Intrusion Detection System in IoT 5G Networks Based on LSSVM and Harmony Search Optimization

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING
Ali Hamzah Najim, Hussein Ali Rasool, Amjed Abbas Ahmed, Naglaa F. Soliman
{"title":"Intrusion Detection System in IoT 5G Networks Based on LSSVM and Harmony Search Optimization","authors":"Ali Hamzah Najim,&nbsp;Hussein Ali Rasool,&nbsp;Amjed Abbas Ahmed,&nbsp;Naglaa F. Soliman","doi":"10.1002/cpe.70297","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>5G-powered Internet of Things devices, there has been a major challenge in making its network infrastructures safe against the rising wave of cyber threats. In the context of 5G-IoT networks, the traditional intrusion detection systems (IDS) tend to have problems with real-time detection, class imbalance, and adaptive patterns of the attacks. In this study, a new hybrid system of Least Squares Support Vector Machine (LSSVM) and the Harmony Search Optimization Algorithm is proposed as a new intrusion detection framework capable of improving sensitivity and stable intrusion detection. Also, Principal Component Analysis (PCA) is used to decrease the feature dimensionality and get rid of the redundancy. The suggested model is tested with the use of reasonable botnet and adversarial traffic circumstances in the IoT-23 dataset. As far as the detection of such underrepresented attacks as U2R/R2L is concerned, SMOTE is used to balance the classes. Results demonstrate that the LSSVM + HSOA model achieves superior detection performance with an accuracy of 99.27%, significantly outperforming standard SVM and Random Forest baselines. The framework also shows improved recall for minority attack classes, affirming its suitability for complex and imbalanced IoT traffic. Future work will address real-time deployment challenges, such as latency and adversarial evasion, through lightweight model adaptations and distributed learning. This study contributes a practical and scalable approach to securing modern 5G-IoT networks.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 25-26","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70297","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

Abstract

5G-powered Internet of Things devices, there has been a major challenge in making its network infrastructures safe against the rising wave of cyber threats. In the context of 5G-IoT networks, the traditional intrusion detection systems (IDS) tend to have problems with real-time detection, class imbalance, and adaptive patterns of the attacks. In this study, a new hybrid system of Least Squares Support Vector Machine (LSSVM) and the Harmony Search Optimization Algorithm is proposed as a new intrusion detection framework capable of improving sensitivity and stable intrusion detection. Also, Principal Component Analysis (PCA) is used to decrease the feature dimensionality and get rid of the redundancy. The suggested model is tested with the use of reasonable botnet and adversarial traffic circumstances in the IoT-23 dataset. As far as the detection of such underrepresented attacks as U2R/R2L is concerned, SMOTE is used to balance the classes. Results demonstrate that the LSSVM + HSOA model achieves superior detection performance with an accuracy of 99.27%, significantly outperforming standard SVM and Random Forest baselines. The framework also shows improved recall for minority attack classes, affirming its suitability for complex and imbalanced IoT traffic. Future work will address real-time deployment challenges, such as latency and adversarial evasion, through lightweight model adaptations and distributed learning. This study contributes a practical and scalable approach to securing modern 5G-IoT networks.

Abstract Image

基于LSSVM和和谐搜索优化的物联网5G网络入侵检测系统
5g驱动的物联网设备,在保护其网络基础设施免受不断上升的网络威胁方面面临着重大挑战。在5G-IoT网络环境下,传统的入侵检测系统(IDS)往往存在实时检测、类不平衡、攻击模式自适应等问题。本文提出了一种新的最小二乘支持向量机(LSSVM)与和谐搜索优化算法的混合系统,作为一种新的入侵检测框架,能够提高入侵检测的灵敏度和稳定性。利用主成分分析(PCA)降低特征维数,消除冗余。建议的模型在IoT-23数据集中使用合理的僵尸网络和对抗性流量环境进行测试。就检测U2R/R2L等代表性不足的攻击而言,使用SMOTE来平衡类。结果表明,LSSVM + HSOA模型达到了99.27%的检测准确率,显著优于标准SVM和随机森林基线。该框架还显示了对少数攻击类别的改进召回,确认了其对复杂和不平衡物联网流量的适用性。未来的工作将通过轻量级模型适应和分布式学习来解决实时部署挑战,例如延迟和对抗性规避。该研究为确保现代5G-IoT网络的安全提供了一种实用且可扩展的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Concurrency and Computation-Practice & Experience
Concurrency and Computation-Practice & Experience 工程技术-计算机:理论方法
CiteScore
5.00
自引率
10.00%
发文量
664
审稿时长
9.6 months
期刊介绍: Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of: Parallel and distributed computing; High-performance computing; Computational and data science; Artificial intelligence and machine learning; Big data applications, algorithms, and systems; Network science; Ontologies and semantics; Security and privacy; Cloud/edge/fog computing; Green computing; and Quantum computing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信