Detecting Zero-Day Attacks Using Deep Learning with Pelican Optimization Algorithm in IIoT Environments

Authors

  • Khalid Ammar Department of Electrical and Computer Engineering, College of Engineering and Information Technology, Ajman University, Ajman, UAE
  • Mohamad Khairi Ishak Department of Electrical and Computer Engineering, College of Engineering and Information Technology, Ajman University, Ajman, UAE
Volume: 16 | Issue: 1 | Pages: 30703-30709 | February 2026 | https://doi.org/10.48084/etasr.13778

Abstract

5G arises as the base for the Industrial Internet of Things (IIoT); it enables the unified, low-latency hybrid of cloud computing and Artificial intelligence (AI), thus strengthening the complete industrial process within a structure of intelligent and smart IIoT environments. Simultaneously, the constantly evolving landscape of cybersecurity hazards in the Internet of Things (IoT) domain presents opportunities for enhanced safety complexities. Recognizing zero-day threats is a challenging task due to the indefinite nature of security exposures. This study proposes a new Metaheuristic Optimization Algorithm with Deep Learning Enabled Zero-Day Attack Detection (MHOA-DLZDAD) method for IIoT frameworks. The MHOA-DLZDAD method automates and effectively detects zero-day attacks. Initially, the MHOA-DLZDAD model undergoes min-max scalarization using data pre-processing to convert actual data into a suitable format. Moreover, the Elman Recurrent Neural Network (ERNN) method is utilized to detect zero-day attacks. Furthermore, the Pelican Optimization Algorithm (POA) method is employed for tuning the parameters. The experimental analysis of the MHOA-DLZDAD approach is conducted on a benchmark dataset, and the comparison study reveals a higher accuracy of 99.56% compared to other studies.

Keywords:

pelican optimization algorithm, deep learning, zero-day attack, min-max scalar, industrial internet of things

Downloads

Download data is not yet available.

References

T. M. Booij, I. Chiscop, E. Meeuwissen, N. Moustafa, and F. T. H. D. Hartog, "ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets," IEEE Internet of Things Journal, vol. 9, no. 1, pp. 485–496, Jan. 2022. DOI: https://doi.org/10.1109/JIOT.2021.3085194

A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, and A. Anwar, "TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems," IEEE Access, vol. 8, pp. 165130–165150, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3022862

M. S. Elsayed, N. A. Le-Khac, S. Dev, and A. D. Jurcut, "DDoSNet: A Deep-Learning Model for Detecting Network Attacks," in 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks", Cork, Ireland, Aug. 2020, pp. 391–396. DOI: https://doi.org/10.1109/WoWMoM49955.2020.00072

M. A. Ahmed and S. Alnatheer, "Intrusion Detection in a Digital Twin-Enabled Secure Industrial Internet of Things Environment for Industrial Sustainability," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21263–21269, Apr. 2025. DOI: https://doi.org/10.48084/etasr.10128

M. S. Elsayed, N.A. Le-Khac, M. A. Azer, and A. D. Jurcut, "A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs," IEEE Transactions on Cognitive Communications and Networking, vol. 8, no. 4, pp. 1862–1880, Dec. 2022. DOI: https://doi.org/10.1109/TCCN.2022.3186331

M. I. H. Okfie and S. Mishra, "Anomaly Detection in IIoT Transactions using Machine Learning: A Lightweight Blockchain-based Approach," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 14645–14653, June 2024. DOI: https://doi.org/10.48084/etasr.7384

Y. Li et al., "A Survey on Dropout Methods and Experimental Verification in Recommendation," IEEE Transactions on Knowledge and Data Engineering, pp. 6595–6615, 2022. DOI: https://doi.org/10.1109/TKDE.2022.3187013

C. Atheeq, R. Sultana, S. A. Sabahath, and M. A. K. Mohammed, "Advancing IoT Cybersecurity: Adaptive Threat Identification with Deep Learning in Cyber-Physical Systems," Engineering, Technology & Applied Science Research, vol. 14, no. 2, pp. 13559–13566, Apr. 2024. DOI: https://doi.org/10.48084/etasr.6969

R. H. Hwang, M. C. Peng, C. W. Huang, P.-C. Lin, and V.-L. Nguyen, "An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection," IEEE Access, vol. 8, pp. 30387–30399, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2973023

Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, "An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks," IEEE Access, vol. 7, pp. 42210–42219, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2904620

P. B. Arun, V. Mohan and K. V. Kumar, "Hybrid Metaheuristics with Deep Learning Enabled Cyberattack Prevention in Software Defined Networks," Tehnicki vjesnik - Technical Gazette, vol. 31, no. 1, Feb. 2024. DOI: https://doi.org/10.17559/TV-20230621000752

S. K. Gupta, M. Tripathi, and J. Grover, "Hybrid Optimization and Deep Learning Based Intrusion Detection System," Computers and Electrical Engineering, vol. 100, May 2022, Art. no. 107876. DOI: https://doi.org/10.1016/j.compeleceng.2022.107876

J. Manokaran and G. Vairavel, "DL-ADS: Improved Grey Wolf Optimization Enabled AE-LSTM Technique for Efficient Network Anomaly Detection in Internet of Thing Edge Computing," IEEE Access, vol. 12, pp. 75983–76002, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3405628

P. Manickam et al., "Billiard Based Optimization With Deep Learning Driven Anomaly Detection in Internet of Things Assisted Sustainable Smart Cities," Alexandria Engineering Journal, vol. 83, pp. 102–112, Nov. 2023. DOI: https://doi.org/10.1016/j.aej.2023.10.039

A. Shali, A. Chinnasamy, and P. Selvakumari, "Development of Novel Intrusion Detection in Internet of Things Using Improved Dart Game Optimizer‐derived Optimal Cascaded Ensemble Learning," Transactions on Emerging Telecommunications Technologies, vol. 35, no. 7, July 2024, Art. no. e5018. DOI: https://doi.org/10.1002/ett.5018

A. Alsirhani, M. Mujib Alshahrani, A. M. Hassan, A. I. Taloba, R. M. Abd El-Aziz, and A. H. Samak, "Implementation of African vulture optimization algorithm based on deep learning for cybersecurity intrusion detection," Alexandria Engineering Journal, vol. 79, pp. 105–115, Sept. 2023. DOI: https://doi.org/10.1016/j.aej.2023.07.077

S. Shen, C. Cai, Z. Li, Y. Shen, G. Wu, and S. Yu, "Deep Q-Network-Based Heuristic Intrusion Detection Against Edge-Based SIoT Zero-Day Attacks," Applied Soft Computing, vol. 150, Jan. 2024, Art. no. 111080. DOI: https://doi.org/10.1016/j.asoc.2023.111080

M. Soltani, B. Ousat, M. Jafari Siavoshani, and A. H. Jahangir, "An Adaptable Deep Learning-based Intrusion Detection System to Zero-day Attacks," Journal of Information Security and Applications, vol. 76, Aug. 2023, Art. no. 103516. DOI: https://doi.org/10.1016/j.jisa.2023.103516

H. Cui, T. Xue, Y. Liu, and B. Liu, "Transferable Intrusion Detection Model for Industrial Internet Based on Deep Learning: IIDS Model Combining Hybrid Deep Learning Model and Transfer Learning," in Proceedings of the 2024 3rd International Conference on Cryptography, Network Security and Communication Technology, Harbin, China, Jan. 2024, pp. 107–113. DOI: https://doi.org/10.1145/3673277.3673296

X. Wang, Y. Wang, Z. Javaheri, L. Almutairi, N. Moghadamnejad, and O. S. Younes, "Federated Deep Learning for Anomaly Detection in the Internet of Things," Computers and Electrical Engineering, vol. 108, May 2023, Art. no. 108651. DOI: https://doi.org/10.1016/j.compeleceng.2023.108651

K. Saurabh, V. Sharma, U. Singh, R. Khondoker, R. Vyas, and O. P. Vyas, "HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT," Arabian Journal for Science and Engineering, vol. 50, no. 2, pp. 1307–1327, Jan. 2025. DOI: https://doi.org/10.1007/s13369-024-08935-5

P. L. S. Jayalaxmi, R. Saha, G. Kumar, M. Alazab, M. Conti, and X. Cheng, "PIGNUS: A Deep Learning Model for IDS in Industrial Internet-of-Things," Computers and Security, vol. 132, Sept. 2023, Art. no. 103315. DOI: https://doi.org/10.1016/j.cose.2023.103315

A. Arun, A. S. Nair, and A. G. Sreedevi, "Zero Day Attack Detection and Simulation through Deep Learning Techniques," in 14th International Conference on Cloud Computing, Data Science and Engineering (Confluence), Noida, India, Jan. 2024, pp. 852–857. DOI: https://doi.org/10.1109/Confluence60223.2024.10463429

J. Zhang, S. Liang, F. Ye, R. Q. Hu, and Y. Qian, "Towards Detection of Zero-Day Botnet Attack in IoT Networks Using Federated Learning," in ICC 2023 - IEEE International Conference on Communications, Rome, Italy, May 2023, pp. 7–12. DOI: https://doi.org/10.1109/ICC45041.2023.10279423

M. Sayduzzaman, A. Rahman, J. T. Tamanna, D. Kundu, and T. Rahman, "Interoperability and Explicable AI-based Zero-Day Attacks Detection Process in Smart Community." arXiv, Oct. 11, 2025.

G. Parimala and R. Kayalvizhi, "Improved Elman Deep Learning Model for Intrusion Detection System in Internet of Things," Journal of Internet Services and Information Security, vol. 14, no. 1, pp. 121–137, Mar. 2024. DOI: https://doi.org/10.58346/JISIS.2024.I1.008

A. R. Sagor et al., "Pelican Optimization Algorithm-Based Proportional–Integral–Derivative Controller for Superior Frequency Regulation in Interconnected Multi-Area Power Generating System," Energies, vol. 17, no. 13, July 2024, Art. no. 3308. DOI: https://doi.org/10.3390/en17133308

Z. Hasan, "NSL-KDD Dataset." Kaggle, 2018, [Online]. Available: https://www.kaggle.com/datasets/hassan06/NSL-KDD.

I. Priyadarshini, "Anomaly Detection of IoT Cyberattacks in Smart Cities Using Federated Learning and Split Learning," Big Data and Cognitive Computing, vol. 8, no. 3, Feb. 2024, Art. no. 21. DOI: https://doi.org/10.3390/bdcc8030021

A. Meliboev, J. Alikhanov, and W. Kim, "Performance Evaluation of Deep Learning Based Network Intrusion Detection System across Multiple Balanced and Imbalanced Datasets," Electronics, vol. 11, no. 4, Feb. 2022, Art. no. 515. DOI: https://doi.org/10.3390/electronics11040515

G. Nassreddine, M. Nassereddine, and O. Al-Khatib, "Ensemble Learning for Network Intrusion Detection Based on Correlation and Embedded Feature Selection Techniques," Computers, vol. 14, no. 3, Feb. 2025, Art. no. 82. DOI: https://doi.org/10.3390/computers14030082

O. H. Abdulganiyu, T. Ait Tchakoucht, A. E. H. Alaoui, and Y. K. Saheed, "Attention-driven Multi-model Architecture for Unbalanced Network Traffic Intrusion Detection via Extreme Gradient Boosting," Intelligent Systems with Applications, vol. 26, June 2025, Art. no. 200519. DOI: https://doi.org/10.1016/j.iswa.2025.200519

Downloads

How to Cite

[1]
K. Ammar and M. K. Ishak, “Detecting Zero-Day Attacks Using Deep Learning with Pelican Optimization Algorithm in IIoT Environments”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 1, pp. 30703–30709, Feb. 2026.

Metrics

Abstract Views: 197
PDF Downloads: 145

Metrics Information