Detecting Zero-Day Attacks Using Deep Learning with Pelican Optimization Algorithm in IIoT Environments
Corresponding author: Mohamad Khairi Ishak
Abstract
5G arises as the base for the Industrial Internet of Things (IIoT); it enables the unified, low-latency hybrid of cloud computing and Artificial intelligence (AI), thus strengthening the complete industrial process within a structure of intelligent and smart IIoT environments. Simultaneously, the constantly evolving landscape of cybersecurity hazards in the Internet of Things (IoT) domain presents opportunities for enhanced safety complexities. Recognizing zero-day threats is a challenging task due to the indefinite nature of security exposures. This study proposes a new Metaheuristic Optimization Algorithm with Deep Learning Enabled Zero-Day Attack Detection (MHOA-DLZDAD) method for IIoT frameworks. The MHOA-DLZDAD method automates and effectively detects zero-day attacks. Initially, the MHOA-DLZDAD model undergoes min-max scalarization using data pre-processing to convert actual data into a suitable format. Moreover, the Elman Recurrent Neural Network (ERNN) method is utilized to detect zero-day attacks. Furthermore, the Pelican Optimization Algorithm (POA) method is employed for tuning the parameters. The experimental analysis of the MHOA-DLZDAD approach is conducted on a benchmark dataset, and the comparison study reveals a higher accuracy of 99.56% compared to other studies.
Keywords:
pelican optimization algorithm, deep learning, zero-day attack, min-max scalar, industrial internet of thingsDownloads
References
T. M. Booij, I. Chiscop, E. Meeuwissen, N. Moustafa, and F. T. H. D. Hartog, "ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets," IEEE Internet of Things Journal, vol. 9, no. 1, pp. 485–496, Jan. 2022. DOI: https://doi.org/10.1109/JIOT.2021.3085194
A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, and A. Anwar, "TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems," IEEE Access, vol. 8, pp. 165130–165150, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3022862
M. S. Elsayed, N. A. Le-Khac, S. Dev, and A. D. Jurcut, "DDoSNet: A Deep-Learning Model for Detecting Network Attacks," in 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks", Cork, Ireland, Aug. 2020, pp. 391–396. DOI: https://doi.org/10.1109/WoWMoM49955.2020.00072
M. A. Ahmed and S. Alnatheer, "Intrusion Detection in a Digital Twin-Enabled Secure Industrial Internet of Things Environment for Industrial Sustainability," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21263–21269, Apr. 2025. DOI: https://doi.org/10.48084/etasr.10128
M. S. Elsayed, N.A. Le-Khac, M. A. Azer, and A. D. Jurcut, "A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs," IEEE Transactions on Cognitive Communications and Networking, vol. 8, no. 4, pp. 1862–1880, Dec. 2022. DOI: https://doi.org/10.1109/TCCN.2022.3186331
M. I. H. Okfie and S. Mishra, "Anomaly Detection in IIoT Transactions using Machine Learning: A Lightweight Blockchain-based Approach," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 14645–14653, June 2024. DOI: https://doi.org/10.48084/etasr.7384
Y. Li et al., "A Survey on Dropout Methods and Experimental Verification in Recommendation," IEEE Transactions on Knowledge and Data Engineering, pp. 6595–6615, 2022. DOI: https://doi.org/10.1109/TKDE.2022.3187013
C. Atheeq, R. Sultana, S. A. Sabahath, and M. A. K. Mohammed, "Advancing IoT Cybersecurity: Adaptive Threat Identification with Deep Learning in Cyber-Physical Systems," Engineering, Technology & Applied Science Research, vol. 14, no. 2, pp. 13559–13566, Apr. 2024. DOI: https://doi.org/10.48084/etasr.6969
R. H. Hwang, M. C. Peng, C. W. Huang, P.-C. Lin, and V.-L. Nguyen, "An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection," IEEE Access, vol. 8, pp. 30387–30399, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2973023
Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, "An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks," IEEE Access, vol. 7, pp. 42210–42219, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2904620
P. B. Arun, V. Mohan and K. V. Kumar, "Hybrid Metaheuristics with Deep Learning Enabled Cyberattack Prevention in Software Defined Networks," Tehnicki vjesnik - Technical Gazette, vol. 31, no. 1, Feb. 2024. DOI: https://doi.org/10.17559/TV-20230621000752
S. K. Gupta, M. Tripathi, and J. Grover, "Hybrid Optimization and Deep Learning Based Intrusion Detection System," Computers and Electrical Engineering, vol. 100, May 2022, Art. no. 107876. DOI: https://doi.org/10.1016/j.compeleceng.2022.107876
J. Manokaran and G. Vairavel, "DL-ADS: Improved Grey Wolf Optimization Enabled AE-LSTM Technique for Efficient Network Anomaly Detection in Internet of Thing Edge Computing," IEEE Access, vol. 12, pp. 75983–76002, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3405628
P. Manickam et al., "Billiard Based Optimization With Deep Learning Driven Anomaly Detection in Internet of Things Assisted Sustainable Smart Cities," Alexandria Engineering Journal, vol. 83, pp. 102–112, Nov. 2023. DOI: https://doi.org/10.1016/j.aej.2023.10.039
A. Shali, A. Chinnasamy, and P. Selvakumari, "Development of Novel Intrusion Detection in Internet of Things Using Improved Dart Game Optimizer‐derived Optimal Cascaded Ensemble Learning," Transactions on Emerging Telecommunications Technologies, vol. 35, no. 7, July 2024, Art. no. e5018. DOI: https://doi.org/10.1002/ett.5018
A. Alsirhani, M. Mujib Alshahrani, A. M. Hassan, A. I. Taloba, R. M. Abd El-Aziz, and A. H. Samak, "Implementation of African vulture optimization algorithm based on deep learning for cybersecurity intrusion detection," Alexandria Engineering Journal, vol. 79, pp. 105–115, Sept. 2023. DOI: https://doi.org/10.1016/j.aej.2023.07.077
S. Shen, C. Cai, Z. Li, Y. Shen, G. Wu, and S. Yu, "Deep Q-Network-Based Heuristic Intrusion Detection Against Edge-Based SIoT Zero-Day Attacks," Applied Soft Computing, vol. 150, Jan. 2024, Art. no. 111080. DOI: https://doi.org/10.1016/j.asoc.2023.111080
M. Soltani, B. Ousat, M. Jafari Siavoshani, and A. H. Jahangir, "An Adaptable Deep Learning-based Intrusion Detection System to Zero-day Attacks," Journal of Information Security and Applications, vol. 76, Aug. 2023, Art. no. 103516. DOI: https://doi.org/10.1016/j.jisa.2023.103516
H. Cui, T. Xue, Y. Liu, and B. Liu, "Transferable Intrusion Detection Model for Industrial Internet Based on Deep Learning: IIDS Model Combining Hybrid Deep Learning Model and Transfer Learning," in Proceedings of the 2024 3rd International Conference on Cryptography, Network Security and Communication Technology, Harbin, China, Jan. 2024, pp. 107–113. DOI: https://doi.org/10.1145/3673277.3673296
X. Wang, Y. Wang, Z. Javaheri, L. Almutairi, N. Moghadamnejad, and O. S. Younes, "Federated Deep Learning for Anomaly Detection in the Internet of Things," Computers and Electrical Engineering, vol. 108, May 2023, Art. no. 108651. DOI: https://doi.org/10.1016/j.compeleceng.2023.108651
K. Saurabh, V. Sharma, U. Singh, R. Khondoker, R. Vyas, and O. P. Vyas, "HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT," Arabian Journal for Science and Engineering, vol. 50, no. 2, pp. 1307–1327, Jan. 2025. DOI: https://doi.org/10.1007/s13369-024-08935-5
P. L. S. Jayalaxmi, R. Saha, G. Kumar, M. Alazab, M. Conti, and X. Cheng, "PIGNUS: A Deep Learning Model for IDS in Industrial Internet-of-Things," Computers and Security, vol. 132, Sept. 2023, Art. no. 103315. DOI: https://doi.org/10.1016/j.cose.2023.103315
A. Arun, A. S. Nair, and A. G. Sreedevi, "Zero Day Attack Detection and Simulation through Deep Learning Techniques," in 14th International Conference on Cloud Computing, Data Science and Engineering (Confluence), Noida, India, Jan. 2024, pp. 852–857. DOI: https://doi.org/10.1109/Confluence60223.2024.10463429
J. Zhang, S. Liang, F. Ye, R. Q. Hu, and Y. Qian, "Towards Detection of Zero-Day Botnet Attack in IoT Networks Using Federated Learning," in ICC 2023 - IEEE International Conference on Communications, Rome, Italy, May 2023, pp. 7–12. DOI: https://doi.org/10.1109/ICC45041.2023.10279423
M. Sayduzzaman, A. Rahman, J. T. Tamanna, D. Kundu, and T. Rahman, "Interoperability and Explicable AI-based Zero-Day Attacks Detection Process in Smart Community." arXiv, Oct. 11, 2025.
G. Parimala and R. Kayalvizhi, "Improved Elman Deep Learning Model for Intrusion Detection System in Internet of Things," Journal of Internet Services and Information Security, vol. 14, no. 1, pp. 121–137, Mar. 2024. DOI: https://doi.org/10.58346/JISIS.2024.I1.008
A. R. Sagor et al., "Pelican Optimization Algorithm-Based Proportional–Integral–Derivative Controller for Superior Frequency Regulation in Interconnected Multi-Area Power Generating System," Energies, vol. 17, no. 13, July 2024, Art. no. 3308. DOI: https://doi.org/10.3390/en17133308
Z. Hasan, "NSL-KDD Dataset." Kaggle, 2018, [Online]. Available: https://www.kaggle.com/datasets/hassan06/NSL-KDD.
I. Priyadarshini, "Anomaly Detection of IoT Cyberattacks in Smart Cities Using Federated Learning and Split Learning," Big Data and Cognitive Computing, vol. 8, no. 3, Feb. 2024, Art. no. 21. DOI: https://doi.org/10.3390/bdcc8030021
A. Meliboev, J. Alikhanov, and W. Kim, "Performance Evaluation of Deep Learning Based Network Intrusion Detection System across Multiple Balanced and Imbalanced Datasets," Electronics, vol. 11, no. 4, Feb. 2022, Art. no. 515. DOI: https://doi.org/10.3390/electronics11040515
G. Nassreddine, M. Nassereddine, and O. Al-Khatib, "Ensemble Learning for Network Intrusion Detection Based on Correlation and Embedded Feature Selection Techniques," Computers, vol. 14, no. 3, Feb. 2025, Art. no. 82. DOI: https://doi.org/10.3390/computers14030082
O. H. Abdulganiyu, T. Ait Tchakoucht, A. E. H. Alaoui, and Y. K. Saheed, "Attention-driven Multi-model Architecture for Unbalanced Network Traffic Intrusion Detection via Extreme Gradient Boosting," Intelligent Systems with Applications, vol. 26, June 2025, Art. no. 200519. DOI: https://doi.org/10.1016/j.iswa.2025.200519
Downloads
How to Cite
License
Copyright (c) 2025 Khalid Ammar, Mohamad Khairi Ishak

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
