{"title":"基于混合算法和条件生成对抗网络的物联网安全增强入侵检测系统","authors":"Shahab Wahhab Kareem","doi":"10.1016/j.eij.2025.100763","DOIUrl":null,"url":null,"abstract":"<div><div>This research proposes a new Intrusion Detection System architecture that aims at improving the protection of IoT through the integration of multiple techniques. The system utilizes a dataset called Bot-IoT that contains unbalanced data, to develop a stable Intrusion Detection System. The methodology is divided into three stages: data pre-processing, synthetic data generation and bio-inspired hybrid features selection. The first process includes cleaning, encoding as well as scaling the data set for the machine learning algorithms such as Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine, Deep Neural Network, Support Vector Machine, and Decision Tree to be affected. The second stage involves the use of a novel architecture of a Conditional Generative Adversarial Network, with a two-discriminator structure to enhance the generation of synthetic data that will improve the balance and the overall quality of the dataset used for training. It is described how the validity of the synthetic data is assessed statistically, and how the generated data affects different models of machine learning. The last step uses <em>meta</em>-heuristic bio-hybrid algorithms for selecting features. The two methods of crocodile hunting search and bee optimization are integrated with Recursive Feature Elimination to select superior features from the dataset used in the experiment. The integration of these models allows for achieving the highest levels of detection with a minimum of false positives. The research advances the field of artificial intelligence by enhancing Conditional Generative Adversarial Networks (CGAN) with a two-discriminator architecture for synthetic data generation, coupled with a novel hybrid feature selection algorithm. This AI innovation is applied to the development of an Intrusion Detection System (IDS) aimed at improving the cybersecurity of Internet of Things (IoT) networks.“</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"31 ","pages":"Article 100763"},"PeriodicalIF":4.3000,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhanced Intrusion Detection System Using Hybrid-Inspired Algorithms and Conditional Generative Adversarial Networks for Internet of Things Security\",\"authors\":\"Shahab Wahhab Kareem\",\"doi\":\"10.1016/j.eij.2025.100763\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>This research proposes a new Intrusion Detection System architecture that aims at improving the protection of IoT through the integration of multiple techniques. The system utilizes a dataset called Bot-IoT that contains unbalanced data, to develop a stable Intrusion Detection System. The methodology is divided into three stages: data pre-processing, synthetic data generation and bio-inspired hybrid features selection. The first process includes cleaning, encoding as well as scaling the data set for the machine learning algorithms such as Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine, Deep Neural Network, Support Vector Machine, and Decision Tree to be affected. The second stage involves the use of a novel architecture of a Conditional Generative Adversarial Network, with a two-discriminator structure to enhance the generation of synthetic data that will improve the balance and the overall quality of the dataset used for training. It is described how the validity of the synthetic data is assessed statistically, and how the generated data affects different models of machine learning. The last step uses <em>meta</em>-heuristic bio-hybrid algorithms for selecting features. The two methods of crocodile hunting search and bee optimization are integrated with Recursive Feature Elimination to select superior features from the dataset used in the experiment. The integration of these models allows for achieving the highest levels of detection with a minimum of false positives. The research advances the field of artificial intelligence by enhancing Conditional Generative Adversarial Networks (CGAN) with a two-discriminator architecture for synthetic data generation, coupled with a novel hybrid feature selection algorithm. This AI innovation is applied to the development of an Intrusion Detection System (IDS) aimed at improving the cybersecurity of Internet of Things (IoT) networks.“</div></div>\",\"PeriodicalId\":56010,\"journal\":{\"name\":\"Egyptian Informatics Journal\",\"volume\":\"31 \",\"pages\":\"Article 100763\"},\"PeriodicalIF\":4.3000,\"publicationDate\":\"2025-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Egyptian Informatics Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1110866525001562\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866525001562","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
Enhanced Intrusion Detection System Using Hybrid-Inspired Algorithms and Conditional Generative Adversarial Networks for Internet of Things Security
This research proposes a new Intrusion Detection System architecture that aims at improving the protection of IoT through the integration of multiple techniques. The system utilizes a dataset called Bot-IoT that contains unbalanced data, to develop a stable Intrusion Detection System. The methodology is divided into three stages: data pre-processing, synthetic data generation and bio-inspired hybrid features selection. The first process includes cleaning, encoding as well as scaling the data set for the machine learning algorithms such as Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine, Deep Neural Network, Support Vector Machine, and Decision Tree to be affected. The second stage involves the use of a novel architecture of a Conditional Generative Adversarial Network, with a two-discriminator structure to enhance the generation of synthetic data that will improve the balance and the overall quality of the dataset used for training. It is described how the validity of the synthetic data is assessed statistically, and how the generated data affects different models of machine learning. The last step uses meta-heuristic bio-hybrid algorithms for selecting features. The two methods of crocodile hunting search and bee optimization are integrated with Recursive Feature Elimination to select superior features from the dataset used in the experiment. The integration of these models allows for achieving the highest levels of detection with a minimum of false positives. The research advances the field of artificial intelligence by enhancing Conditional Generative Adversarial Networks (CGAN) with a two-discriminator architecture for synthetic data generation, coupled with a novel hybrid feature selection algorithm. This AI innovation is applied to the development of an Intrusion Detection System (IDS) aimed at improving the cybersecurity of Internet of Things (IoT) networks.“
期刊介绍:
The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.