-30851, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Ayoob Almotairi et al., “Enhancing Intrusion Detection in IoT Networks Using Machine Learning-Based Feature Selection and Ensemble Models,” Systems Science & Control Engineering, vol. 12, no. 1, pp. 1-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Randa Allafi, and Ibrahim R. Alzahrani, “Enhancing Cybersecurity in the Internet of Things Environment Using Artificial Orca Algorithm and Ensemble Learning Model,” IEEE Access, vol. 12, pp. 63282-63291, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Louai A. Maghrabi et al., “Enhancing Cybersecurity in the Internet of Things Environment using Bald Eagle Search Optimization with Hybrid Deep Learning,” IEEE Access, vol. 12, pp. 8337-8345, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Mansi Bhavsar et al., “Fl-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT,” IEEE Access, vol. 12, pp. 52215-52226, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[6] D. Jayalatchumy et al., “Improved Crow Search-Based Feature Selection and Ensemble Learning for IoT Intrusion Detection,” IEEE Access, vol. 12, pp. 33218-33235, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Fatma S. Alrayes et al., “Intrusion Detection in IoT Systems Using Denoising Autoencoder,” IEEE Access, vol. 12, pp. 122401-122425, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Hayam Alamro et al., “Modelling of Bayesian-Based Optimized Transfer Learning Model for Cyber-Attack Detection in Internet of Things Assisted Resource Constrained Systems,” IEEE Access, vol. 12, pp. 177298-177311, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Zhixin Xia et al., “PSO-GA Hyperparameter Optimized ResNet-BiGRU-Based Intrusion Detection Method,” IEEE Access, vol. 12, pp. 135535-135550, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Aya G. Ayad, Nehal A. Sakr, and Noha A. Hikal, “A Hybrid Approach for Efficient Feature Selection in Anomaly Intrusion Detection for IoT Networks,” The Journal of Supercomputing, vol. 80, no. 19, pp. 26942-26984, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ibrahim A. Fares et al., “TFKAN: Transformer based on Kolmogorov-Arnold Networks for Intrusion Detection in IoT Environment,” Egyptian Informatics Journal, vol. 30, pp. 1-13, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Mimouna Abdullah Alkhonaini et al., “Sandpiper Optimization with Hybrid Deep Learning Model for Blockchain-Assisted Intrusion Detection in IOT Environment,” Alexandria Engineering Journal, vol. 112, pp. 49-62, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Asadullah Momand, Sana Ullah Jan, and Naeem Ramzan, “ABCNN-IDS: Attention-Based Convolutional Neural Network for Intrusion Detection in IoT Networks,” Wireless Personal Communications, vol. 136, no. 4, pp. 1981-2003, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Jing Li et al., “Optimizing IoT Intrusion Detection System: Feature Selection versus Feature Extraction in Machine Learning,” Journal of Big Data, vol. 11, no. 1, pp. 1-44, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Tin Lai et al., “Ensemble Learning Based Anomaly Detection for IoT Cybersecurity via Bayesian Hyperparameters Sensitivity Analysis,” Cybersecurity, vol. 7, no. 1, pp. 1-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Shahad Altamimi, and Qasem Abu Al-Haija, “Maximizing Intrusion Detection Efficiency for IoT Networks Using Extreme Learning Machine,” Discover Internet Things, vol. 4, no. 1, pp. 1-37, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Engy El-Shafeiy et al., “Deep Complex Gated Recurrent Networks-Based IoT Network Intrusion Detection Systems,” Sensors, vol. 24, no. 18, pp. 1-22, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Riccardo Lazzarini, Huaglory Tianfield, and Vassilis Charissis, “A Stacking Ensemble of Deep Learning Models for IoT Intrusion Detection,” Knowledge-Based System, vol. 279, pp. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Gutierrez-Portela Fernando et al., “Enhancing Intrusion Detection in IoT Communications Through ML Model Generalization With a New Dataset (IDSAI),” IEEE Access, vol. 11, pp. 70542-70559, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] P. Sanju, “Enhancing Intrusion Detection in IoT Systems: A Hybrid Metaheuristics-Deep Learning Approach with Ensemble of Recurrent Neural Networks,” Journal of Engineering Research, vol. 11, no. 4, pp. 356-361, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Marwa Keshk et al., “An Explainable Deep Learning-Enabled Intrusion Detection Framework in IoT Networks,” Information Sciences, vol. 639, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Chirag Jitendra Chandnani et al., “A Physics-Based Hyper Parameter Optimized Federated Multi-Layered Deep Learning Model for Intrusion Detection in IoT Networks,” IEEE Access, vol. 13, pp. 21992-22010, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Mohamed Abd Elaziz, Ibrahim Ahmed Fares, and Ahmad O. Aseeri, “CKAN: Convolutional Kolmogorov-Arnold Networks Model for Intrusion Detection in IoT Environment,” IEEE Access, vol. 12, pp. 134837-134851, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Rua Y. Aburasain, “Enhanced Black Widow Optimization with Hybrid Deep Learning Enabled Intrusion Detection in Internet of Things-Based Smart Farming,” IEEE Access, vol. 12, pp. 16621-16631, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Sidra Abbas et al., “A Novel Federated Edge Learning Approach for Detecting Cyberattacks in IoT Infrastructures,” IEEE Access, vol. 11, pp. 112189-112198, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Hui Chen et al., “Intrusion Detection Using Synaptic Intelligent Convolutional Neural Networks for Dynamic Internet of Things Environments,” Alexandria Engineering Journal, vol. 111, pp. 78-91, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[27] CIC IoT dataset, University of New Brunswick, 2023. [Online]. Available: https://www.unb.ca/cic/datasets/iotdataset-2023.html
[28] Nour Moustafa, The TON_IoT datasets, Unsw Sydney, 2021. [Online]. Available: https://research.unsw.edu.au/projects/toniot-datasets
[29] Shankar Deva et al., “Lightweight Hybrid CAE-ELM and Enhanced Smote Based Intrusion Detection for Networks,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 6, pp. 1006-1021, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Woothukadu Thirumaran Valavan, Nalini Joseph, and G. Umarani Srikanth, “Network Intrusion Detection System based on Information Gain with Deep Bidirectional Long Short-Term Memory,” International Journal of Intelligent Engineering and Systems, vol. 17, no. 4, pp. 45-56, 2024.
[CrossRef] [Google Scholar] [Publisher Link]