An IDS-based Adaptive Neural Fuzzy Inference System (ANFIS) for IoBT Security Utilizing Particle Swarm Optimization

Authors

  • Basmh Alkanjr Department of Computer Science, College of Computer and Information Science, Jouf University, Sakaka, Saudi Arabia
  • Thamer Alshammari Department of Computer Engineering and Networks, College of Computer and Information Science, Jouf University, Sakaka, Saudi Arabia
  • Afrah Alanazi Department of Information System, College of Computer and Information Science, Jouf University, Sakaka, Saudi Arabia
  • Easa Alalwany Department of Computer Science, College of Computer Science and Engineering, Taibah University, Yanbu, Saudi Arabia
Volume: 15 | Issue: 4 | Pages: 24141-24147 | August 2025 | https://doi.org/10.48084/etasr.10852

Abstract

Within the domain of cybersecurity, Intrusion Detection Systems (IDSs) are crucial to protecting network infrastructures from hostile actions. This paper presents a novel approach that leverages Particle Swarm Optimization (PSO) for feature selection to enhance the performance of an Adaptive Neuro-Fuzzy Inference System (ANFIS)-based IDS. The PSO algorithm identifies the most significant features of a dataset, reducing dimensionality and computational complexity. Subsequently, the selected features are utilized by the ANFIS model to detect and classify intrusions with greater accuracy and efficiency. The proposed PSO-ANFIS framework outperforms traditional methods in terms of detection accuracy and false positive rate, as evidenced by experimental results. The combination of PSO for feature selection with ANFIS for intrusion detection offers a solution to cybersecurity issues, especially in dynamic and intricate systems such as the Internet of Battlefield Things (IoBT).

Keywords:

fuzzy logic, machine learning, Beluga Whale Optimizer (BWO), particle swarm optimization, intrusion detection system, internet of battlefield things

Downloads

Download data is not yet available.

References

W. I. Khedr, A. E. Gouda, and E. R. Mohamed, "P4-HLDMC: A Novel Framework for DDoS and ARP Attack Detection and Mitigation in SD-IoT Networks Using Machine Learning, Stateful P4, and Distributed Multi-Controller Architecture," Mathematics, vol. 11, no. 16, Jan. 2023, Art. no. 3552. DOI: https://doi.org/10.3390/math11163552

M. Alkasassbeh, G. Al-Naymat, A. B. Hassanat, and M. Almseidin, "Detecting distributed denial of service attacks using data mining techniques," International Journal of Advanced Computer Science and Applications, vol. 7, no. 1, pp. 436-445, 2016. DOI: https://doi.org/10.14569/IJACSA.2016.070159

A. K. Jain, R. P. W. Duin, and J. Mao, "Statistical pattern recognition: a review," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 1, pp. 4–37, Jan. 2000. DOI: https://doi.org/10.1109/34.824819

J. S. R. Jang, "ANFIS: adaptive-network-based fuzzy inference system," IEEE Transactions on Systems, Man, and Cybernetics, vol. 23, no. 3, pp. 665–685, Feb. 1993. DOI: https://doi.org/10.1109/21.256541

J. Kennedy and R. Eberhart, "Particle swarm optimization," in Proceedings of ICNN’95 - International Conference on Neural Networks, Perth, WA, Australia, 1995, vol. 4, pp. 1942–1948. DOI: https://doi.org/10.1109/ICNN.1995.488968

A. P. Haripriya and K. Kulothungan, "Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things," EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 1, Apr. 2019, Art. no. 90. DOI: https://doi.org/10.1186/s13638-019-1402-8

M. Almseidin, J. Al-Sawwa, and M. Alkasassbeh, "Anomaly-based Intrusion Detection System Using Fuzzy Logic," in 2021 International Conference on Information Technology (ICIT), Amman, Jordan, Jul. 2021, pp. 290–295. DOI: https://doi.org/10.1109/ICIT52682.2021.9491742

M. Dorigo and T. Stützle, "Ant Colony Optimization: Overview and Recent Advances," in Handbook of Metaheuristics, M. Gendreau and J. Y. Potvin, Eds. Springer International Publishing, 2019, pp. 311–351. DOI: https://doi.org/10.1007/978-3-319-91086-4_10

D. T. Pham, S. Otri, A. Afify, M. Mahmuddin, and H. Al-Jabbouli, "Data Clustering Using the Bees Algorithm," in Proceedings of the 40th CIRP International Manufacturing Systems Seminar, 2007.

S. S. Ambarkar and N. Shekokar, "A Game theory based intrusion detection system for low constrained IoT devices." 2024. DOI: https://doi.org/10.21203/rs.3.rs-3975513/v1

J. Sharma, Sonia, K. Kumar, P. Jain, R. H. C. Alfilh, and H. Alkattan, "Enhancing Intrusion Detection Systems with Adaptive Neuro-Fuzzy Inference Systems," Mesopotamian Journal of CyberSecurity, vol. 5, no. 1, pp. 1–10, Jan. 2025. DOI: https://doi.org/10.58496/MJCS/2025/001

H. Q. Gheni, W. K. Oleiwi, Z. Al-Barmani, and M. A. M. Alabdali, "Optimizing Feature Selection for Intrusion Detection: A Hybrid Approach Using Cuckoo Search and Particle Swarm Optimization," International Journal of Safety and Security Engineering, vol. 14, no. 6, pp. 1907–1912, Dec. 2024. DOI: https://doi.org/10.18280/ijsse.140624

O. Rehman, H. Zhuang, A. Muhamed Ali, A. Ibrahim, and Z. Li, "Validation of miRNAs as Breast Cancer Biomarkers with a Machine Learning Approach," Cancers, vol. 11, no. 3, Mar. 2019, Art. no. 431. DOI: https://doi.org/10.3390/cancers11030431

F. Kherif and A. Latypova, "Principal component analysis," in Machine Learning, A. Mechelli and S. Vieira, Eds. Academic Press, 2020, pp. 209–225. DOI: https://doi.org/10.1016/B978-0-12-815739-8.00012-2

T. Alshammari and I. Mahgoub, "Nature-Inspired Algorithms in Internet of Vehicles: A Survey and Analysis," IEEE Internet of Things Journal, vol. 12, no. 6, pp. 6347–6370, Mar. 2025. DOI: https://doi.org/10.1109/JIOT.2025.3528872

K. B. Adedeji, A. M. Abu-Mahfouz, and A. M. Kurien, "DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges," Journal of Sensor and Actuator Networks, vol. 12, no. 4, Aug. 2023, Art. no. 51. DOI: https://doi.org/10.3390/jsan12040051

K. Singh, P. Singh, and K. Kumar, "Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges," Computers & Security, vol. 65, pp. 344–372, Mar. 2017. DOI: https://doi.org/10.1016/j.cose.2016.10.005

M. S. Khan, K. Ferens, and W. Kinsner, "A chaotic measure for cognitive machine classification of distributed denial of service attacks," in 2014 IEEE 13th International Conference on Cognitive Informatics and Cognitive Computing, London, UK, Aug. 2014, pp. 100–108. DOI: https://doi.org/10.1109/ICCI-CC.2014.6921448

T. H. H. Aldhyani and H. Alkahtani, "Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model," Mathematics, vol. 11, no. 1, Jan. 2023, Art. no. 233. DOI: https://doi.org/10.3390/math11010233

R. Basfar, M. Y. Dahab, A. M. Ali, F. Eassa, and K. Bajunaied, "Enhanced Intrusion Detection in Software-Defined Networking using Advanced Feature Selection: The EMRMR Approach," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 19001–19008, Dec. 2024. DOI: https://doi.org/10.48084/etasr.9256

T. Sharma and S. K. Prasad, "Enhancing cybersecurity in IoT networks: SLSTM-WCO algorithm for anomaly detection," Peer-to-Peer Networking and Applications, vol. 17, no. 4, pp. 2237–2258, Jul. 2024. DOI: https://doi.org/10.1007/s12083-024-01712-z

B. Alkanjr and T. Alshammari, "IoBT Intrusion Detection System using Machine Learning," in 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, Mar. 2023, pp. 0886–0892. DOI: https://doi.org/10.1109/CCWC57344.2023.10099340

P. Michailidis, I. Michailidis, S. Gkelios, and E. Kosmatopoulos, "Artificial Neural Network Applications for Energy Management in Buildings: Current Trends and Future Directions," Energies, vol. 17, no. 3, Jan. 2024, Art. no. 570. DOI: https://doi.org/10.3390/en17030570

Downloads

How to Cite

[1]
B. Alkanjr, T. Alshammari, A. Alanazi, and E. Alalwany, “An IDS-based Adaptive Neural Fuzzy Inference System (ANFIS) for IoBT Security Utilizing Particle Swarm Optimization ”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 24141–24147, Aug. 2025.

Metrics

Abstract Views: 765
PDF Downloads: 780

Metrics Information