An IDS-based Adaptive Neural Fuzzy Inference System (ANFIS) for IoBT Security Utilizing Particle Swarm Optimization
Received: 9 March 2025 | Revised: 5 April 2025 | Accepted: 23 April 2025 | Online: 20 May 2025
Corresponding author: Basmh Alkanjr
Abstract
Within the domain of cybersecurity, Intrusion Detection Systems (IDSs) are crucial to protecting network infrastructures from hostile actions. This paper presents a novel approach that leverages Particle Swarm Optimization (PSO) for feature selection to enhance the performance of an Adaptive Neuro-Fuzzy Inference System (ANFIS)-based IDS. The PSO algorithm identifies the most significant features of a dataset, reducing dimensionality and computational complexity. Subsequently, the selected features are utilized by the ANFIS model to detect and classify intrusions with greater accuracy and efficiency. The proposed PSO-ANFIS framework outperforms traditional methods in terms of detection accuracy and false positive rate, as evidenced by experimental results. The combination of PSO for feature selection with ANFIS for intrusion detection offers a solution to cybersecurity issues, especially in dynamic and intricate systems such as the Internet of Battlefield Things (IoBT).
Keywords:
fuzzy logic, machine learning, Beluga Whale Optimizer (BWO), particle swarm optimization, intrusion detection system, internet of battlefield thingsDownloads
References
W. I. Khedr, A. E. Gouda, and E. R. Mohamed, "P4-HLDMC: A Novel Framework for DDoS and ARP Attack Detection and Mitigation in SD-IoT Networks Using Machine Learning, Stateful P4, and Distributed Multi-Controller Architecture," Mathematics, vol. 11, no. 16, Jan. 2023, Art. no. 3552. DOI: https://doi.org/10.3390/math11163552
M. Alkasassbeh, G. Al-Naymat, A. B. Hassanat, and M. Almseidin, "Detecting distributed denial of service attacks using data mining techniques," International Journal of Advanced Computer Science and Applications, vol. 7, no. 1, pp. 436-445, 2016. DOI: https://doi.org/10.14569/IJACSA.2016.070159
A. K. Jain, R. P. W. Duin, and J. Mao, "Statistical pattern recognition: a review," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 1, pp. 4–37, Jan. 2000. DOI: https://doi.org/10.1109/34.824819
J. S. R. Jang, "ANFIS: adaptive-network-based fuzzy inference system," IEEE Transactions on Systems, Man, and Cybernetics, vol. 23, no. 3, pp. 665–685, Feb. 1993. DOI: https://doi.org/10.1109/21.256541
J. Kennedy and R. Eberhart, "Particle swarm optimization," in Proceedings of ICNN’95 - International Conference on Neural Networks, Perth, WA, Australia, 1995, vol. 4, pp. 1942–1948. DOI: https://doi.org/10.1109/ICNN.1995.488968
A. P. Haripriya and K. Kulothungan, "Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things," EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 1, Apr. 2019, Art. no. 90. DOI: https://doi.org/10.1186/s13638-019-1402-8
M. Almseidin, J. Al-Sawwa, and M. Alkasassbeh, "Anomaly-based Intrusion Detection System Using Fuzzy Logic," in 2021 International Conference on Information Technology (ICIT), Amman, Jordan, Jul. 2021, pp. 290–295. DOI: https://doi.org/10.1109/ICIT52682.2021.9491742
M. Dorigo and T. Stützle, "Ant Colony Optimization: Overview and Recent Advances," in Handbook of Metaheuristics, M. Gendreau and J. Y. Potvin, Eds. Springer International Publishing, 2019, pp. 311–351. DOI: https://doi.org/10.1007/978-3-319-91086-4_10
D. T. Pham, S. Otri, A. Afify, M. Mahmuddin, and H. Al-Jabbouli, "Data Clustering Using the Bees Algorithm," in Proceedings of the 40th CIRP International Manufacturing Systems Seminar, 2007.
S. S. Ambarkar and N. Shekokar, "A Game theory based intrusion detection system for low constrained IoT devices." 2024. DOI: https://doi.org/10.21203/rs.3.rs-3975513/v1
J. Sharma, Sonia, K. Kumar, P. Jain, R. H. C. Alfilh, and H. Alkattan, "Enhancing Intrusion Detection Systems with Adaptive Neuro-Fuzzy Inference Systems," Mesopotamian Journal of CyberSecurity, vol. 5, no. 1, pp. 1–10, Jan. 2025. DOI: https://doi.org/10.58496/MJCS/2025/001
H. Q. Gheni, W. K. Oleiwi, Z. Al-Barmani, and M. A. M. Alabdali, "Optimizing Feature Selection for Intrusion Detection: A Hybrid Approach Using Cuckoo Search and Particle Swarm Optimization," International Journal of Safety and Security Engineering, vol. 14, no. 6, pp. 1907–1912, Dec. 2024. DOI: https://doi.org/10.18280/ijsse.140624
O. Rehman, H. Zhuang, A. Muhamed Ali, A. Ibrahim, and Z. Li, "Validation of miRNAs as Breast Cancer Biomarkers with a Machine Learning Approach," Cancers, vol. 11, no. 3, Mar. 2019, Art. no. 431. DOI: https://doi.org/10.3390/cancers11030431
F. Kherif and A. Latypova, "Principal component analysis," in Machine Learning, A. Mechelli and S. Vieira, Eds. Academic Press, 2020, pp. 209–225. DOI: https://doi.org/10.1016/B978-0-12-815739-8.00012-2
T. Alshammari and I. Mahgoub, "Nature-Inspired Algorithms in Internet of Vehicles: A Survey and Analysis," IEEE Internet of Things Journal, vol. 12, no. 6, pp. 6347–6370, Mar. 2025. DOI: https://doi.org/10.1109/JIOT.2025.3528872
K. B. Adedeji, A. M. Abu-Mahfouz, and A. M. Kurien, "DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges," Journal of Sensor and Actuator Networks, vol. 12, no. 4, Aug. 2023, Art. no. 51. DOI: https://doi.org/10.3390/jsan12040051
K. Singh, P. Singh, and K. Kumar, "Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges," Computers & Security, vol. 65, pp. 344–372, Mar. 2017. DOI: https://doi.org/10.1016/j.cose.2016.10.005
M. S. Khan, K. Ferens, and W. Kinsner, "A chaotic measure for cognitive machine classification of distributed denial of service attacks," in 2014 IEEE 13th International Conference on Cognitive Informatics and Cognitive Computing, London, UK, Aug. 2014, pp. 100–108. DOI: https://doi.org/10.1109/ICCI-CC.2014.6921448
T. H. H. Aldhyani and H. Alkahtani, "Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model," Mathematics, vol. 11, no. 1, Jan. 2023, Art. no. 233. DOI: https://doi.org/10.3390/math11010233
R. Basfar, M. Y. Dahab, A. M. Ali, F. Eassa, and K. Bajunaied, "Enhanced Intrusion Detection in Software-Defined Networking using Advanced Feature Selection: The EMRMR Approach," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 19001–19008, Dec. 2024. DOI: https://doi.org/10.48084/etasr.9256
T. Sharma and S. K. Prasad, "Enhancing cybersecurity in IoT networks: SLSTM-WCO algorithm for anomaly detection," Peer-to-Peer Networking and Applications, vol. 17, no. 4, pp. 2237–2258, Jul. 2024. DOI: https://doi.org/10.1007/s12083-024-01712-z
B. Alkanjr and T. Alshammari, "IoBT Intrusion Detection System using Machine Learning," in 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, Mar. 2023, pp. 0886–0892. DOI: https://doi.org/10.1109/CCWC57344.2023.10099340
P. Michailidis, I. Michailidis, S. Gkelios, and E. Kosmatopoulos, "Artificial Neural Network Applications for Energy Management in Buildings: Current Trends and Future Directions," Energies, vol. 17, no. 3, Jan. 2024, Art. no. 570. DOI: https://doi.org/10.3390/en17030570
Downloads
How to Cite
License
Copyright (c) 2025 Basmh Alkanjr, Thamer Alshammari, Afrah Alanazi, Easa Alalwany

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
