JOURNAL ARTICLE

Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning Model for Intrusion Detection System

Mahmoud RagabSultanah M. AlshammariAbdullah Alghamdi

Year: 2023 Journal:   Computer Systems Science and Engineering Vol: 47 (2)Pages: 2497-2512

Abstract

The Internet of Things (IoT) system has confronted dramatic growth in high dimensionality and data traffic. The system named intrusion detection systems (IDS) is broadly utilized for the enhancement of security posture in an IT infrastructure. An IDS is a practical and suitable method for assuring network security and identifying attacks by protecting it from intrusive hackers. Nowadays, machine learning (ML)-related techniques were used for detecting intrusion in IoTs IDSs. But, the IoT IDS mechanism faces significant challenges because of physical and functional diversity. Such IoT features use every attribute and feature for IDS self-protection unrealistic and difficult. This study develops a Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning (MM-WMVEDL) model for IDS. The proposed MM-WMVEDL technique aims to discriminate distinct kinds of attacks in the IoT environment. To attain this, the presented MM-WMVEDL technique implements min-max normalization to scale the input dataset. For feature selection purposes, the MM-WMVEDL technique exploits the Harris hawk optimization-based elite fractional derivative mutation (HHO-EFDM) technique. In the presented MM-WMVEDL technique, a Bi-directional long short-term memory (BiLSTM), extreme learning machine (ELM) and an ensemble of gated recurrent unit (GRU) models take place. A wide range of simulation analyses was performed on CICIDS-2017 dataset to exhibit the promising performance of the MM-WMVEDL technique. The comparison study pointed out the supremacy of the MM-WMVEDL method over other recent methods with accuracy of 99.67%.

Keywords:
Computer science Artificial intelligence Intrusion detection system Normalization (sociology) Extreme learning machine Machine learning Exploit Feature selection Deep learning Data mining Pattern recognition (psychology) Artificial neural network Computer security

Metrics

10
Cited By
4.40
FWCI (Field Weighted Citation Impact)
0
Refs
0.88
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Machine Learning and ELM
Physical Sciences →  Computer Science →  Artificial Intelligence
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.