Smart City Gnosys

Smart city article details

Title Intrusion Detection System In Iot Smart City Environment Using Tree-Based Approach With Swarm-Based Optimization For Multi-Step Cyber-Attack Dataset
ID_Doc 33343
Authors Reddy D.K.K.; Nayak J.; Mishra M.
Year 2023
Published 2023 1st International Conference on Circuits, Power, and Intelligent Systems, CCPIS 2023
DOI http://dx.doi.org/10.1109/CCPIS59145.2023.10291485
Abstract With the popularity of IoT technologies, security has become a significant concern. IDS is a crucial component that analyses IoT network activity and categorizes it as either normal or anomalous due to susceptible attacks from hackers. An IDS safeguards a system's availability, integrity, and confidentiality. Because of resource constraints and algorithmic complexity, traditional ML IDS have drawbacks when applied to IoT networks. A lightweight IoT IDS that is optimal, inexpensive, and can minimize the loss function. So, to find the optimal model parameter values of the ML algorithm, hyperparameter tuning is performed by using populationbased swarm algorithms. The swarm-based algorithms control the learning process to extract the ML algorithms' relevant parameters and ultimately learn. A comparative study between the proposed hyperparameter tuning and default parameters predictions is made. The experimental results confirmed that the suggested strategy improves the security of the IoT environment. This approach is evaluated and determined to be promising on the Multi-Step Cyber-Attack (MSCA) benchmark IDS dataset. Additionally, the suggested method outperforms standard Tree-based ML parameters in accuracy while achieving a satisfactory trade-off between effectiveness and productivity. © 2023 IEEE.
Author Keywords Intrusion Detection System (IDS); IoT (Internet of Things); Swarm-based optimization


Similar Articles


Id Similarity Authors Title Published
37199 View0.91Al-Ambusaidi M.; Yinjun Z.; Muhammad Y.; Yahya A.Ml-Ids: An Efficient Ml-Enabled Intrusion Detection System For Securing Iot Networks And ApplicationsSoft Computing, 28, 2 (2024)
8070 View0.901Indra G.; Nirmala E.; Nirmala G.; Senthilvel P.G.An Ensemble Learning Approach For Intrusion Detection In Iot-Based Smart CitiesPeer-to-Peer Networking and Applications, 17, 6 (2024)
2510 View0.895Florrence J.M.; Antoinette A.; Buvaneswari S.; Wanare A.L.; Vashistha A.; Mulpuri M.; Rambabu R.A Mathematical Model For Enhancing Cybersecurity In Iot Networks Using Lstm-Based Anomaly Detection And OptimizationCommunications on Applied Nonlinear Analysis, 32, 2 (2025)
33346 View0.893Berhili M.; Chaieb O.; Benabdellah M.Intrusion Detection Systems In Iot Based On Machine Learning: A State Of The ArtProcedia Computer Science, 251 (2024)
2052 View0.891Elsayed R.; Hamada R.; Hammoudeh M.; Abdalla M.; Elsaid S.A.A Hierarchical Deep Learning-Based Intrusion Detection Architecture For Clustered Internet Of ThingsJournal of Sensor and Actuator Networks, 12, 1 (2023)
36080 View0.891Ahanger T.A.; Ullah I.; Algamdi S.A.; Tariq U.Machine Learning-Inspired Intrusion Detection System For Iot: Security Issues And Future ChallengesComputers and Electrical Engineering, 123 (2025)
57650 View0.89Hazman C.; Guezzaz A.; Benkirane S.; Azrour M.Toward An Intrusion Detection Model For Iot-Based Smart EnvironmentsMultimedia Tools and Applications, 83, 22 (2024)
29797 View0.886Gupta S.K.; Tripathi M.; Grover J.Hybrid Optimization And Deep Learning Based Intrusion Detection SystemComputers and Electrical Engineering, 100 (2022)
27812 View0.886Alabdulwahab S.; Kim Y.-T.; Seo A.; Son Y.Generating Synthetic Dataset For Ml-Based Ids Using Ctgan And Feature Selection To Protect Smart Iot EnvironmentsApplied Sciences (Switzerland), 13, 19 (2023)
33326 View0.885Singh R.; Ujjwal R.L.Intrusion Detection And Prevention System For Smart Iot NetworkLecture Notes in Electrical Engineering, 1280 (2025)