Intrusion Detection System Traffic Classification Based on Machine Learning with Correlation-Based Filtering and a Genetic Algorithm-Inspired Feature Selection Method for IoT Networks

Authors

  • Alaa A. Almelibari Department of Computer Science and Artificial Intelligence, College of Computing, Umm Al-Qura University, Makkah, Saudi Arabia
Volume: 15 | Issue: 5 | Pages: 27430-27435 | October 2025 | https://doi.org/10.48084/etasr.13511

Abstract

Securing Internet of Things (IoT) networks against diverse cyber-attacks remains a critical challenge due to their constrained resources and complex traffic patterns. This paper proposes a lightweight, multiclass Intrusion Detection System (IDS) that addresses the limitations of prior binary models by classifying five types of network traffic: Normal, DoS, Mirai, Man-in-the-Middle (MITM), and Scan. A key contribution of this work is the application of a Genetic Algorithm (GA)-inspired feature selection method, which significantly enhances model accuracy and efficiency by isolating the most relevant attributes. Combined with traditional machine learning models, the proposed approach was evaluated using a simulated dataset modeled after IoTID20. Among the classifiers, the Random Forest model, when integrated with GA-inspired feature selection, achieved the highest accuracy of 96.5%. The results highlight the effectiveness of combining lightweight feature optimization with robust classification techniques, making the system highly suitable for real-world IoT deployments.

Keywords:

IDS, traffic classification, IoT, DoS, cyber security, network security

Downloads

Download data is not yet available.

References

P. Mamatha, S. Balaji, and S. S. Anuraghav, "Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks," International Journal of Computational Intelligence Systems, vol. 18, no. 1, Feb. 2025, Art. no. 20.

W. B. Dennyson and C. Jothikumar, "Securing Automotive Networks from DoS and Fuzzy Attacks with Optimized LSTM Models," International Journal of Computational Intelligence Systems, vol. 18, no. 1, Apr. 2025, Art. no. 95.

M. Zahid and T. S. Bharati, "Enhancing cybersecurity in IoT systems: a hybrid deep learning approach for real-time attack detection," Discover Internet of Things, vol. 5, no. 1, Jul. 2025, Art. no. 73.

H. Yang and M. Effatparvar, "A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm," Scientific Reports, vol. 15, no. 1, Jun. 2025, Art. no. 19462.

A. Sagu, N. S. Gill, P. Gulia, N. Alduaiji, P. K. Shukla, and M. A. Shah, "Advances to IoT security using a GRU-CNN deep learning model trained on SUCMO algorithm," Scientific Reports, vol. 15, no. 1, May 2025, Art. no. 16485.

O. Martins Onyekwelu, S. Yanxia, and D. Mashao, "Deep Learning-Based Intrusion Detection System: Embracing Long Short-Term Memory (LSTM) and Roughly Balanced Bagging Synergies," Inteligencia Artificial, vol. 28, no. 76, pp. 40–65, Jun. 2025.

L. Shan, "(IoT) Network intrusion detection system using optimization algorithms," Scientific Reports, vol. 15, no. 1, Jul. 2025, Art. no. 21706.

S. B, S. M, M. K, and L. B, "Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks," Scientific Reports, vol. 15, no. 1, Feb. 2025, Art. no. 4267.

K. Rajkumar and S. M. Shalinie, "SHAP-based intrusion detection in IoT networks using quantum neural networks on IonQ hardware," Journal of Parallel and Distributed Computing, vol. 204, Oct. 2025, Art. no. 105133.

Z. Zhang, A. Das, G. Huang, and S. Baskiyar, "CAT: A simple heterogeneous ensemble learning framework for network intrusion detection," Peer-to-Peer Networking and Applications, vol. 18, no. 4, Jun. 2025, Art. no. 213.

M. A. Ahmed and S. Alnatheer, "Intrusion Detection in a Digital Twin-Enabled Secure Industrial Internet of Things Environment for Industrial Sustainability," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21263–21269, Apr. 2025.

N. Alkhafaji, T. Viana, and A. Al-Sherbaz, "Integrated Genetic Algorithm and Deep Learning Approach for Effective Cyber-Attack Detection and Classification in Industrial Internet of Things (IIoT) Environments," Arabian Journal for Science and Engineering, vol. 50, no. 15, pp. 12071–12095, Aug. 2025.

C. Khammassi and S. Krichen, "A GA-LR wrapper approach for feature selection in network intrusion detection," Computers & Security, vol. 70, pp. 255–277, Sep. 2017.

V. Kumar, D. Sinha, A. K. Das, S. C. Pandey, and R. T. Goswami, "An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset," Cluster Computing, vol. 23, no. 2, pp. 1397–1418, Jun. 2020.

R. Chaganti, A. Mourade, V. Ravi, N. Vemprala, A. Dua, and B. Bhushan, "A Particle Swarm Optimization and Deep Learning Approach for Intrusion Detection System in Internet of Medical Things," Sustainability, vol. 14, no. 19, Jan. 2022, Art. no. 12828.

E.-S. M. El-Kenawy, M. M. Eid, H. L. Hussein, A. M. Osman, and A. M. Elshewey, "Optimized Deep Learning Model Using Binary Particle Swarm Optimization for Phishing Attack Detection: A Comparative Study," Mesopotamian Journal of CyberSecurity, vol. 5, no. 2, pp. 685–703, Jul. 2025.

R. Amin Labid, "iotid20 dataset." [Online]. Available: https://www.kaggle.com/datasets/rohulaminlabid/iotid20-dataset.

A. M. Elshewey, S. A. Z. Hassan, R. Y. Youssef, H. M. El-Bakry, and A. M. Osman, "Enhancing Hydrogen Energy Consumption Prediction Based on Stacked Machine Learning Model with Shapley Additive Explanations," Process Integration and Optimization for Sustainability, May 2025.

Downloads

How to Cite

[1]
A. A. Almelibari, “Intrusion Detection System Traffic Classification Based on Machine Learning with Correlation-Based Filtering and a Genetic Algorithm-Inspired Feature Selection Method for IoT Networks”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 5, pp. 27430–27435, Oct. 2025.

Metrics

Abstract Views: 77
PDF Downloads: 30

Metrics Information