{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T18:37:06Z","timestamp":1769711826062,"version":"3.49.0"},"reference-count":32,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,8,24]]},"abstract":"<jats:p>The internet of things (IoT) has significantly influenced day-to-day life in large industrial systems. The Internet of Things (IoT) offers a platform for information systems to integrate effectively with network servers. In contrast, cyber threats are becoming critical, especially for IoT servers. A strong strategy must be in place to protect the network system from multiple attacks. In order to detect malicious behaviors that deteriorate network performance, an intrusion detection system (IDS) is crucial. An IDS use a detection method to monitor network activity to alert IoT users regularly. This paper proposes a novel IDS for IoT using log-sigmoid kernel principal component analysis (LSK-PCA) and activation updated deep feed-forward neural network (AU-DFFNN) based dimensionality reduction (DR) and classification technique. Initially, the input data is taken from the NSLKDD dataset and undergoes pre-processing. Afterwards, attribute extraction is carried out, followed by Fisher\u2019s Yates Adapted Golden Eagle Optimizer (FY-GEO) based feature selection. Then, DR of the feature selected data is done using the LSK-PCA model. Finally, the reduced dataset is given as an input to the classifier for classifying the data as attacked and normal data. As a final point, experimental analysis is performed using performance metrics like precision (PR), recall (RC), f-score (FS), accuracy (AC), false alarm rate (FAR) and computational time (CT). The results proved that the proposed work detects intrusion effectively compared to state-of-art techniques.<\/jats:p>","DOI":"10.3233\/jifs-223437","type":"journal-article","created":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T11:18:27Z","timestamp":1688123907000},"page":"4737-4751","source":"Crossref","is-referenced-by-count":0,"title":["A novel dimensionality reduction and optimal deep learning based intrusion detection system for internet of things"],"prefix":"10.1177","volume":"45","author":[{"given":"Krishna Kumar","family":"Ponniah","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Amrita College of Engineering and Technology, Nagercoil, Tamil Nadu, India"}]},{"given":"Bharathi","family":"Retnaswamy","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, University College of Engineering Nagercoil, Tamil Nadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-223437_ref1","doi-asserted-by":"crossref","unstructured":"Fu Yulong , Yan Zheng , Cao Jin , Kon\u00e9 Ousmane and Cao Xuefei , An automata based intrusion detection method for internet of things, Mobile Information Systems, 2017.","DOI":"10.1155\/2017\/1750637"},{"key":"10.3233\/JIFS-223437_ref2","doi-asserted-by":"crossref","first-page":"102031","DOI":"10.1016\/j.simpat.2019.102031","article-title":"Deep recurrent neural network for IoT intrusion detection system","volume":"101","author":"Almiani","year":"2021","journal-title":"Simulation Modelling Practice and Theory"},{"key":"10.3233\/JIFS-223437_ref3","doi-asserted-by":"crossref","first-page":"2372","DOI":"10.1016\/j.procs.2020.04.257","article-title":"Building a intrusion detection system for IoT environment using machine learning techniques","volume":"171","author":"Kiran","year":"2020","journal-title":"Procedia Computer Science"},{"key":"10.3233\/JIFS-223437_ref4","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1016\/j.procs.2020.04.133","article-title":"Performance analysis of machine learning algorithms in intrusion detection system: a review","volume":"171","author":"Saranya","year":"2020","journal-title":"Procedia Computer Science"},{"key":"10.3233\/JIFS-223437_ref5","doi-asserted-by":"crossref","unstructured":"Mandal K. , Rajkumar M. , Ezhumalai P. , Jayakumar D. and Yuvarani R. , Improved security using machine learning for IoT intrusion detection system, Materials Today: Proceedings, 2021.","DOI":"10.1016\/j.matpr.2020.10.187"},{"issue":"3","key":"10.3233\/JIFS-223437_ref6","first-page":"203","article-title":"A Machine Learning-Based Lightweight Intrusion Detection System for the Internet of Things","volume":"33","author":"Fenanir","year":"2019","journal-title":"Rev. d\u2019Intelligence Artif"},{"key":"10.3233\/JIFS-223437_ref7","first-page":"826","article-title":"Intrusion detection system for IoT devices","author":"Remesh","year":"2020","journal-title":"2020 International Conference on Electronics and Sustainable Communication Systems"},{"key":"10.3233\/JIFS-223437_ref8","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on Internet of Things (IoT) security: A survey","volume":"148","author":"Hassan","year":"2019","journal-title":"Computer Networks"},{"issue":"11","key":"10.3233\/JIFS-223437_ref9","doi-asserted-by":"crossref","first-page":"1210","DOI":"10.3390\/electronics8111210","article-title":"A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks","volume":"8","author":"Khraisat","year":"2019","journal-title":"Electronics"},{"key":"10.3233\/JIFS-223437_ref10","first-page":"1","article-title":"Intrusion detection systems in Internet of Things: A literature review","author":"Santos","year":"2018","journal-title":"13th Iberian Conference on Information Systems and Technologies"},{"key":"10.3233\/JIFS-223437_ref11","first-page":"1","article-title":"A review: Collaborative intrusion detection for iot integrating the blockchain technologies","author":"Benaddi","year":"2020","journal-title":"8th International Conference on Wireless Networks and Mobile Communications"},{"key":"10.3233\/JIFS-223437_ref12","first-page":"256","article-title":"Towards scalable and trustworthy decentralized collaborative intrusion detection system for IoT","author":"Putra","year":"2020","journal-title":"IEEE\/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI)"},{"issue":"4","key":"10.3233\/JIFS-223437_ref13","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.3390\/s21041113","article-title":"Sequential model based intrusion detection system for IoT servers using deep learning methods","volume":"21","author":"Zhong","journal-title":"Sensors"},{"key":"10.3233\/JIFS-223437_ref14","first-page":"1164","article-title":"Investigation of machine learning techniques in intrusion detection system for IoT network","author":"Swarna","year":"2020","journal-title":"3rd International Conference on Intelligent Sustainable Systems (ICISS)"},{"key":"10.3233\/JIFS-223437_ref15","first-page":"86","article-title":"A heuristic intrusion detection system for Internet-of-Things (IoT)","author":"Qureshi","year":"2019","journal-title":"Intelligent computing-proceedings of the computing conference, Springer, Cham"},{"issue":"2","key":"10.3233\/JIFS-223437_ref16","doi-asserted-by":"crossref","first-page":"461","DOI":"10.3390\/s20020461","article-title":"A machine learning based intrusion detection system for mobile Internet of Things","volume":"20","author":"Amouri","year":"2020","journal-title":"Sensors"},{"issue":"2","key":"10.3233\/JIFS-223437_ref17","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.icte.2021.04.012","article-title":"Feature selection for intrusion detection system in Internet-of-Things (IoT)","volume":"7","author":"Nimbalkar","year":"2021","journal-title":"ICT Express"},{"key":"10.3233\/JIFS-223437_ref18","doi-asserted-by":"crossref","first-page":"107042","DOI":"10.1016\/j.comnet.2019.107042","article-title":"Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic","volume":"168","author":"Elmasry","year":"2020","journal-title":"Computer Networks"},{"key":"10.3233\/JIFS-223437_ref19","doi-asserted-by":"crossref","first-page":"29575","DOI":"10.1109\/ACCESS.2020.2972627","article-title":"BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset","volume":"8","author":"Su","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-223437_ref20","doi-asserted-by":"crossref","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","article-title":"An adaptive ensemble machine learning model for intrusion detection","volume":"7","author":"Gao","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-223437_ref21","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1007\/s10489-018-01408-x","article-title":"A new hybrid approach for intrusion detection using machine learning methods","volume":"49","author":"\u00c7avu\u015foglu","year":"2019","journal-title":"Applied Intelligence"},{"issue":"4","key":"10.3233\/JIFS-223437_ref22","doi-asserted-by":"crossref","first-page":"e4221","DOI":"10.1002\/ett.4221","article-title":"An intrusion detection system using optimized deep neural network architecture","volume":"32","author":"Ramaiah","year":"2021","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10.3233\/JIFS-223437_ref23","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1007\/s11036-020-01623-2","article-title":"Robust network intrusion detection scheme using long-short term memory based convolutional neural networks","volume":"26","author":"Hsu","year":"2021","journal-title":"Mobile Networks and Applications"},{"key":"10.3233\/JIFS-223437_ref24","doi-asserted-by":"crossref","first-page":"106043","DOI":"10.1109\/ACCESS.2019.2929919","article-title":"Design of intrusion detection system for internet of things based on improved BP neural network","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"10.3233\/JIFS-223437_ref25","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s40860-020-00126-x","article-title":"A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO\u2013 PSO\u2013 RF model","volume":"7","author":"Keserwani","year":"2021","journal-title":"Journal of Reliable Intelligent Environments"},{"issue":"1","key":"10.3233\/JIFS-223437_ref26","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s12065-019-00291-w","article-title":"UIDS: a unified intrusion detection system for IoT environment","volume":"14","author":"Kumar","year":"2021","journal-title":"Evolutionary Intelligence"},{"issue":"11","key":"10.3233\/JIFS-223437_ref27","doi-asserted-by":"crossref","first-page":"5581","DOI":"10.1007\/s12652-020-01919-x","article-title":"Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks","volume":"11","author":"Davahli","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"1","key":"10.3233\/JIFS-223437_ref28","first-page":"110","article-title":"Toward a deep learning-based intrusion detection system for IoT against botnet attacks","volume":"10","author":"Idrissi","year":"2021","journal-title":"IAES International Journal of Artificial Intelligence"},{"key":"10.3233\/JIFS-223437_ref29","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/j.ijinfomgt.2019.04.006","article-title":"IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning","volume":"49","author":"Li","year":"2019","journal-title":"International Journal of Information Management"},{"key":"10.3233\/JIFS-223437_ref30","doi-asserted-by":"crossref","unstructured":"Jiang Weiwei , Graph-based deep learning for communication networks: A survey, Computer Communications, 2021.","DOI":"10.1016\/j.comcom.2021.12.015"},{"issue":"12","key":"10.3233\/JIFS-223437_ref31","doi-asserted-by":"crossref","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","article-title":"Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system","volume":"9","author":"Zhou","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-223437_ref32","first-page":"1","article-title":"E-graphsage: A graph neural network based intrusion detection system for IoT","author":"Lo","year":"2022","journal-title":"NOMS 2022\u20132022 IEEE\/IFIP Network Operations and Management Symposium"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-223437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:50:15Z","timestamp":1769673015000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-223437"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,24]]},"references-count":32,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jifs-223437","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,24]]}}}