Anomaly-based Intrusion Detection in IoT using Enhanced Kepler Optimization Algorithm for Feature Selection
Abstract
The proliferation of Internet of Things (IoT) devices has increased the risk of botnet attacks due to the inherent vulnerabilities of IoT networks. To mitigate this threat, this study presents an anomaly-based intrusion detection framework that incorporates the Enhanced Kepler Optimization Algorithm (EKOA) for feature selection. EKOA integrates adaptive processes, such as dynamic adaptation, oscillatory chaotic force, crosswise solution formation, and optimization based on elites, in an effort to balance exploitation and exploration in favor of enhancing convergence speed alongside solution diversity. The selected features are evaluated using K-Nearest Neighbor (KNN) and Decision Tree (DT) classifiers. Experiments were conducted on typical IoT datasets, i.e., Mirai and Gafgyt. Accuracy, AUC, G-mean, and precision were also used for performance evaluation. The new system achieved detection accuracy greater than 99% and reduced the list of features by 35%. The new system exhibits good generalization capability, botnet attack resistance, and applicability in high-dimensional applications. The results show a good future for practical application in real-time intrusion detection on IoTs
Full Text:
PDFReferences
B. Pourghebleh and N. J. Navimipour, "Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research," Journal of Network and Computer Applications, vol. 97, pp. 23-34, 2017, doi: https://doi.org/10.1016/j.jnca.2017.08.006.
P. Kumari and A. K. Jain, "A comprehensive study of DDoS attacks over IoT network and their countermeasures," Computers & Security, vol. 127, p. 103096, 2023.
B. Bala and S. Behal, "AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges," Computer science review, vol. 52, p. 100631, 2024.
V. Hayyolalam, B. Pourghebleh, and A. A. Pourhaji Kazem, "Trust management of services (TMoS): investigating the current mechanisms," Transactions on Emerging Telecommunications Technologies, vol. 31, no. 10, p. e4063, 2020.
T. Al-Shurbaji et al., "Deep Learning-Based Intrusion Detection System For Detecting IoT Botnet Attacks: A Review," IEEE Access, 2025.
M. A. Alkhonaini et al., "Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment," Alexandria Engineering Journal, vol. 112, pp. 49-62, 2025.
B. Pourghebleh, K. Wakil, and N. J. Navimipour, "A comprehensive study on the trust management techniques in the Internet of Things," IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9326-9337, 2019, doi: https://doi.org/10.1109/JIOT.2019.2933518.
A. Heidari and M. A. Jabraeil Jamali, "Internet of Things intrusion detection systems: a comprehensive review and future directions," Cluster Computing, vol. 26, no. 6, pp. 3753-3780, 2023.
S. Tsimenidis, T. Lagkas, and K. Rantos, "Deep learning in IoT intrusion detection," Journal of network and systems management, vol. 30, no. 1, p. 8, 2022.
J. Azimjonov and T. Kim, "Stochastic gradient descent classifier-based lightweight intrusion detection systems using the efficient feature subsets of datasets," Expert Systems with Applications, vol. 237, p. 121493, 2024.
J. Li, M. S. Othman, H. Chen, and L. M. Yusuf, "Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning," Journal of Big Data, vol. 11, no. 1, p. 36, 2024.
K. Harahsheh, R. Al-Naimat, and C.-H. Chen, "Using Feature Selection Enhancement to Evaluate Attack Detection in the Internet of Things Environment," Electronics, vol. 13, no. 9, p. 1678, 2024.
H. Haddadpajouh, A. Mohtadi, A. Dehghantanaha, H. Karimipour, X. Lin, and K.-K. R. Choo, "A multikernel and metaheuristic feature selection approach for IoT malware threat hunting in the edge layer," IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4540-4547, 2020.
R. Abu Khurma, I. Almomani, and I. Aljarah, "IoT botnet detection using salp swarm and ant lion hybrid optimization model," Symmetry, vol. 13, no. 8, p. 1377, 2021.
F. Hosseini, F. S. Gharehchopogh, and M. Masdari, "A botnet detection in IoT using a hybrid multi-objective optimization algorithm," New Generation Computing, vol. 40, no. 3, pp. 809-843, 2022.
F. S. Gharehchopogh, B. Abdollahzadeh, S. Barshandeh, and B. Arasteh, "A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT," Internet of Things, vol. 24, p. 100952, 2023.
M. Alkhammash, "A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications," IEEE Access, 2024.
L. A. Maghrabi et al., "Enhancing cybersecurity in the internet of things environment using bald eagle search optimization with hybrid deep learning," IEEE Access, vol. 12, pp. 8337-8345, 2024.
M. Maazalahi and S. Hosseini, "Machine learning and metaheuristic optimization algorithms for feature selection and botnet attack detection," Knowledge and Information Systems, pp. 1-49, 2025.
E. Elsedimy and S. M. AboHashish, "An intelligent hybrid approach combining fuzzy C-means and the sperm whale algorithm for cyber attack detection in IoT networks," Scientific Reports, vol. 15, no. 1, p. 1005, 2025.
M. Abdel-Basset, R. Mohamed, S. A. A. Azeem, M. Jameel, and M. Abouhawwash, "Kepler optimization algorithm: A new metaheuristic algorithm inspired by Kepler’s laws of planetary motion," Knowledge-based systems, vol. 268, p. 110454, 2023.
B. Abdollahzadeh and F. S. Gharehchopogh, "A multi-objective optimization algorithm for feature selection problems," Engineering with Computers, vol. 38, no. Suppl 3, pp. 1845-1863, 2022.
T. M. Hamdani, J.-M. Won, A. M. Alimi, and F. Karray, "Multi-objective feature selection with NSGA II," in Adaptive and Natural Computing Algorithms: 8th International Conference, ICANNGA 2007, Warsaw, Poland, April 11-14, 2007, Proceedings, Part I 8, 2007: Springer, pp. 240-247.
E. Hancer, B. Xue, M. Zhang, D. Karaboga, and B. Akay, "Pareto front feature selection based on artificial bee colony optimization," Information Sciences, vol. 422, pp. 462-479, 2018.
B. Xue, M. Zhang, and W. N. Browne, "Particle swarm optimization for feature selection in classification: A multi-objective approach," IEEE transactions on cybernetics, vol. 43, no. 6, pp. 1656-1671, 2012.
DOI: https://doi.org/10.31449/inf.v49i11.8708
This work is licensed under a Creative Commons Attribution 3.0 License.








