JOURNAL ARTICLE

Active Period Segmentation Assisted Semantically Embedded Hybrid Deep Feature Learning Environment for Intrusion Detection in IOT

Chitty AvulaDr. Sathyanarayana Bachala

Year: 2025 Journal:   Zenodo (CERN European Organization for Nuclear Research)   Publisher: European Organization for Nuclear Research

Abstract

The rapid evolution of IoT technologies has enabled seamless, real-time communication and control across critical sectors like defense, smart cities, and healthcare. However, the growing scale of applications and users has introduced significant security risks, with intrusions threatening both data integrity and system reliability. Existing IDS solutions based on machine and deep learning often struggle with issues such as class imbalance, gradient instability, and limited contextual understanding. To address these challenges, this paper introduces a robust IDS model that combines active period segmentation with a semantically enhanced hybrid deep learning framework. The model efficiently eliminates inactive data, employs Word2Vec for semantic embedding, and extracts meaningful statistical features to enhance intrusion detection performance. These features are further refined through cross-correlation and processed using EfficientNet-NB7 and Bi-LSTM networks for deep feature extraction. Final classification is performed using an ensemble-of-ensembles (E2E) model that combines AdaBoost, Random Forest, and XGBoost, leveraging majority voting for decision making. The proposed IDS attain 99.91% accuracy, 99.62% precision, 99.70% recall, and a 99.23% F-measure, surpassing existing methods and providing robust security for IoT environments.

Keywords:
Intrusion detection system Deep learning Feature (linguistics) Segmentation Active learning (machine learning) Class (philosophy) Feature extraction

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.57
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
© 2026 ScienceGate Book Chapters — All rights reserved.