
Internet of Things (IoT) edge devices are becoming extremely popular because of their ability to process data locally, conserve bandwidth, and reduce latency. However, with the developing count of IoT devices, threat detection, and security are becoming major concerns. IoT edge devices must avoid cyber threats and protect user data. These devices frequently take limited resources and can run on lightweight operating systems, which makes them vulnerable to security attacks. Intrusion detection systems (IDS) can be run on edge devices to recognize suspicious actions and possible risks. These systems monitor traffic patterns, and behavior, and identify attack signatures to detect and report on possible attacks. This study presents a design for an inverse chi square-based flamingo search optimization algorithm with machine learning (ICSFSO-ML) as a security solution for Internet of Things edge devices. The goal of the ICSFSO-ML technique is to apply ML and metaheuristics for threat recognition in IoT edge devices. To reduce the high dimensionality problem, the ICSFSO-ML technique uses the ICSFSO algorithm for feature selection purposes. Further, the ICSFSO-ML technique exploits the stacked bidirectional long short-term memory (SBiLSTM) model for the threat detection process. To enhance the efficacy of the SBiLSTM model, an arithmetic optimization algorithm (AOA) is applied for the hyperparameter selection process. The simulation performance of the ICSFSO-ML technique can be tested on a benchmark threat database. The performance analysis showed the benefits of the ICSFSO-ML methodology compared to existing methodologies with a maximum accuracy of 98.22%.
Citation: Youseef Alotaibi, R Deepa, K Shankar, Surendran Rajendran. Inverse chi-square-based flamingo search optimization with machine learning-based security solution for Internet of Things edge devices[J]. AIMS Mathematics, 2024, 9(1): 22-37. doi: 10.3934/math.2024002
[1] | Ibrahim R. Alzahrani, Randa Allafi . Integrating Ebola optimization search algorithm for enhanced deep learning-based ransomware detection in Internet of Things security. AIMS Mathematics, 2024, 9(3): 6784-6802. doi: 10.3934/math.2024331 |
[2] | Mohammed Aljebreen, Hanan Abdullah Mengash, Khalid Mahmood, Asma A. Alhashmi, Ahmed S. Salama . Enhancing cybersecurity in cloud-assisted Internet of Things environments: A unified approach using evolutionary algorithms and ensemble learning. AIMS Mathematics, 2024, 9(6): 15796-15818. doi: 10.3934/math.2024763 |
[3] | Maha M. Althobaiti, José Escorcia-Gutierrez . Weighted salp swarm algorithm with deep learning-powered cyber-threat detection for robust network security. AIMS Mathematics, 2024, 9(7): 17676-17695. doi: 10.3934/math.2024859 |
[4] | Waeal J. Obidallah . Enhancing healthcare security measures in IoTT applications through a Hesitant Fuzzy-Based integrated approach. AIMS Mathematics, 2024, 9(4): 9020-9048. doi: 10.3934/math.2024439 |
[5] | Lingtao Wen, Zebo Qiao, Jun Mo . Modern technology, artificial intelligence, machine learning and internet of things based revolution in sports by employing graph theory matrix approach. AIMS Mathematics, 2024, 9(1): 1211-1226. doi: 10.3934/math.2024060 |
[6] | Fahad F. Alruwaili . Ensuring data integrity in deep learning-assisted IoT-Cloud environments: Blockchain-assisted data edge verification with consensus algorithms. AIMS Mathematics, 2024, 9(4): 8868-8884. doi: 10.3934/math.2024432 |
[7] | Eatedal Alabdulkreem, Mesfer Alduhayyem, Mohammed Abdullah Al-Hagery, Abdelwahed Motwakel, Manar Ahmed Hamza, Radwa Marzouk . Artificial Rabbit Optimizer with deep learning for fall detection of disabled people in the IoT Environment. AIMS Mathematics, 2024, 9(6): 15486-15504. doi: 10.3934/math.2024749 |
[8] | E Laxmi Lydia, Chukka Santhaiah, Mohammed Altaf Ahmed, K. Vijaya Kumar, Gyanendra Prasad Joshi, Woong Cho . An equilibrium optimizer with deep recurrent neural networks enabled intrusion detection in secure cyber-physical systems. AIMS Mathematics, 2024, 9(5): 11718-11734. doi: 10.3934/math.2024574 |
[9] | Nizar Alsharif, Mosleh Hmoud Al-Adhaileh, Mohammed Al-Yaari . Diagnosis of attention deficit hyperactivity disorder: A deep learning approach. AIMS Mathematics, 2024, 9(5): 10580-10608. doi: 10.3934/math.2024517 |
[10] | Wael Alosaimi, Abdullah Alharbi, Hashem Alyami, Bader Alouffi, Ahmed Almulihi, Mohd Nadeem, Rajeev Kumar, Alka Agrawal . Analyzing the impact of quantum computing on IoT security using computational based data analytics techniques. AIMS Mathematics, 2024, 9(3): 7017-7039. doi: 10.3934/math.2024342 |
Internet of Things (IoT) edge devices are becoming extremely popular because of their ability to process data locally, conserve bandwidth, and reduce latency. However, with the developing count of IoT devices, threat detection, and security are becoming major concerns. IoT edge devices must avoid cyber threats and protect user data. These devices frequently take limited resources and can run on lightweight operating systems, which makes them vulnerable to security attacks. Intrusion detection systems (IDS) can be run on edge devices to recognize suspicious actions and possible risks. These systems monitor traffic patterns, and behavior, and identify attack signatures to detect and report on possible attacks. This study presents a design for an inverse chi square-based flamingo search optimization algorithm with machine learning (ICSFSO-ML) as a security solution for Internet of Things edge devices. The goal of the ICSFSO-ML technique is to apply ML and metaheuristics for threat recognition in IoT edge devices. To reduce the high dimensionality problem, the ICSFSO-ML technique uses the ICSFSO algorithm for feature selection purposes. Further, the ICSFSO-ML technique exploits the stacked bidirectional long short-term memory (SBiLSTM) model for the threat detection process. To enhance the efficacy of the SBiLSTM model, an arithmetic optimization algorithm (AOA) is applied for the hyperparameter selection process. The simulation performance of the ICSFSO-ML technique can be tested on a benchmark threat database. The performance analysis showed the benefits of the ICSFSO-ML methodology compared to existing methodologies with a maximum accuracy of 98.22%.
Recently, the Internet of Things (IoT) has experienced enormous growth in specific domain applications like smart transportation systems, industry, the medical field, and smart agriculture for increasing socio-economic development [1]. These IoT systems are formed by several interconnected actuators, various network-enabled devices, and sensors, which share several types of data through both private networks and internet platforms [2]. The Cisco investigation group forecast an average value of 75.3 billion effectively interconnected IoT devices by 2025. The absence of human intervention in data exchange among IoT systems makes it distinctive from standard internet technology [3]. The development of IoT devices has also improved the data network bandwidth requirements. However, many IoT devices have resource limitations, making it difficult to implement conventional security techniques for protecting systems against cyberattacks [4]. Major problems can occur with IoT devices that process sensitive data. Therefore, it is crucial to introduce mobile edge computing (MEC), which allows computation that is implemented at the network end to overcome resource-limit issues in IoT systems [5]. MEC permits IoT devices to offload more computationally intensive tasks to the proximal edge server. As the IoT develops as an industrial revolution, and systems collect live data, cybersecurity has become essential [6]. As a result, it is imperative to have a network intrusion detection system (NIDS), which could identify existing and forthcoming attacks to protect the IoT network and systems made on it.
Given the dependency of IoT methods on various edge devices and the part of the IoT in producing and collecting huge amounts of core data, accurate and effective techniques for identifying anomalous behavior in IoT edge devices are required [7]. Machine learning (ML) has been employed from the centralized cloud. However, a structure that requires a lot of resources can be placed so that it can consistently have as much processing power, storage space, and power as it requires to process data. However, there might be further waiting time because of network delays from the device to the cloud and back, as well as the quantity of data in applications with higher traffic. This increases expenses concerning delay and financial expenditure. The basic changes are required in AI approaches and cloud-to-device intention to provide effectual, maintainable, and acceptable solutions for the predicted potential demands [8]. Hence, it is essential to manage the increasing processing needs and traffic, and minimize delays [9]. The major problem preventing edge devices from performing at their maximum potential is the lack of resources among these limited resources, and edge devices are needed by AI applications. Generally, edge devices are very small in their physical sizes, with low power capacity and processing ability [10]. Security solutions for IoT edge devices have several applications to safeguard a connected ecosystem. These solutions can be applied in various fields such as healthcare, critical infrastructure, and maintaining public safety; in industrial settings, to safeguard manufacturing processes and prevent unauthorized access to machinery; and in home automation, where they protect personal information and ensure the security of smart appliances and devices.
This study presents a design for an inverse chi square-based flamingo search optimization algorithm with machine learning (ICSFSO-ML) as a security solution for Internet of Things edge devices. The goal of the ICSFSO-ML technique is to apply ML and metaheuristics for threat recognition in IoT edge devices. To reduce the high dimensionality problem, the ICSFSO-ML technique uses the ICSFSO algorithm for feature selection. Further, the ICSFSO-ML technique exploits the stacked bidirectional long short-term memory (SBiLSTM) model for the threat detection process. To enhance the efficacy of the SBiLSTM model, an arithmetic optimization algorithm (AOA) is applied for the hyperparameter selection process. The simulation performance of the ICSFSO-ML technique is tested using a benchmark threat database.
Mishra et al. [11] aimed to detect potential attacks on various types of networks. The IoT anomalies are identified by inspiring message queuing telemetry transport (MQTT) across a virtual network. Dey et al. [12] developed a metaheuristic-based intelligent structure for cyberattack identification employing ensemble FS and a classification model. Initially, a metaheuristic-based ensemble FS method was developed utilizing binary grey wolf optimization (BGWO) and binary gravitational search algorithm (BGSA). Then, RF and AdaBoost can be utilized for detecting and classifying cyberattacks. In [13], the authors studied effective attack identification approaches for these software-defined IoT (SD-IoT) networks. Then, the impacts of RF and ML techniques in different feature groups (for example IPs and ports) could be analyzed for the identification accuracy of various attacks.
Aldaej et al. [14] examined current security and privacy issues affecting a network of drones (NoD). A hybrid ML approach of LR and RF was employed with the aim of classification of data samples for maximum efficiency. By integrating complex AI-inspired methods into the architecture, the presented approach alleviated cybersecurity vulnerabilities while creating a protected and secured NoD. In [15], the authors suggested a collaborative cyberattack intelligence-sharing method for allowing several organizations to combine forces in the framework, estimation, and training of a robust ML-based network IDS. This technique employs two main features for its application: the accessibility of network data traffic in a standard design and implementation of a federated learning method to prevent the need to share sensitive user data among organizations. Haddad Pajouh et al. [16] recommended a protected design for the IoT edge layer structure named AI4SAFE-IoT. The modules developed in the research included cyberattack allocation, intelligent web application firewall, cyberattack hunting, and cyberattack intelligence.
Mozo et al. [17] introduced an analysis of the incorporation of ML modules in a distributed scenario. A real-time developing attack vector (crypto-mining malware attack) was employed as a demonstration. The overall potential of recent green AI methods was integrated for optimizing the size and complexity of ML approaches to decrease their energy consumption while retaining their capability for accurately detecting possible cyberattacks. Gasu [18] presented an attentive literature study of ML and data mining (DM) techniques for cyber analytics in aid of cyberattack identification and intrusion detection.
This manuscript provides an automated ICSFSO-ML-based security solution for IoT edge devices. The major aim of the ICSFSO-ML technique is to apply ML and metaheuristics for threat recognition in IoT edge devices. In the proposed ICSFSO-ML algorithm, three main phases are contained: ICS-FSO-based feature selection, SBiLSTM-based detection, and AOA-based parameter tuning. Figure 1 depicts the entire flow of the ICSFSO-ML methodology.
Primarily, the ICSFSO-ML technique uses the ICSFSO algorithm for feature selection purposes. The ICS-FSO model controls the global searching space in the foraging range of flamingos to maintain a balance between the exploration and exploitation stages [19]. Moreover, the current chi‐square test in FSO becomes locked for the independent variable, which leads to a high error rate. To overcome these challenges, the working mechanism of ICS is paired with FSO. The proposed model takes fitness value as a better feature score and flamingo as the feature. The following steps provide a detailed description of ICS‐FSO:
Step 1: At first, the population of the flamingos was initialized in an attempt to generate the optimal performance dependent upon the data available, and then the search region was chosen, while the food accessibility was rich. Consider the Flamingo (Γj) having an abundance of food in the jth parameter.
Consider Γij to be the coordinates of the ith and jth flamingo population parameters; in this case, the flamingos' inhabitants must contend with the problems of sporadic access to food and inaccurate data transmission. This error can be estimated by the maximum distance of the flamingo's beak scan from the foraging behavior, as shown below:
|I1×Γbj+I2×Γtij| | (1) |
In Eq (1), ℘2 denotes a randomly generated value within [−1,1], and I1 refers to a figure that was unintentional to exploit the uniform distribution. In beak behavior, the range of scanning can be maintained in the range as,
I2×|I1×Γbj+℘2×Γtij|. | (2) |
Considering Γbj as food for a large population, the flamingo distances are modified, and the traveling is calculated by ℘1×Γbj, where ℘1 refers to a random integer within [−1,1]. Lastly, the foraging movement of the flamingo from the tth step can be estimated by the flamingo beak scan range, and the distance among the moving feet is shown as follows:
dtij=℘1×Γbij+I2×|I1×Γbij+I2×Γtij|. | (3) |
The location of flamingo's foraging is represented as,
Γt+1ij=(Γtij+℘1×Γbtj+℘2×|℘1×Γbtj+℘2×Γtij|)K. | (4) |
In Eq (4), Γtij shows the location of the ith flamingo at thejth variable in the ith iteration of the flamingo's population, Γbtj indicates the jth flamingo size with the better fitness from the population at t iteration, Γt+1ij denotes the location of the ith flamingo at the jth population parameter from the (t+1)th iteration,
K(1Γ,η)=[2−η/2γ(η/2)Γ−η/2−1e−12Γ]. | (5) |
In Eq (5), K (η) denotes the diffusion factor that follows in the inverse chi‐square distribution of η degrees of freedom, and γ represents the gamma function. The foraging range dimension has been improved, and the simulation can be done for the individual chosen, it boosted the capacity for meritocracy all over the globe. I1= N(O,1) and I2=N(0,1) a random integer generated using a uniform distribution, ℘1 and ℘2 are altered in [-1,1].
Step 2: The flamingos have migrated to the following region because of the food scarcity from the existing region. Given the fact that the region in question exhibits a significant level of dietary consumption jth variable is Abj, the migration of the flamingo population can be given below:
Γt+1ij=Γtij+ω×(Γbtj−Γtij). | (6) |
In Eq (6), ω=N(O,n) indicates the randomly generated value based on the uniform distribution with n degrees of freedom, which increases the searching space and arbitrariness behavior of the specific flamingo with a particular migration method employed for inspiration. At last, the maximal iteration attained gives an optimum performance and value that can be replaced from the main function and arranged to evaluate the essential feature, and the relevant features can be framed inside the data frame employing ICS-FSO:
Ω1=A[Γd1,Γd2,Γd3,Γd4,Γd5,Γd6,Γd7…Γdn]. | (7) |
At this stage, the SBiLSTM model is used for the threat detection process. LSTM is distinct from the RNN technique, which is generally deployed to process time sequence data [20]. It can be established to resolve the issue of RNNs' effort in long‐term learning and dependencies. The main idea of LSTM exists from its memory cell with a gated function. Its gated method contains 3 gates: forget (ft), input (it) and output gates (ot). An input gate (it) controls the input of present data. Once the input data comes into the unit, an input gate carries out a computation to determine whether to input the present data. The memory gate (ft) controls the maintenance of past data. Once the past data comes into the unit, the memory gate executes a computation to determine how to maintain the data. The output gate (Ot) manages the outcome of the present data. It is defined as outputting the present data by carrying out a computation. Furthermore, Ct signifies the long‐term memory unit, whereas ht signifies the short‐term memory unit.
ft=σ(wf⋅[ht−1,xt]+bf). | (8) |
it=σ(wi⋅[ht−1,xt]+bi). | (9) |
C′t=tanh(wc⋅[ht−1,xt]+bc). | (10) |
Ot=σ(wo⋅[ht−1,xt]+b0). | (11) |
Ct=ft⋅Ct−1+it⋅C′t. | (12) |
ht=Ot.tanh(Ct). | (13) |
In the above equations, σ denotes the sigmoid activation function. The variables w and b in the equations represent the weighted and intercepted, correspondingly. BILSTM is a distinct LSTM that integrates a further layer of reverse computation with the base LSTM. The original series is (A0, A1, A2, …,Ai), but the reversed series is defined as (A′0, A′1, A′2, …,Ai). The last resultant value is defined by the forward as well as reverse sequences:
yi=v1⋅Ai+v2⋅A′i. | (14) |
In this equation, v1 and v2 represent the equivalent weights linked with 2 sequences.
An SBiLSTM has an NN structure that contains stacking multi-layers of BiLSTMs on top of one another. Figure 2 depicts the framework of stacked BiLSTM. The outcome of the 1st BiLSTM layer serves as the input to the 2nd BiLSTM layer, etc. All the subsequent layers capture a high-level representation of input data, potentially contributing to a more expressive and greater model for sequence processing tasks.
The hyperparameters related to the SBiLSTM approach are elected by the AOA. AOA is based on the searching process for the potential region from the candidate solution based on subtraction, division, multiplication and addition operators [21]. The efficiency of the optimization approach is measured with two search processes called exploitation and exploration. The process conducts the local search in the exploitation phase, concentrating on promising regions to search for a better solution. During the exploration phase, the process performs a global search to prevent local solutions. In this work, division (÷) and multiplication (×) take the larger steps from the searching space and are thereby employed for exploratory search. Addition (+) and subtraction (−) operators can find capable areas by taking smaller steps from the searching space, which provides the best exploitation search. The AOA begins with an arbitrary candidate solution (X). A better solution should be found through exploration and exploitation. Among the Xn candidate solutions. MOA is used to define whether to implement an exploitation or exploration search as follows:
MOA(tCURRENT)=MOAmin+tCURRENT×(MOAmax−MOAmintMAX). | (15) |
In Eq (15), tCURRENT indicates the existing iteration ranges from 1 to rMAX (maximal iteration), and MOAmax, and MOAmin determine the minimal and maximal values of MOA. The AOA algorithm utilizes the 3 randomly generated values (rand1, rand2 and rand3) between zero and one. Once an arbitrary number rand1 is bigger than MAO, AOA enters the exploration stage. Now, if rand2>0.5, the place of the sth solution can be upgraded by the division operators. Else, if rand2 is lesser than 0.5, then the AOA model exploits the multiplication operator for updating the position of the sth outcome.
Ss,l(tCURRENT+1) ={Condition1:best(S,)÷(MOP+∈)×[(UBl−LBl)×μ+LBl],rand2<0,Condition2:best(S,)×MOP×[(UBl−LBl)×μ+LBl],otherwise, | (16) |
where Ss,l(tCURRENT+1) denotes the s‐ th solution in the lth location, and bestx1 shows the best performance from the lth place. ε indicates the integer with a smaller value. and μ represents the control parameter characterized by predetermined or fixed values of 0.5 for updating the exploration search. The upper and lower boundaries are characterized as the UBl and LBl parameters.
MOP(tCURRENT)=1−tCURRENTtMax1/α1/α. | (17) |
The coefficients in the context of math optimizer probability (MOP) serve a specific purpose and are explicitly defined in the tth iteration. The AOA model enters into the exploitation stage if rand1<MOA function. Moreover, the model updates the position of thes‐ th solution using subtraction. If rand3>0.5. Otherwise, the place of the sth solution can be upgraded by addition (+) operator as follows:
Ss,l(fCURRENT+1)= {Condition1:best(Sl)÷(M0P+∈)×[(UBl−LBl)×μ+LBl],rand2<0,Condition2:best(Sl)×M0P×[(UBl−LBl)×μ+LBl],otherwise. | (18) |
Algorithm 1: Pseudocode of AOA. |
Initialize the parameters α, μ, Maxiter, MOAmax, MOAmin Initialize the position of each solution randomly as s=1,…,n while (tCURRENT<tMax) do Compute the Fitness Function (FF) (FitnessF) to provide a solution Define the best solution Upgrade the value of MOA based on Eq (15). Upgrade the value of MOP based on Eq (17). for (s=1 to Solution) do for (l=1 to Location) do Produce an arbitrary value within [0,1](rand1, rand2, and rand3) if rand1>MOA then Exploration stage if rand2>0.5 then Apply the Division operator Upgrade position l of sth solution based on condition1 in Eq (17) else Apply the Multiplication operator Upgrade position l of sth solution based on condition2 in Eq (16) end if else Exploitation stage if rand3>0.5 then Apply the Subtraction operator. Upgrade place l of sth solution based on condition1 in Eq (18) else Apply the Addition operator Upgrade position l of sth solution based on condition2 in Eq (18) end if end if end for end for tCURRENT=tCURRENT+1 end while Return the best solution (Sbest). |
Fitness choice is a key feature of the AOA methodology. An encoded outcome was deployed to assess better candidate performances. Presently, the accuracy value is the major condition deployed to design an FF.
Fitness=max(P), | (19) |
P=TPTP+FP, | (20) |
where FP and TP denote the false and true positive values.
The performance of the ICSFSO-ML technique was tested on the anomaly database [22,23]. The database has 20000 instances and 2 class labels as represented in Table 1. Among the available 13 features, the ICSFSO algorithm has chosen 8 features.
Class | No. of Samples |
Normal Status | 10000 |
Anomalies | 10000 |
Total Samples | 20000 |
The anomaly detection results of the ICSFSO-ML technique are depicted in Figure 3. The confusion matrices demonstrate the effectual recognition of the normal and anomalous samples under all classes [24,25,26].
The anomaly identification results of the ICSFSO-ML technique are tested with 80:20 of TR set/TS set as shown in Table 2 and Figure 4. The outcome showed that the ICSFSO-ML system recognized the normal and anomaly classes. On 80% of the TR set, the ICSFSO-ML algorithm offers average accuracy, precn, recall, F−score and Gmeasure of 97.68%, 97.71%, 97.68%, 97.67% and 97.68%, respectively. Also, on 20% of the TS set, the ICSFSO-ML method achieves average accuracy, precn, recall, F−score, and Gmeasure of 98.22%, 98.25%, 98.22%, 98.22% and 98.23%, correspondingly.
Class | \boldsymbol{A}\boldsymbol{c}\boldsymbol{c}{\boldsymbol{u}}_{\boldsymbol{y}} | \boldsymbol{P}\boldsymbol{r}\boldsymbol{e}{\boldsymbol{c}}_{\boldsymbol{n}} | \boldsymbol{R}\boldsymbol{e}\boldsymbol{c}{\boldsymbol{a}}_{\boldsymbol{l}} | {\boldsymbol{F}}_{\boldsymbol{S}\boldsymbol{c}\boldsymbol{o}\boldsymbol{r}\boldsymbol{e}} | {\boldsymbol{G}}_{\boldsymbol{M}\boldsymbol{e}\boldsymbol{a}\boldsymbol{s}\boldsymbol{u}\boldsymbol{r}\boldsymbol{e}} |
TR set (80%) | |||||
Normal Status | 99.02 | 96.42 | 99.02 | 97.70 | 97.71 |
Anomalies | 96.33 | 99.00 | 96.33 | 97.65 | 97.65 |
Average | 97.68 | 97.71 | 97.68 | 97.67 | 97.68 |
TS set (20%) | |||||
Normal Status | 99.30 | 97.22 | 99.30 | 98.25 | 98.26 |
Anomalies | 97.14 | 99.28 | 97.14 | 98.20 | 98.21 |
Average | 98.22 | 98.25 | 98.22 | 98.22 | 98.23 |
The anomaly identification outcome of the ICSFSO-ML methodology was tested with 70:30 of the TR set/TS setting as portrayed in Table 3 and Figure 5. The simulation values depicted that the ICSFSO-ML algorithm recognized the normal and anomaly classes. On 70% of the TR set, the ICSFSO-ML system had average accu_y, prec_n, reca_l, F_score, and G_measure of 96.97%, 96.98%, 96.97%, 96.96% and 96.97% correspondingly. Then, on 20% of the TS set, the ICSFSO-ML methodology achieved average accu_y, prec_n, reca_l, F_score, and G_measure of 97.03%, 97.06%, 97.03%, 97.03% and 97.04%, respectively.
Class | \boldsymbol{A}\boldsymbol{c}\boldsymbol{c}{\boldsymbol{u}}_{\boldsymbol{y}} | \boldsymbol{P}\boldsymbol{r}\boldsymbol{e}{\boldsymbol{c}}_{\boldsymbol{n}} | \boldsymbol{R}\boldsymbol{e}\boldsymbol{c}{\boldsymbol{a}}_{\boldsymbol{l}} | {\boldsymbol{F}}_{\boldsymbol{S}\boldsymbol{c}\boldsymbol{o}\boldsymbol{r}\boldsymbol{e}} | {\boldsymbol{G}}_{\boldsymbol{M}\boldsymbol{e}\boldsymbol{a}\boldsymbol{s}\boldsymbol{u}\boldsymbol{r}\boldsymbol{e}} |
TR set (70%) | |||||
Normal Status | 96.14 | 97.77 | 96.14 | 96.94 | 96.95 |
Anomalies | 97.80 | 96.19 | 97.80 | 96.98 | 96.99 |
Average | 96.97 | 96.98 | 96.97 | 96.96 | 96.97 |
TS set (30%) | |||||
Normal Status | 96.02 | 97.98 | 96.02 | 96.99 | 97.00 |
Anomalies | 98.04 | 96.13 | 98.04 | 97.07 | 97.08 |
Average | 97.03 | 97.06 | 97.03 | 97.03 | 97.04 |
Figure 6 illustrates the training accuracy TR_accu_y and VL_accu_y of the ICSFSO-ML methodology on 80:20 of the TR set/TS set. The TL_accu_y was determined by the evaluation of the ICSFSO-ML method on the TR dataset, whereas the VL_accu_y was computed by evaluating the performance on a separate testing dataset. The outcome exhibits that TR_accu_y and VL_accu_y upsurge with a rise in epochs. Therefore, the performance of the ICSFSO-ML method increased on the TR and TS datasets with an upsurge in several epochs.
In Figure 7, the TR_loss and VR_loss results of the ICSFSO-ML approach on 80:20 of the TR set/TS set are shown. The TR_loss defines the error among the predictive outcome and original values on the TR data. The VR_loss signifies the measure of the performance of the ICSFSO-ML technique on individual validation data. The outcomes point out that the TR_loss and VR_loss tend to reduce with rising epochs, portraying the higher performance of the ICSFSO-ML system and its ability to produce an accurate classification. The lesser values of TR_loss and VR_loss establish the improved performance of the ICSFSO-ML methodology in capturing patterns and relationships.
In Figure 8, a comprehensive precision-recall (PR) investigation of the ICSFSO-ML approach is shown for 80:20 of the TR set/TS set in Figure 8. The simulation values demonstrated that the ICSFSO-ML system led to enhanced PR outcomes. Further, it was obvious that the ICSFSO-ML method has greater PR outcomes in the 2 classes.
In Figure 9, an ROC analysis of the ICSFSO-ML system is demonstrated on 80:20 of the TR set/TS set. The simulation results show that the ICSFSO-ML approach led to greater values of ROC. Also, it was apparent that the ICSFSO-ML methodology achieved better ROC outcomes in the 2 classes.
Table 4 and Figure 10 illustrate the comparison outcomes of the ICSFSO-ML approach with other models in terms of different metrics [27,28,29]. The table values portrayed the ineffectual performance of the AE model, whereas the SVM and Anomaly-IDS models have shown somewhat better results over the AE model. Along with that, the DEA and LR approaches have exhibited close results. However, the DT and RF systems have accomplished considerable results, the ICSFSO-ML technique ensured better performance with maximum pre{c}_{n} , acc{u}_{y} , {F}_{score} and rec{a}_{l} of 98.25%, 98.22%, 98.22% and 98.22%, respectively. These outcomes show the better performance of the ICSFSO-ML algorithm.
Model | \boldsymbol{P}\boldsymbol{r}\boldsymbol{e}{\boldsymbol{c}}_{\boldsymbol{n}} | \boldsymbol{A}\boldsymbol{c}\boldsymbol{c}{\boldsymbol{u}}_{\boldsymbol{y}} | {\boldsymbol{F}}_{\boldsymbol{S}\boldsymbol{c}\boldsymbol{o}\boldsymbol{r}\boldsymbol{e}} | \boldsymbol{R}\boldsymbol{e}\boldsymbol{c}{\boldsymbol{a}}_{\boldsymbol{l}} |
ICSFSO-ML | 98.25 | 98.22 | 98.22 | 98.22 |
DT Model | 95.40 | 96.70 | 92.10 | 93.30 |
LR Model | 93.10 | 94.50 | 91.70 | 92.50 |
SVM Model | 92.60 | 95.30 | 90.00 | 91.00 |
RF Model | 95.50 | 97.20 | 93.20 | 94.40 |
Deep Autoencoder | 93.79 | 94.71 | 92.71 | 93.46 |
Autoencoders | 89.81 | 84.86 | 90.85 | 91.90 |
Anomaly-IDS | 92.65 | 91.65 | 93.16 | 92.24 |
This manuscript has provided an automated ICSFSO-ML-based security solution for IoT edge devices. The major aim of the ICSFSO-ML technique is to apply ML and metaheuristics for threat recognition in IoT edge devices. In the proposed ICSFSO-ML algorithm, three major phases are contained: ICS-FSO-based feature selection, SBiLSTM-based detection and AOA-based parameter tuning. Primarily, the ICSFSO-ML approach uses the ICSFSO algorithm for feature selection purposes, which reduces the computation complexity and boosts the classification results. In addition, the ICSFSO-ML technique makes use of the SBiLSTM model for the threat detection process. To enhance the efficacy of the SBiLSTM model, AOA is applied for the hyperparameter selection process. The simulation value of the ICSFSO-ML technique is made on the benchmark threat database. The performance showed the benefits of the ICSFSO-ML approach compared to existing methods with a maximum accuracy of 98.25%. In the future, the ICSFSO-ML technique holds significant potential for further advancements and applications in the field of IoT security. Additional research could focus on refining and optimizing the technique to address emerging IoT security threats and vulnerabilities. This might involve extending the methodology to accommodate a broader range of IoT devices and communication protocols. Furthermore, integrating real-time monitoring and response capabilities, as well as considering the scalability of the solution for large-scale IoT deployments, could be valuable avenues of exploration.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
This research has been funded by the Deanship for Research & Innovation, Ministry of Education in Saudi Arabia, through project number: IFP22UQU4281768DSR205.
The authors extend their appreciation to the Deanship for Research & Innovation, Ministry of Education in Saudi Arabia, through project number: IFP22UQU4281768DSR205.
The authors declare no conflict of interest.
[1] |
A. Mozo, A. Karamchandani, L. de la Cal, S. Gomez-Canaval, A. Pastor, L. Gifre, A mchine-learning-based cyberattack detector for a cloud-based SDN controller, Apli. Sci., 13 (2023), 4914. https://doi.org/10.3390/app13084914 doi: 10.3390/app13084914
![]() |
[2] |
A. Dutta, S. Kant, Implementation of cyber threat intelligence platform on the Internet of Things (IoT) using TinyML approach for deceiving cyber invasion, 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 2021, 1–6. https://doi.org/10.1109/ICECCME52200.2021.9590959 doi: 10.1109/ICECCME52200.2021.9590959
![]() |
[3] |
A. Aldaej, T. A. Ahanger, M. Atiquzzaman, I. Ullah, M. Yousufudin, Smart cybersecurity framework for IoT-empowered drones: Machine learning perspective, Sensors, 22 (2022), 2630. https://doi.org/10.3390/s22072630 doi: 10.3390/s22072630
![]() |
[4] |
I. Goni, J. M. Gumpy, T. U. Maigari, M. Muhammad, A. Saidu, Cybersecurity and cyber forensics: Machine learning approach, Mach Learn Res., 5 (2020), 46–50. https://doi.org/10.11648/j.mlr.20200504.11 doi: 10.11648/j.mlr.20200504.11
![]() |
[5] |
F. S. Alrayes, N. Alshuqayran, M. K. Nour, M. Al Duhayyim, A. Mohamed, A. A. A. Mohammed, et al., Optimal fuzzy logic enabled intrusion detection for secure IoT-cloud environment, CMC-Comput. Mater. Con., 74 (2023), 6737–6753. http://doi.org/10.32604/cmc.2023.032591 doi: 10.32604/cmc.2023.032591
![]() |
[6] |
P. Koloveas, T. Chantzios, S. Alevizopoulou, S. Skiadopoulos, C. Tryfonopoulos, Intime: A machine learning-based framework for gathering and leveraging web data to cyber-threat intelligence, Electronics, 10 (2021), 818. https://doi.org/10.3390/electronics10070818 doi: 10.3390/electronics10070818
![]() |
[7] |
M. Maray, H. M. Alshahrani, K. A. Alissa, N. Alotaibi, A. Gaddah, A. Meree, Optimal deep learning driven intrusion detection in SDN-Enabled IoT environment, Comput. Mater. Con., 74 (2023), 6587–6604. https://doi.org/10.32604/cmc.2023.034176 doi: 10.32604/cmc.2023.034176
![]() |
[8] |
K. H. Almotairi, Application of internet of things in the healthcare domain, J. Umm Al-Qura Univ. Eng. Architecture, 14 (2023), 1–12. https://doi.org/10.1007/s43995-022-00008-8 doi: 10.1007/s43995-022-00008-8
![]() |
[9] |
T. Moulahi, R. Jabbar, A. Alabdulatif, S. Abbas, S. El Khediri, S. Zidi, et al., Privacy‐preserving federated learning cyber‐threat detection for intelligent transport systems with blockchain‐based security, Expert Syst., 40 (2023), 13103. https://doi.org/10.1111/exsy.13103 doi: 10.1111/exsy.13103
![]() |
[10] | K. Marsh, S. E. Gharghasheh, Fuzzy Bayesian learning for cyber threat hunting in industrial control systems, In: Handbook of big data analytics and forensics, Springer, Cham. 2022,117–130. https://doi.org/10.1007/978-3-030-74753-4_8 |
[11] |
S. Mishra, A. Albarakati, S. K. Sharma, Cyber threat intelligence for IoT using machine learning, Processes, 10 (2022), 2673. https://doi.org/10.3390/pr10122673 doi: 10.3390/pr10122673
![]() |
[12] |
A. K. Dey, G. P. Gupta, S. P. Sahu, A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks, Decis. Anal. J., 7 (2023), 100206. https://doi.org/10.1016/j.dajour.2023.100206 doi: 10.1016/j.dajour.2023.100206
![]() |
[13] | Y. Zhang, J. Xu, Z. Wang, R. Geng, K. K. R. Choo, J. A. Perez-Díaz, et al., Efficient and intelligent attack detection in software-defined IoT networks. In: 2020 IEEE International Conference on Embedded Software and Systems (ICESS), 2020. https://doi.org/10.1109/ICESS49830.2020.9301591 |
[14] |
A. Aldaej, T. A. Ahanger, M. Atiquzzaman, I. Ullah, M. Yousufudin, Smart cybersecurity framework for IoT-empowered drones: Machine learning perspective, Sensors, 22 (2022), 2630. https://doi.org/10.3390/s22072630 doi: 10.3390/s22072630
![]() |
[15] |
M. Sarhan, S. Layeghy, N. Moustafa, M. Portmann, Cyber threat intelligence sharing scheme based on federated learning for network intrusion detection, J. Netw. Syst. Manage., 31(2023), 3. https://doi.org/10.1007/s10922-022-09691-3 doi: 10.1007/s10922-022-09691-3
![]() |
[16] |
H. HaddadPajouh, R. Khayami, A. Dehghantanha, K. K. R. Choo, R. M. Parizi, AI4SAFE-IoT: An AI-powered secure architecture for edge layer of the Internet of things, Neural Comput. Appl., 32 (2020), 16119–16133. https://doi.org/10.1007/s00521-020-04772-3 doi: 10.1007/s00521-020-04772-3
![]() |
[17] |
H. Makina, A. B. Letaifa, Bringing intelligence to Edge/Fog in Internet of Things‐based healthcare applications: Machine learning/deep learning‐based use cases, Int. J. Commun. Syst., 36 (2023), e5484. https://doi.org/10.1002/dac.5484 doi: 10.1002/dac.5484
![]() |
[18] | D. K. Gasu, Threat detection in cyber security using data mining and machine learning Techniques, In: Modern theories and practices for cyber ethics and security compliance, IGI Global, 2020,234–253. |
[19] |
M. Dahiya, N. Nitin, Developing a secure framework using feature selection and attack detection technique, Comput. Mater. Con., 74 (2023), 4183–4201. https://doi.org/10.32604/cmc.2023.032430 doi: 10.32604/cmc.2023.032430
![]() |
[20] |
K. S. Riya, R. Surendran, C. A. T. Romero, M. S. Sendil, Encryption with user authentication model for internet of medical things environment, Intell. Autom. Soft Comput., 35 (2023), 507–520. https://doi.org/10.32604/iasc.2023.027779 doi: 10.32604/iasc.2023.027779
![]() |
[21] |
N. Talpur, S. J. Abdulkadir, E. A. P. Akhir, M. H. Hasan, H. Alhussian, M. H. A. Abdullah, A novel bitwise arithmetic optimization algorithm for the rule base optimization of the deep neuro-fuzzy system, J. King Saud Univ.-Com., 35 (2023), 821–842. https://doi.org/10.1016/j.jksuci.2023.01.020 doi: 10.1016/j.jksuci.2023.01.020
![]() |
[22] |
K. Nagappan, S. Rajendran, Y. Alotaibi, Trust aware multi-objective metaheuristic optimization based secure route planning technique for cluster-based IoT environment, IEEE Access, 10 (2022), 112686–112694. https://doi.org/10.1109/ACCESS.2022.3211971 doi: 10.1109/ACCESS.2022.3211971
![]() |
[23] |
A. Yazdinejad, B. Zolfaghari, A. Dehghantanha, H. Karimipour, G. Srivastava, R. M. Parizi, Accurate threat hunting in industrial internet of things edge devices, Digit. Commun. Netw., 9 (2023), 1123–1130. https://doi.org/10.1016/j.dcan.2022.09.010 doi: 10.1016/j.dcan.2022.09.010
![]() |
[24] |
R. Surendran, Y. Alotaibi, A. Subahi, Lens-oppositional wild geese optimization based clustering scheme for wireless sensor networks assists real time disaster management, Comput. Syst. Sci. Eng., 46 (2023), 835–851. https://doi.org/10.32604/csse.2023.036757 doi: 10.32604/csse.2023.036757
![]() |
[25] | M. O. Pahl, F. X. Aubet, All eyes on you: Distributed multi-Dimensional IoT microservice anomaly detection, In: 2018 14th International Conference on Network and Service Management (CNSM), 2018, 72–80. |
[26] |
X. Yang, S. Li, Prediction of COVID-19 using a WOA-BILSTM model, Bioengineering, 10 (2023), 883. https://doi.org/10.3390/bioengineering10080883 doi: 10.3390/bioengineering10080883
![]() |
[27] |
F. Gabbay, R. L. Aharoni, O. Schweitzer, Deep neural network memory performance and throughput modeling and simulation framework, Mathematics, 10 (2022), 4144. https://doi.org/10.3390/math10214144 doi: 10.3390/math10214144
![]() |
[28] |
J. Mariselvam, S. Rajendran, Y. Alotaibi, Reinforcement learning-based AI assistant and VR play therapy game for children with Down syndrome bound to wheelchairs, AIMS Mathematics, 8 (2023), 16989–17011. https://doi.org/10.3934/math.2023867 doi: 10.3934/math.2023867
![]() |
[29] |
T. Tamilvizhi, Y. Alotaibi, S. Rajendran, K. Nagappan, Improved wolf swarm optimization with deep-learning-based movement analysis and self-regulated human activity recognition, AIMS Mathematics, 8 (2023), 12520–12539. https://doi.org/10.3934/math.2023629 doi: 10.3934/math.2023629
![]() |
1. | Ibtihal AlSaleh, Aida Al-Samawi, Liyth Nissirat, Novel Machine Learning Approach for DDoS Cloud Detection: Bayesian-Based CNN and Data Fusion Enhancements, 2024, 24, 1424-8220, 1418, 10.3390/s24051418 | |
2. | Rashmi Rane, Subhashini R, Surendran R, 2024, An Innovative Fake News Detection in Social Media with an Efficient Attention-Focused Transformer Slimmable Network, 979-8-3315-3313-7, 177, 10.1109/3ict64318.2024.10824334 | |
3. | Wei Sun, Malicious software identification based on deep learning algorithms and API feature extraction, 2025, 2025, 2510-523X, 10.1186/s13635-025-00197-4 | |
4. | Raghavendra Kulkarni, Venkata Satya Suresh kumar Kondeti, Binu Sudhakaran Pillai, Surendran R, 2025, ImConv_RNN: Improved Convolutional Recurrent Model Based Channel Estimation for 6G Networks, 979-8-3315-2392-3, 338, 10.1109/ICSADL65848.2025.10933349 | |
5. | Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Ali Algamdi, Usman Tariq, Machine learning-inspired intrusion detection system for IoT: Security issues and future challenges, 2025, 123, 00457906, 110265, 10.1016/j.compeleceng.2025.110265 | |
6. | Jayapratha Clement, Ramya R, T Gomathi, Surendran R, G. Kalyani, 2025, Empowering Women's Safety: Artificial Intelligence and IoT-Enabled Smart Wearable Device for Real-Time Monitoring and Emergency Assistance, 979-8-3315-2076-2, 1, 10.1109/IEMENTech65115.2025.10959569 |
Class | No. of Samples |
Normal Status | 10000 |
Anomalies | 10000 |
Total Samples | 20000 |
Class | \boldsymbol{A}\boldsymbol{c}\boldsymbol{c}{\boldsymbol{u}}_{\boldsymbol{y}} | \boldsymbol{P}\boldsymbol{r}\boldsymbol{e}{\boldsymbol{c}}_{\boldsymbol{n}} | \boldsymbol{R}\boldsymbol{e}\boldsymbol{c}{\boldsymbol{a}}_{\boldsymbol{l}} | {\boldsymbol{F}}_{\boldsymbol{S}\boldsymbol{c}\boldsymbol{o}\boldsymbol{r}\boldsymbol{e}} | {\boldsymbol{G}}_{\boldsymbol{M}\boldsymbol{e}\boldsymbol{a}\boldsymbol{s}\boldsymbol{u}\boldsymbol{r}\boldsymbol{e}} |
TR set (80%) | |||||
Normal Status | 99.02 | 96.42 | 99.02 | 97.70 | 97.71 |
Anomalies | 96.33 | 99.00 | 96.33 | 97.65 | 97.65 |
Average | 97.68 | 97.71 | 97.68 | 97.67 | 97.68 |
TS set (20%) | |||||
Normal Status | 99.30 | 97.22 | 99.30 | 98.25 | 98.26 |
Anomalies | 97.14 | 99.28 | 97.14 | 98.20 | 98.21 |
Average | 98.22 | 98.25 | 98.22 | 98.22 | 98.23 |
Class | \boldsymbol{A}\boldsymbol{c}\boldsymbol{c}{\boldsymbol{u}}_{\boldsymbol{y}} | \boldsymbol{P}\boldsymbol{r}\boldsymbol{e}{\boldsymbol{c}}_{\boldsymbol{n}} | \boldsymbol{R}\boldsymbol{e}\boldsymbol{c}{\boldsymbol{a}}_{\boldsymbol{l}} | {\boldsymbol{F}}_{\boldsymbol{S}\boldsymbol{c}\boldsymbol{o}\boldsymbol{r}\boldsymbol{e}} | {\boldsymbol{G}}_{\boldsymbol{M}\boldsymbol{e}\boldsymbol{a}\boldsymbol{s}\boldsymbol{u}\boldsymbol{r}\boldsymbol{e}} |
TR set (70%) | |||||
Normal Status | 96.14 | 97.77 | 96.14 | 96.94 | 96.95 |
Anomalies | 97.80 | 96.19 | 97.80 | 96.98 | 96.99 |
Average | 96.97 | 96.98 | 96.97 | 96.96 | 96.97 |
TS set (30%) | |||||
Normal Status | 96.02 | 97.98 | 96.02 | 96.99 | 97.00 |
Anomalies | 98.04 | 96.13 | 98.04 | 97.07 | 97.08 |
Average | 97.03 | 97.06 | 97.03 | 97.03 | 97.04 |
Model | \boldsymbol{P}\boldsymbol{r}\boldsymbol{e}{\boldsymbol{c}}_{\boldsymbol{n}} | \boldsymbol{A}\boldsymbol{c}\boldsymbol{c}{\boldsymbol{u}}_{\boldsymbol{y}} | {\boldsymbol{F}}_{\boldsymbol{S}\boldsymbol{c}\boldsymbol{o}\boldsymbol{r}\boldsymbol{e}} | \boldsymbol{R}\boldsymbol{e}\boldsymbol{c}{\boldsymbol{a}}_{\boldsymbol{l}} |
ICSFSO-ML | 98.25 | 98.22 | 98.22 | 98.22 |
DT Model | 95.40 | 96.70 | 92.10 | 93.30 |
LR Model | 93.10 | 94.50 | 91.70 | 92.50 |
SVM Model | 92.60 | 95.30 | 90.00 | 91.00 |
RF Model | 95.50 | 97.20 | 93.20 | 94.40 |
Deep Autoencoder | 93.79 | 94.71 | 92.71 | 93.46 |
Autoencoders | 89.81 | 84.86 | 90.85 | 91.90 |
Anomaly-IDS | 92.65 | 91.65 | 93.16 | 92.24 |
Class | No. of Samples |
Normal Status | 10000 |
Anomalies | 10000 |
Total Samples | 20000 |
Class | \boldsymbol{A}\boldsymbol{c}\boldsymbol{c}{\boldsymbol{u}}_{\boldsymbol{y}} | \boldsymbol{P}\boldsymbol{r}\boldsymbol{e}{\boldsymbol{c}}_{\boldsymbol{n}} | \boldsymbol{R}\boldsymbol{e}\boldsymbol{c}{\boldsymbol{a}}_{\boldsymbol{l}} | {\boldsymbol{F}}_{\boldsymbol{S}\boldsymbol{c}\boldsymbol{o}\boldsymbol{r}\boldsymbol{e}} | {\boldsymbol{G}}_{\boldsymbol{M}\boldsymbol{e}\boldsymbol{a}\boldsymbol{s}\boldsymbol{u}\boldsymbol{r}\boldsymbol{e}} |
TR set (80%) | |||||
Normal Status | 99.02 | 96.42 | 99.02 | 97.70 | 97.71 |
Anomalies | 96.33 | 99.00 | 96.33 | 97.65 | 97.65 |
Average | 97.68 | 97.71 | 97.68 | 97.67 | 97.68 |
TS set (20%) | |||||
Normal Status | 99.30 | 97.22 | 99.30 | 98.25 | 98.26 |
Anomalies | 97.14 | 99.28 | 97.14 | 98.20 | 98.21 |
Average | 98.22 | 98.25 | 98.22 | 98.22 | 98.23 |
Class | \boldsymbol{A}\boldsymbol{c}\boldsymbol{c}{\boldsymbol{u}}_{\boldsymbol{y}} | \boldsymbol{P}\boldsymbol{r}\boldsymbol{e}{\boldsymbol{c}}_{\boldsymbol{n}} | \boldsymbol{R}\boldsymbol{e}\boldsymbol{c}{\boldsymbol{a}}_{\boldsymbol{l}} | {\boldsymbol{F}}_{\boldsymbol{S}\boldsymbol{c}\boldsymbol{o}\boldsymbol{r}\boldsymbol{e}} | {\boldsymbol{G}}_{\boldsymbol{M}\boldsymbol{e}\boldsymbol{a}\boldsymbol{s}\boldsymbol{u}\boldsymbol{r}\boldsymbol{e}} |
TR set (70%) | |||||
Normal Status | 96.14 | 97.77 | 96.14 | 96.94 | 96.95 |
Anomalies | 97.80 | 96.19 | 97.80 | 96.98 | 96.99 |
Average | 96.97 | 96.98 | 96.97 | 96.96 | 96.97 |
TS set (30%) | |||||
Normal Status | 96.02 | 97.98 | 96.02 | 96.99 | 97.00 |
Anomalies | 98.04 | 96.13 | 98.04 | 97.07 | 97.08 |
Average | 97.03 | 97.06 | 97.03 | 97.03 | 97.04 |
Model | \boldsymbol{P}\boldsymbol{r}\boldsymbol{e}{\boldsymbol{c}}_{\boldsymbol{n}} | \boldsymbol{A}\boldsymbol{c}\boldsymbol{c}{\boldsymbol{u}}_{\boldsymbol{y}} | {\boldsymbol{F}}_{\boldsymbol{S}\boldsymbol{c}\boldsymbol{o}\boldsymbol{r}\boldsymbol{e}} | \boldsymbol{R}\boldsymbol{e}\boldsymbol{c}{\boldsymbol{a}}_{\boldsymbol{l}} |
ICSFSO-ML | 98.25 | 98.22 | 98.22 | 98.22 |
DT Model | 95.40 | 96.70 | 92.10 | 93.30 |
LR Model | 93.10 | 94.50 | 91.70 | 92.50 |
SVM Model | 92.60 | 95.30 | 90.00 | 91.00 |
RF Model | 95.50 | 97.20 | 93.20 | 94.40 |
Deep Autoencoder | 93.79 | 94.71 | 92.71 | 93.46 |
Autoencoders | 89.81 | 84.86 | 90.85 | 91.90 |
Anomaly-IDS | 92.65 | 91.65 | 93.16 | 92.24 |