Metaheuristic-Enhanced XGBoost Framework for Intrusion Detection in Smart Home IoT Systems
Abstract
The growing integration of smart technologies into residential environments has heightened their exposure to cybersecurity threats, thereby necessitating robust and intelligent intrusion detection systems (IDS). This study proposes a hybrid AI-driven intrusion detection framework tailored for smart home networks, leveraging the Extreme Gradient Boosting Classifier (XGBoost or XGBC) enhanced by three metaheuristic optimization techniques: the Arithmetic Optimization Algorithm (AOA), Horse Herd Optimization (HHO), and Wild Geese Algorithm (WGA). The performance of these hybrid schemes XGAO, XGHH, and XGWG was rigorously evaluated using a comprehensive dataset containing 148,518 labeled network traffic instances, compiled through data mining methods. The dataset includes diverse attributes such as source and destination bytes, service types, protocols, and various connection-related flags. Performance evaluation was conducted using four standard classification metrics: accuracy, precision, recall, and F1-score. Among all models, the hybrid XGAO scheme demonstrated superior performance, achieving a training accuracy of 0.991, outperforming the baseline XGBC model, which scored 0.946 under the same conditions. In the testing phase, XGAO maintained high generalizability with an accuracy of 0.987, compared to 0.953 for XGBC. The XGAO model also excelled in recall (0.989), precision (0.991), and F1-score (0.990) for correct detections. These findings affirm that integrating XGBoost with AOA significantly enhances the classification accuracy and reliability of intrusion detection systems in smart home environments. The study contributes to the development of resilient, adaptive IDS architectures capable of mitigating evolving cyber threats in the domain of intelligent residential technologies.DOI:
https://doi.org/10.31449/inf.v49i34.8837Downloads
Additional Files
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







