An Optimized Multiclass Machine Learning Approach for Detecting Advanced Intrusions in IoT Systems

Authors

  • Mostafa Ibrahim Labib Department of Computer Science, Higher Future Institute for Specialized Technological Studies, Egypt
  • Mohamed Salah Mohamed Department of Computer Science, Faculty of Computer and Information, Suez University, Egypt
  • Amira Ibrahim El-Desokey Department of Basic Sciences, Higher Future Institute for Specialized Technological Studies, Egypt
  • Fatma Harby Mohamed Department of Computer Science, Higher Future Institute for Specialized Technological Studies, Egypt | College of Communication Techniques Engineering, Al-Farahidi University, Baghdad, Iraq
Volume: 16 | Issue: 1 | Pages: 32564-32569 | February 2026 | https://doi.org/10.48084/etasr.15800

Abstract

Intrusion Detection Systems (IDS) play a vital role in securing Internet of Things (IoT) networks against cyber-attacks. Previous work used a binary classification approach to detect only Denial-of-Service (DoS) attacks. This paper presents an improved multiclass IDS that identifies multiple attack types. The proposed approach uses simulated IoTID20-based traffic datasets to classify Normal, Denial-of-Service, Mirai botnet, Man-in-the-Middle (MITM), and Scan activity attacks. The proposed approach uses a combination of feature selection methods, including correlation-based filtering and a genetic algorithm, followed by machine learning classifiers such as Decision Tree (DT), Random Forest (RF), K-Nearest Neighbors (KNN), and Support Vector Machine (SVM). Experimental results show a significant improvement in classification performance. The RF classifier with Genetic Algorithm (GA)-based feature selection achieved the highest accuracy (96.5%), followed closely by DT and SVM. Therefore, based on our theoretical and experimental comparisons, the proposed approach could be a practical step toward deploying more robust, realistic IDS models in IoT environments.

Keywords:

intrusion detection system, internet of things, denial-of-service attacks, man-in-the-middle attacks, scan activities attacks, decision tree, random forest, k-nearest neighbors, support vector machine

Downloads

Download data is not yet available.

References

N. A. Alsharif, S. Mishra, and M. Alshehri, "IDS in IoT using Machine ‎Learning and Blockchain," Engineering, Technology & Applied Science Research, vol. 13, no. 4, pp. 11197–11203, Aug. 2023. DOI: https://doi.org/10.48084/etasr.5992

C. Khammassi and S. Krichen, "A GA-LR wrapper approach for feature selection in network intrusion detection," Computers & Security, vol. 70, pp. 255–277, Sept. 2017. DOI: https://doi.org/10.1016/j.cose.2017.06.005

Z. Halim et al., "An effective genetic algorithm-based feature selection method for intrusion detection systems," Computers & Security, vol. 110, Nov. 2021, Art. no. 102448. DOI: https://doi.org/10.1016/j.cose.2021.102448

R. A. Al Hasan and E. K. Hamza, "An Improved Intrusion Detection System Using Machine Learning with Singular Value Decomposition and Principal Component Analysis," International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 25–38, Apr. 2023A. Verma and V. Ranga, "Machine Learning Based Intrusion Detection Systems for IoT Applications," Wireless Personal Communications, vol. 111, no. 4, pp. 2287–2310, Apr. 2020.

A. Verma and V. Ranga, "Machine Learning Based Intrusion Detection Systems for IoT Applications," Wireless Personal Communications, vol. 111, no. 4, pp. 2287–2310, Apr. 2020. DOI: https://doi.org/10.1007/s11277-019-06986-8

P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits, "Denial-of-Service detection in 6LoWPAN based Internet of Things," in 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), July 2013, pp. 600–607. DOI: https://doi.org/10.1109/WiMOB.2013.6673419

B. Ingre and A. Yadav, "Performance analysis of NSL-KDD dataset using ANN," in 2015 International Conference on Signal Processing and Communication Engineering Systems, Jan. 2015, pp. 92–96. DOI: https://doi.org/10.1109/SPACES.2015.7058223

Y. Meidan et al., "Detection of Unauthorized IoT Devices Using Machine Learning Techniques." arXiv, Sept. 14, 2017.

R. Doshi, N. Apthorpe, and N. Feamster, "Machine Learning DDoS Detection for Consumer Internet of Things Devices," in 2018 IEEE Security and Privacy Workshops (SPW), Feb. 2018, pp. 29–35. DOI: https://doi.org/10.1109/SPW.2018.00013

E. Anthi, L. Williams, and P. Burnap, "Pulse: An adaptive intrusion detection for the Internet of Things," in Living in the Internet of Things: Cybersecurity of the IoT - 2018, Mar. 2018, pp. 1–4. DOI: https://doi.org/10.1049/cp.2018.0035

Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, "Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation," in Advanced Information Networking and Applications, Cham, 2020, pp. 458–469. DOI: https://doi.org/10.1007/978-3-030-15032-7_39

N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, "Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset," Future Generation Computer Systems, vol. 100, pp. 779–796, Nov. 2019. DOI: https://doi.org/10.1016/j.future.2019.05.041

I. Mukherjee, N. K. Sahu, and S. K. Sahana, "Simulation and Modeling for Anomaly Detection in IoT Network Using Machine Learning," International Journal of Wireless Information Networks, vol. 30, no. 2, pp. 173–189, June 2023. DOI: https://doi.org/10.1007/s10776-021-00542-7

E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, "Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms," Sensors, vol. 24, no. 2, Jan. 2024, Art. no. 713. DOI: https://doi.org/10.3390/s24020713

E. F. Khairullah and N. Alsenani, "A Comprehensive Study of Deep Learning Models for Intrusion Detection in IoT Devices," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21029–21036, Apr. 2025. DOI: https://doi.org/10.48084/etasr.9490

I. Ullah and Q. H. Mahmoud, "A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks," in Advances in Artificial Intelligence, Cham, 2020, pp. 508–520. DOI: https://doi.org/10.1007/978-3-030-47358-7_52

I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy, and H. Ming, "AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning," in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Jan. 2019, pp. 0305–0310. DOI: https://doi.org/10.1109/CCWC.2019.8666450

M. A. Alsheikh, S. Lin, D. Niyato, and H.-P. Tan, "Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications," IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1996–2018, 2014. DOI: https://doi.org/10.1109/COMST.2014.2320099

H. Tyagi and R. Kumar, "Attack and Anomaly Detection in IoT Networks Using Supervised Machine Learning Approaches," Revue d’Intelligence Artificielle, vol. 35, no. 1, pp. 11–21, Feb. 2021. DOI: https://doi.org/10.18280/ria.350102

G. Thamilarasu and S. Chawla, "Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things," Sensors, vol. 19, no. 9, Jan. 2019, Art. no. 1977. DOI: https://doi.org/10.3390/s19091977

Downloads

How to Cite

[1]
M. I. Labib, M. S. Mohamed, A. I. El-Desokey, and F. H. Mohamed, “An Optimized Multiclass Machine Learning Approach for Detecting Advanced Intrusions in IoT Systems”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 1, pp. 32564–32569, Feb. 2026.

Metrics

Abstract Views: 85
PDF Downloads: 47

Metrics Information