IoT Network Vigilant: A Hybrid Framework for Efficient Prediction of Robust IoT Network Intrusion Detection Using FPA-BiNN
DOI:
https://doi.org/10.24237/djes.2025.18408Keywords:
IoT Security, Intrusion Detection, Two Phase Flower Pollination Algorithm, Binarized Neural Networks , Novel Feature EngineeringAbstract
The number of Internet of Things (IoT) devices is increasing rapidly, with estimates predicting more than 41 billion devices by 2025. This growth has also expanded the attack surface, making IoT networks highly vulnerable to cyberattacks. Traditional intrusion detection systems are not suitable for IoT because they depend on known attack signatures, require high computational power, and many false alarms. These limitations make them difficult to deploy on resource-constrained edge devices. The aim of this study is to develop a lightweight and accurate intrusion detection framework specifically designed for IoT environments. We introduce IoT Network Vigilant, a hybrid framework improves intrusion detection performance while remaining efficient enough for real-time use. The framework consists of three key parts. First, we design 27 new IoT-specific features that capture device behavior, traffic asymmetry, and temporal patterns. Second, we apply a two-stage Flower Pollination Algorithm (FPA) to select the most useful features. The first stage ranks features using mutual information, and the second stage removes redundant features using correlation analysis. This process reduces the dataset size by about one-third. Third, we employ Binarized Neural Networks (BNNs), which use binary weights and activations, allowing fast and low-power classification. The model is tested on the IoTID20 dataset, and class imbalance is handled using SMOTE. The results show strong performance, with 98.43% accuracy, 99.03% precision, and 97.32% recall. These scores represent a 4.5% improvement in accuracy compared with existing methods. Overall, this framework offers a robust, efficient, and deployable intrusion detection solution for modern IoT networks.
Downloads
References
[1] Fraihat S, Makhadmeh S, Awa M, Al-Betar M, Al-Redhaei A. Intrusion detection system for large-scale IoT NetFlow Networks Using Machine Learning with Modified Arithmetic Optimization Algorithm. Internet Things. 2023;22(1):1-10.
[2] The Growth in Connected IoT Devices Is Expected to Generate 79.4zb of Data in 2025, according to a New IDC Forecast. 2019; Available online: https://www.businesswire.com/news/home/20190618005012/en/ (accessed on 1 January 2020).
[3] Idrissi I, Boukabous M, Azizi M, Moussaoui O, Fadili HE. Toward a deep learning-based intrusion detection system for IoT against Botnet Attacks. IAES International Journal of Artificial Intelligence. 2021;10(1):110-120. doi:10.11591/ijai.v10.i1.pp110-120.
[4] Venkatraman S, Surendiran B. Adaptive hybrid intrusion detection system for crowd sourced multimedia internet of things systems. Multimedia Tools and Applications. 2019;79(5–6):3993–4010. doi:10.1007/s11042-019-7495-6.
[5] Racherla S, Sripathi P, Faruqui N, Kabir MA, Whaiduzzaman M, Shah SA. Deep-IDS: A Real-time Intrusion Detector for IoT Nodes using Deep Learning. IEEE Access. 2024; doi:10.1109/access.2024.3396461.
[6] Berguiga A, Harchay A, Massaoudi A. HIDS-IoMT: A Deep Learning-Based Intelligent Intrusion Detection System for the Internet of Medical Things. IEEE Access. 2025; 13:32863-32882. doi:10.1109/ACCESS.2025.3543127.
[7] Alshehri MS, Saidani O, Alrayes FS, Abbasi SF, Ahmad J. A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection. IEEE Access. 2024; 12:45762-45772. doi:10.1109/ACCESS.2024.3380816.
[8] Rullo A, Midi D, Mudjerikar A, Bertino E. Kalis2.0—A SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for IoT. IEEE Internet of Things Journal. 2024;11(7):12579-12601. doi:10.1109/JIOT.2023.3333948.
[9] He M, Huang Y, Wang X, Wei P, Wang X. A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping. IEEE Internet of Things Journal. 2024;11(2):2935-2949. doi:10.1109/JIOT.2023.3294259.
[10] Maghrabi LA. Automated Network Intrusion Detection for Internet of Things: Security Enhancements. IEEE Access. 2024;12(1):30839-30851. doi:10.1109/ACCESS.2024.3369237.
[11] Nallakaruppan MK, Somayaji SRK, Fuladi S, Benedetto F. Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things. IEEE Access. 2024;12(1):31788-3179. doi:10.1109/ACCESS.2024.3355794.
[12] Ismaila UA, Danyaro KU, Muazu AA, Maiwada UD. Review on Approaches of Federated Modeling in Anomaly-Based Intrusion Detection for IoT Devices. IEEE Access. 2024;12(1):30941-30961. doi:10.1109/ACCESS.2024.3369915.
[13] Wang C, Xu D, N. Li, and D. Niyato. Effective Intrusion Detection in Highly Imbalanced IoT Networks with Lightweight S2CGAN-IDS. IEEE Internet of Things Journal. 2024;11(9):15140-15151. doi:10.1109/JIOT.2023.3342638.
[14] Wu J. Joint Semantic Transfer Network for IoT Intrusion Detection. IEEE Internet of Things Journal. 2023;10(4):3368-3380. doi:10.1109/JIOT.2022.3218339.
[15] Wu J, Dai H, Wang Y, Ye K. Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach. IEEE Internet of Things Journal. 2023;10(12):10764-10777. doi:10.1109/JIOT.2023.3239872.
[16] Huang J, Chen Z, Liu SZ, Zhang H, Long HX. Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning. Sensors. 2024; 24:1-19. doi:10.3390/s24124002.
[17] Isong B, Kgote O, Abu-Mahfouz A. Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems. Electronics. 2024; 13:1-10. doi:10.3390/electronics13122370.
[18] Yao W, Zhao H, Shi H. Privacy-Preserving Collaborative Intrusion Detection in Edge of Internet of Things: A Robust and Efficient Deep Generative Learning Approach. IEEE Internet of Things Journal. 2024;11(9):15704-15722. doi:10.1109/JIOT.2023.3348117.
[19] Ullah F, Turab A, Ullah S, Cacciagrano D, Zhao Y. Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory. Sensors. 2024; 24:1-17. doi:10.3390/s24134152.
[20] Beshah YK, Abebe SL, Melaku HM. Multi-Stage Adversarial Defense for Online DDoS Attack Detection System in IoT. IEEE Access. 2025; 13:72657-72673. doi:10.1109/ACCESS.2025.3560186.
[21] Altaf T, Wang X, Braun R. GNN-Based Network Traffic Analysis for the Detection of Sequential Attacks in IoT. Electronics. 2024; 13:1-12. doi:10.3390/electronics13122274.
[22] Thi-Thu-Huong Le, Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Uk Jo, Howon Kim. Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data. IEEE Access. 2023; 11:131661-131676. doi:10.1109/ACCESS.2023.3336678.
[23] Srivijaya and B. J. Lakshmi, "A review of security infrastructure, protocols, a taxonomy of security threats and intrusion detection in the Internet of Vehicles (IoV)," International Conference on Intelligent Computing and Emerging Communication Technologies (ICEC), Guntur, India, pp. 1-8, doi: 10.1109/ICEC59683.2024.10837261.
[24] Dhumal, Chaitrali T. and Pingale, Dr. S. V., Analysis of Intrusion Detection Systems: Techniques, Datasets and Research Opportunity (March 6, 2024). Proceedings of the International Conference on Innovative Computing & Communication (ICICC 2024).
[25] Neto ECP, Dadkhah SR, Ferreira A, Zohourian R. CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors, 2023; 23(13):5941-64; https://doi.org/10.3390/s23135941.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 R.M. Alamelu, J.Christy Eunaicy, T.S.Urmila, C. Jayapratha, J.Naveen Ananda Kumar, G.B.GovindaPrabhu, R. Mahalakshmi Priya

This work is licensed under a Creative Commons Attribution 4.0 International License.









