{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T13:03:56Z","timestamp":1769605436241,"version":"3.49.0"},"reference-count":56,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Decision Technologies"],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:p>The increasing number of Internet of Things (IoT) devices has made it crucial to protect these networked ecosystems from cyberattacks. To differentiate between legitimate operations and possible intrusions, this collection of network traffic data encompasses a wide range of features, from fundamental connection metrics to intricate interaction patterns. This dataset offers a fundamental tool for scholars and scientists to develop models that can accurately predict, detect, and mitigate undesired cyber activities by concentrating on the distinctive features of smart home network traffic. The aim of predicting smart home intrusion using Machine Learning (ML) Algorithms necessitated the utilization of Stacking Classification (SC), Gradient Boosting Classifier (GBC), and Random Forest Classification (RFC) models in conjunction with Leader Harris Hawks Optimization (LHHO) and Mayfly Optimization Algorithm (MOA) optimizers. In this study, the Stacking C model was employed to categorize the other models under a novel conceptual framework, subsequently integrating them with optimizers to formulate new hybrid models termed SGRLH and HGRMO. Furthermore, the outcomes of the utilized models were compared under 2 conditions, namely Right and Wrong detection. The results reveal that under the right detection condition, the SGRLH model exhibited the highest precision value of 0.997, establishing it as the optimal model, followed by the SGRMO model with a precision value of 0.992, securing the second position, while the SGR model with a precision value of 0.970 occupied the third position.<\/jats:p>","DOI":"10.1177\/18724981241302912","type":"journal-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T09:51:32Z","timestamp":1747734692000},"page":"804-820","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing security protocols for smart homes: intrusion risks control Measures"],"prefix":"10.1177","volume":"19","author":[{"given":"Fang","family":"Liu","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Liuzhou Institute of Technology, Liuzhou, China"}]},{"given":"Liangkai","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Liuzhou Institute of Technology, Liuzhou, China"}]}],"member":"179","published-online":{"date-parts":[[2024,12,8]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2926365"},{"key":"e_1_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Khan R Khan SU Zaheer R et\u00a0al. Future internet: the internet of things architecture possible applications and key challenges. In: 2012 10th international conference on frontiers of information technology 2012 pp.257\u2013260. IEEE.","DOI":"10.1109\/FIT.2012.53"},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Chowdhry D Paranjape R Laforge P. Smart home automation system for intrusion detection. In: 2015 IEEE 14th Canadian workshop on information theory (CWIT) 2015 pp.75\u201378. IEEE.","DOI":"10.1109\/CWIT.2015.7255156"},{"key":"e_1_3_2_5_2","first-page":"93","article-title":"Chapter seven: critical infrastructure and the internet of things","volume":"93","author":"Simon T","year":"2017","unstructured":"Simon T. Chapter seven: critical infrastructure and the internet of things. Cyber Secur Volatile World 2017; 93: 93\u2013104.","journal-title":"Cyber Secur Volatile World"},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","unstructured":"James F. IoT cybersecurity based smart home intrusion prevention system. In: 2019 3rd cyber security in networking conference (CSNet) 2019 pp.107\u2013113. IEEE.","DOI":"10.1109\/CSNet47905.2019.9108938"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Anthi E Williams L Burnap P. Pulse: an adaptive intrusion detection for the internet of things 2018.","DOI":"10.1049\/cp.2018.0035"},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Anthi E Javed A Rana O et\u00a0al. Secure data sharing and analysis in cloud-based energy management systems. In: Cloud infrastructures services and IoT systems for smart cities: second EAI international conference IISSC 2017 and CN4IoT 2017 Brindisi Italy April 20\u201321 2017 Proceedings 2 2018 pp.228\u2013242. Springer.","DOI":"10.1007\/978-3-319-67636-4_24"},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Nobakht M Sivaraman V Boreli R. A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: 2016 11th International conference on availability reliability and security (ARES) 2016 pp.147\u2013156. IEEE.","DOI":"10.1109\/ARES.2016.64"},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Alsakran F Bendiab G Shiaeles S et\u00a0al. Intrusion detection systems for smart home IoT devices: experimental comparison study. In: International symposium on security in computing and communication 2019 pp.87\u201398. Springer.","DOI":"10.1007\/978-981-15-4825-3_7"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01578-5"},{"key":"e_1_3_2_12_2","first-page":"73","article-title":"IoT based Smart Home Cyber-Attack Detection and Defense","volume":"10","author":"Kalpana A","year":"2023","unstructured":"Kalpana A, Waoo AA. IoT based Smart Home Cyber-Attack Detection and Defense. TIJER Int Res J 2023; 10: 73\u201388.","journal-title":"TIJER Int Res J"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Anthi E Javed A Rana O et\u00a0al. Secure data sharing and analysis in cloud-based energy management systems. In: Cloud infrastructures services and IoT systems for smart cities: second EAI international conference IISSC 2017 and CN4IoT 2017 Brindisi Italy April 20\u201321 2017 Proceedings 2 2018 pp.228\u2013242. Springer.","DOI":"10.1007\/978-3-319-67636-4_24"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Jaswal K Choudhury T Chhokar RL et\u00a0al. Securing the internet of things: a proposed framework. In: 2017 International conference on computing communication and automation (ICCCA) 2017 pp.1277\u20131281. IEEE.","DOI":"10.1109\/CCAA.2017.8230015"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.016"},{"key":"e_1_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Yu T Sekar V Seshan S et\u00a0al. Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the internet-of-things. In: Proceedings of the 14th ACM workshop on hot topics in networks 2015 pp.1\u20137.","DOI":"10.1145\/2834050.2834095"},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","unstructured":"V\u00f6gler M Schleicher J Inzinger C et\u00a0al. LEONORE\u2013large-scale provisioning of resource-constrained IoT deployments. In: 2015 IEEE symposium on service-oriented system engineering 2015 pp.78\u201387. IEEE.","DOI":"10.1109\/SOSE.2015.23"},{"key":"e_1_3_2_19_2","doi-asserted-by":"crossref","unstructured":"V\u00f6gler M Schleicher J Inzinger C et\u00a0al. LEONORE\u2013large-scale provisioning of resource-constrained IoT deployments. In: 2015 IEEE symposium on service-oriented system engineering 2015 pp.78\u201387. IEEE.","DOI":"10.1109\/SOSE.2015.23"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2926365"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Yu T Sekar V Seshan S et\u00a0al. Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the internet-of-things. In: Proceedings of the 14th ACM workshop on hot topics in networks 2015 pp.1\u20137.","DOI":"10.1145\/2834050.2834095"},{"key":"e_1_3_2_23_2","unstructured":"Roesch M. Snort: lightweight intrusion detection for networks. In: Lisa 1999 pp.229\u2013238."},{"key":"e_1_3_2_24_2","unstructured":"Says G. 6.4 billion connected \u2018things\u2019 will be in use in 2016 up 30 percent from 2015. URL: http:\/\/www. gartner. com\/newsroom\/id\/3165317 2015."},{"key":"e_1_3_2_25_2","unstructured":"Stamford C. Gartner says 6.4 billion connected \u2018things\u2019 will be in use in2016 Up 30 percent from 2015."},{"key":"e_1_3_2_26_2","unstructured":"Roesch M. Snort: lightweight intrusion detection for networks. In: Lisa 1999 pp.229\u2013238."},{"key":"e_1_3_2_27_2","unstructured":"Stamford C. Gartner says 6.4 billion connected \u2018things\u2019 will be in use in 2016 up 30 percent from 2015."},{"key":"e_1_3_2_28_2","volume-title":"Evaluating the cyber security in the internet of things: smart home vulnerabilities","author":"McGee TM","year":"2016","unstructured":"McGee TM. Evaluating the cyber security in the internet of things: smart home vulnerabilities. Colorado Springs: Colorado Technical University, 2016."},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.08.009"},{"key":"e_1_3_2_30_2","volume-title":"Smart homes for dummies","author":"Briere D","year":"2011","unstructured":"Briere D, Hurley P. Smart homes for dummies. Hoboken, New Jersey: John Wiley & Sons, 2011."},{"key":"e_1_3_2_31_2","volume-title":"Security awareness: internet of things in the home","author":"Mancini A","year":"2017","unstructured":"Mancini A. Security awareness: internet of things in the home. Utica, NY: Utica College, 2017."},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Graf J Neubauer K Fischer S et\u00a0al. Architecture of an intelligent intrusion detection system for smart home. In: 2020 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops) 2020 pp.1\u20136. IEEE.","DOI":"10.1109\/PerComWorkshops48775.2020.9156168"},{"key":"e_1_3_2_33_2","doi-asserted-by":"crossref","unstructured":"Li T Hong Z Yu L. Machine learning-based intrusion detection for iot devices in smart home. In: 2020 IEEE 16th international conference on control & automation (ICCA) 2020 pp.277\u2013282. IEEE.","DOI":"10.1109\/ICCA51439.2020.9264406"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2016.1231523"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3412383"},{"key":"e_1_3_2_36_2","unstructured":"Basarudin NA Yeon AL Yusoff ZM et\u00a0al. Personal data protection act 2010: protection of smart home users\u2019 information in cloud system 2016."},{"key":"e_1_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Lamers E Dijksman R van der Vegt A et\u00a0al. Securing home Wi-Fi with WPA3 personal. In: 2021 IEEE 18th annual consumer communications & networking conference (CCNC) 2021 pp.1\u20138. IEEE.","DOI":"10.1109\/CCNC49032.2021.9369629"},{"key":"e_1_3_2_38_2","first-page":"103058","article-title":"How is your Wi-Fi connection today? DoS attacks on WPA3-SAE","volume":"64","author":"Chatzoglou E","year":"2022","unstructured":"Chatzoglou E, Kambourakis G, Kolias C. How is your Wi-Fi connection today? DoS attacks on WPA3-SAE. J\u00a0Inf Secur Appl 2022; 64: 103058.","journal-title":"J\u00a0Inf Secur Appl"},{"key":"e_1_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Moissinac K Ramos D Rendon G et\u00a0al. Wireless encryption and WPA2 weaknesses. In: 2021 IEEE 11th annual computing and communication workshop and conference (CCWC) 2021 pp.1007\u20131015. IEEE.","DOI":"10.1109\/CCWC51732.2021.9376023"},{"key":"e_1_3_2_40_2","unstructured":"Thapa S Mailewa A. The role of intrusion detection\/prevention systems in modern computer networks: a review. In: Conference: midwest instruction and computing symposium (MICS) 2020 pp.1\u201314."},{"key":"e_1_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Rao UH Nayak U Rao UH et\u00a0al. Intrusion detection and prevention systems. The InfoSec handbook: an introduction to information security pp.225\u2013243 2014.","DOI":"10.1007\/978-1-4302-6383-8_11"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04188-3"},{"key":"e_1_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Htwe CS Thant YM Thwin MMS. Botnets attack detection using machine learning approach for iot environment. In: Journal of Physics: conference series 2020 p.12101. IOP Publishing.","DOI":"10.1088\/1742-6596\/1646\/1\/012101"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06986-8"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108015"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-05181-3"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21144946"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7110"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102499"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113127"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1016218223"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-012-0549-0"},{"key":"e_1_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Parmar A Katariya R Patel V. A review on random forest: an ensemble classifier. In: International conference on intelligent data communication technologies and internet of things (ICICI) 2018 2019 pp.758\u2013763. Springer.","DOI":"10.1007\/978-3-030-03146-6_86"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fraope.2023.100058"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.028"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1080\/02626667.2021.2012182"}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/18724981241302912","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/18724981241302912","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/18724981241302912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T22:56:46Z","timestamp":1769554606000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/18724981241302912"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,8]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["10.1177\/18724981241302912"],"URL":"https:\/\/doi.org\/10.1177\/18724981241302912","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"value":"1872-4981","type":"print"},{"value":"1875-8843","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,8]]}}}