{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T18:43:49Z","timestamp":1769712229991,"version":"3.49.0"},"reference-count":29,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,3,9]]},"abstract":"<jats:p>Intrusion detection systems (IDS) can be used to detect irregularities in network traffic to improve network security and protect data and systems. From 2.4 times in 2018 to three times in 2023, the number of devices linked to IP networks is predicted to outnumber the total population of the world. In 2020, approximately 1.5 billion cyber-attacks on Internet of Things (IoT) devices have been reported. Classification of these attacks in the IoT network is the major objective of this research. This research proposes a hybrid machine learning model using Seagull Optimization Algorithm (SOA) and Extreme Learning Machine (ELM) classifier to classify and detect attacks in IoT networks. The CIC-IDS-2018 dataset is used in this work to evaluate the proposed model. The SOA is implemented for feature selection from the dataset, and the ELM is used to classify attacks from the selected features. The dataset has 80 features, in the proposed model used only 22 features with higher scores than the original dataset. The dataset is divided into 80% for training and 20% for testing. The proposed SOA-ELM model obtained 94.22% accuracy, 92.95% precision, 93.45% detection rate, and 91.26% f1-score.<\/jats:p>","DOI":"10.3233\/jifs-222427","type":"journal-article","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T11:01:43Z","timestamp":1669114903000},"page":"4245-4255","source":"Crossref","is-referenced-by-count":2,"title":["An intrusion detection system based on hybrid machine learning classifier"],"prefix":"10.1177","volume":"44","author":[{"given":"M.","family":"Reji","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Rohini College of Engineering and Technology, Kanyakumari, Tamilnadu, India"}]},{"given":"Christeena","family":"Joseph","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, SRM Institute of Science and Technology, Chennai, Tamilnadu, India"}]},{"given":"P.","family":"Nancy","sequence":"additional","affiliation":[{"name":"Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology, Kattankulathur Campus, Chennai, India"}]},{"given":"A.","family":"Lourdes Mary","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Rohini College of Engineering and Technology, Kanyakumari, Tamilnadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-222427_ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/app11188383","article-title":"Anomaly-based intrusion detection systems in IoT using deep learning: a systematic literature review","volume":"11","author":"Alsoufi","year":"2021","journal-title":"Applied Sciences"},{"key":"10.3233\/JIFS-222427_ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-021-00077-7","article-title":"A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges,","volume":"4","author":"Khraisat","year":"2021","journal-title":"Cybersecurity"},{"key":"10.3233\/JIFS-222427_ref3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.22247\/ijcna\/2022\/211599","article-title":"A review on intrusion detection systems to secure IoT networks,","volume":"9","author":"Anitha","year":"2022","journal-title":"International Journal of Computer Networks and Applications"},{"key":"10.3233\/JIFS-222427_ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-021-09621-9","article-title":"Deep learning in IoT intrusion detection,","volume":"30","author":"Tsimenidis","year":"2022","journal-title":"Journal of Network and Systems Management"},{"key":"10.3233\/JIFS-222427_ref5","doi-asserted-by":"crossref","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","article-title":"Internet of things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review,","volume":"9","author":"Mishra","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-222427_ref6","doi-asserted-by":"crossref","first-page":"83","DOI":"10.52866\/ijcsm.2022.01.01.009","article-title":"Survey of intrusion detection using deep learning in the internet of things,","volume":"3","author":"Farhan","year":"2022","journal-title":"Iraqi Journal for Computer Science and Mathematics"},{"key":"10.3233\/JIFS-222427_ref7","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1007\/s13369-021-06086-5","article-title":"A new ensemble-based intrusion detection system for internet of things,","volume":"47","author":"Abbas","year":"2022","journal-title":"Arabian Journal for Science and Engineering"},{"key":"10.3233\/JIFS-222427_ref8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s40860-020-00126-x","article-title":"A smart anomaly-based intrusion detection system for the internet of things (IoT) network using GWO\u2013PSO\u2013RF model,","volume":"7","author":"Keserwani","year":"2021","journal-title":"Journal of Reliable Intelligent Environments"},{"key":"10.3233\/JIFS-222427_ref9","first-page":"1","article-title":"Advanced feature extraction and selection approach using deep learning and aquila optimizer for IoT intrusion detection system,","volume":"22","author":"Fatani","year":"2022","journal-title":"Sensors"},{"key":"10.3233\/JIFS-222427_ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s22041396","article-title":"An effective feature selection model using hybrid metaheuristic algorithms for IoT intrusion detection,","volume":"22","author":"Kareem","year":"2022","journal-title":"Sensors"},{"key":"10.3233\/JIFS-222427_ref11","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.icte.2021.04.012","article-title":"Feature selection for intrusion detection system in internet-of-things (IoT),","volume":"7","author":"Nimbalkar","year":"2021","journal-title":"ICT Express"},{"key":"10.3233\/JIFS-222427_ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/electronics11040524","article-title":"IMIDS: an intelligent intrusion detection system against cyber threats in IoT,","volume":"11","author":"Le","year":"2022","journal-title":"Electronics"},{"key":"10.3233\/JIFS-222427_ref13","first-page":"1","article-title":"Intrusion detection system on IoT with 5G network using deep learning,","volume":"2022","author":"Yadav","year":"2022","journal-title":"Wireless Communications and Mobile Computing"},{"key":"10.3233\/JIFS-222427_ref14","doi-asserted-by":"crossref","first-page":"52","DOI":"10.3390\/telecom3010003","article-title":"XGB-RF: a hybrid machine learning approach for IoT intrusion detection,","volume":"3","author":"Faysal","year":"2022","journal-title":"Telecom"},{"key":"10.3233\/JIFS-222427_ref15","doi-asserted-by":"crossref","first-page":"103481","DOI":"10.1109\/ACCESS.2021.3098642","article-title":"A novel binary seagull optimizer and its application to feature selection problem,","volume":"9","author":"Kumar","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-222427_ref16","doi-asserted-by":"crossref","first-page":"49614","DOI":"10.1109\/ACCESS.2019.2909945","article-title":"A new hybrid seagull optimization algorithm for feature selection,","volume":"7","author":"Jia","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-222427_ref17","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.ijepes.2017.03.011","article-title":"Improved-ELM method for detecting false data attack in smart grid,","volume":"91","author":"Yang","year":"2017","journal-title":"Electrical Power and Energy Systems"},{"key":"10.3233\/JIFS-222427_ref18","doi-asserted-by":"crossref","first-page":"33789","DOI":"10.1109\/ACCESS.2018.2841987","article-title":"Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection,","volume":"6","author":"Ahmad","year":"2018","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-222427_ref19","doi-asserted-by":"crossref","first-page":"165","DOI":"10.33851\/JMIS.2019.6.4.165","article-title":"An intrusion detection model based on a convolutional neural network,","volume":"6","author":"Kim","year":"2019","journal-title":"Journal of Multimedia Information System"},{"key":"10.3233\/JIFS-222427_ref21","doi-asserted-by":"publisher","first-page":"46386","DOI":"10.1109\/ACCESS.2021.3066620","article-title":"Real-Time Network Intrusion Prevention System Based on Hybrid Machine Learning, in","volume":"9","author":"Seo","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-222427_ref22","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/IWBIS50925.2020.9255578","article-title":"Intrusion Detection System based on Hybrid Classifier and User Profile Enhancement Techniques,, pp","author":"Pokharel","year":"2020","journal-title":"2020 International Workshop on Big Data and Information Security (IWBIS)"},{"key":"10.3233\/JIFS-222427_ref23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2022.3190025","article-title":"RAGCN: Region Aggregation Graph Convolutional Network for Bone Age Assessment From X-Ray Images","volume":"71","author":"Li","year":"2022","journal-title":"in IEEE Transactions on Instrumentation and Measurement"},{"key":"10.3233\/JIFS-222427_ref24","doi-asserted-by":"crossref","first-page":"102259","DOI":"10.1016\/j.artmed.2022.102259","article-title":"Lesion-attention pyramid network for diabetic retinopathy grading","volume":"126","author":"Xiang Li","year":"2022","journal-title":"Artificial Intelligence in Medicine"},{"key":"10.3233\/JIFS-222427_ref25","doi-asserted-by":"crossref","unstructured":"Sarah S.L. and Mahmoud L.A. , A novel intrusion detection system in WSN using hybrid neuro-fuzzy filter with ant colony algorithm, Journal of Computational Science and Intelligent Technologies 1 (2020), 01\u201308. https:\/\/doi.org\/10.53409\/mnaa.jcsit1101","DOI":"10.53409\/mnaa.jcsit1101"},{"key":"10.3233\/JIFS-222427_ref26","doi-asserted-by":"crossref","unstructured":"Alqdah M. , Intrusion detection attacks classification using machine learning techniques, Journal of Computational Science and Intelligent Technologies 2 (2021), 01\u201306. https:\/\/doi.org\/10.53409\/mnaa\/jcsit\/2201","DOI":"10.53409\/mnaa\/jcsit\/2201"},{"key":"10.3233\/JIFS-222427_ref27","doi-asserted-by":"crossref","unstructured":"Narmatha C. , A new neural network-based intrusion detection systemfor detecting malicious nodes in WSNs, Journal of ComputationalScience and Intelligent Technologies 1 (2020), 01\u201308. https:\/\/doi.org\/10.53409\/mnaa.jcsit20201301","DOI":"10.53409\/mnaa.jcsit20201301"},{"key":"10.3233\/JIFS-222427_ref28","doi-asserted-by":"crossref","unstructured":"Suresh A.N. , A hybrid genetic-neuro algorithm for cloud intrusiondetection system, Journal of Computational Science and IntelligentTechnologies 1 (2020), 15\u201325. https:\/\/doi.org\/10.53409\/mnaa.jcsit20201203","DOI":"10.53409\/mnaa.jcsit20201203"},{"key":"10.3233\/JIFS-222427_ref29","doi-asserted-by":"crossref","unstructured":"Anitha T. , Manimurugan S. , Sridhar S. , Mathupriya S. and LathaG.C.P., A Review on Communication Protocols of Industrial Internet of Things, 2nd International Conference on Computing and InformationTechnology (ICCIT), Tabuk City, Saudi Arabia, 2022, pp. 418\u2013423. https:\/\/doi.org\/10.1109\/ICCIT52419.2022.9711544","DOI":"10.1109\/ICCIT52419.2022.9711544"},{"key":"10.3233\/JIFS-222427_ref30","doi-asserted-by":"crossref","unstructured":"Khilar R. , Mariyappan K. , Christo M.S. , Amutharaj J. , Anitha T. , RajendranT. and BatuA., Artificial intelligence-based securityprotocols to resist attacks in internet of things, Wireless Communications and Mobile Computing 2022(1440538), pp. 1\u201310. https:\/\/doi.org\/10.1155\/2022\/1440538","DOI":"10.1155\/2022\/1440538"}],"updated-by":[{"DOI":"10.3233\/jifs-219434","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"record-id":"65021"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-222427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:19:06Z","timestamp":1769671146000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-222427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,9]]},"references-count":29,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jifs-222427","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,9]]}}}