<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>International Symposium on Securing Next-Generation Systems using Future
Artificial Intelligence Technologies, Delhi, India, August</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Securing IoT Devices Based on Zero Trust Intrusion Detection System Using Deep Learning with Sine Cosine Algorithm</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergey Bakhvalov</string-name>
          <email>bakhvalov.s.yu@yandex.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktor Starostin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rafina Zakieva</string-name>
          <email>zakievarr@inbox.ru</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>M Ilayaraja</string-name>
          <email>ilayaraja.m@klu.ac.in</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>E. Laxmi</string-name>
          <email>elaxmi2002@yahoo.com</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Candidate of Economic Sciences, Associate Professor of Department of Economics and Management of Elabuga Institute, Kazan Federal University</institution>
          ,
          <addr-line>Kazan</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Candidate of Medical Sciences, Associate Professor of Department of Theories and Principles of Physical Education and Life Safety, North-Eastern Federal University named after M.K. Ammosov</institution>
          ,
          <addr-line>Yakutsk</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Information Technology, VR Siddhartha Engineering College(A), Siddhartha Academy of Higher Education (Deemed to be University)</institution>
          ,
          <addr-line>Vijayawada</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Doctor of Pedagogical Sciences, Associate Professor of Department of Industrial Electronics, Kazan State Power Engineering University</institution>
          ,
          <addr-line>Kazan</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>School of Computing, Kalasalingam Academy of Research and Education</institution>
          ,
          <addr-line>Krishnankoil</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>0</volume>
      <fpage>8</fpage>
      <lpage>09</lpage>
      <abstract>
        <p>The rapid growth of Internet of Things (IoT) devices provides distinct challenges in preserving the privacy and security of interconnected systems. As cyber-attacks are more common, evolving a scalable and effective Intrusion Detection System (IDS) based on deep learning (DL) for IoT has become more complex. When handling evolving and dynamic cyberattacks, the present techniques are unable to balance temporal and spatial feature extraction. The lack of diversity in dataset employed for DL-based IDS evaluation also interferes with evolution. Besides, there is a significant trade-off between scalability and performance, mainly when the amount of edge devices in communication upsurges. To tackle these challenges, this research paper presents a horizontal DL method that unites Bidirectional Long-Term Short Memory (BiLSTM) and Convolutional Neural Network (CNN) for efficient intrusion detection. This article introduces a novel Sine Cosine Algorithm with Deep Learning based Zero Trust Intrusion Detection System (SCADL-ZTIDS) method for secure IoT Devices. The foremost intention of the SCADL-ZTIDS technique rests in the effectual and automated classification of zero trust IDS. In the first stage, the SCADL-ZTIDS approach endures a min-max scaler utilizing data pre-processing to convert the actual data into beneficial form. Moreover, the deep neural network (DNN) technique is employed for the identification and classification of intrusions. Furthermore, the sine cosine algorithm (SCA) is utilized for fine-tuning the parameters contained in the DNN method. To describe the heightened performance of the SCADL-ZTIDS approach, a wide range of empirical analyses are implemented on benchmark datasets, and the outcomes are examined under various features. The simulation outcomes highlighted the improved intrusion detection performance of the SCADL-ZTIDS approach over the recent DL techniques.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Intrusion Detection System</kwd>
        <kwd>Zero Trust</kwd>
        <kwd>IoT Devices</kwd>
        <kwd>Sine Cosine Algorithm</kwd>
        <kwd>Deep Learning</kwd>
        <kwd>Data Pre-Processing 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The Internet of Things (IoT) transformed digital connectivity by presenting smart
communication techniques, resulting in more reliable, dynamic, and efficient network
communication [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. It enables intelligence network processes amongst manual objects using
sensors and a communication protocol. Sensors generate a connectivity set-up by connecting
the applicants, and the communication protocol controls the flow of data over the network [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
From this perspective, the idea of zero trust turns out to be critical. Cyber experience in IoT
creates chances for different antagonistic pursuits like malware exploits, Denial of Service (DoS)
attacks, phishing schemes, IoT botnet infiltrations, routing manipulations, Man-in-the-Middle
(MITM) attacks, and tasks associated with cloud securities [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The zero-trust method has become progressively more widespread as administrations look
to improve their cybersecurity posture in front of developing threats [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. By pretentious that
each customer, application, and network device is untrustworthy till confirmed reliable, the
zero-trust approach can assist in reducing the attack footsteps and reduce data breaches by
incessantly authenticating and verifying devices, applications, and users in an active
environment [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The zero-trust concentrated on limiting source access and admitting access on
the standard of the minimum privileges necessary to implement the desired task. An operative
description of zero trust is whether it be a security approach that needs continuous
authentication and verification of all devices, applications, and users’ earlier allowing access to
resources [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Zero trust is a complete security outline and operating policies that execute the
zero-trust method over an organization's complete networks, to reduce the threat of data
breaches and cyberattacks [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        The safety of IoT networks besides cyber threats is becoming a paramount study area in
modern years [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Artificial Intelligence (AI) based methodologies, particularly Federated
Learning (FL), have stored significant attention for recommending security resolutions because
of their privacy-preserving mechanism and reliability [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The FL-based Intrusion Detection
System (IDS) functions in a systematic design except for real data interchange among the
participant nodes and the central server; as an alternative, this method upgrade is shared among
the communication party [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. FL significantly supports continuous learning methods in which
iterative cycles are executed, succeeding that the central server has distributed the universal
approach. When training at the confined data nodes, this method upgrades were transferred
back to the server.
      </p>
      <p>This article introduces a new Sine Cosine Algorithms with DL based Zero Trust Intrusion
Detection System (SCADL-ZTIDS) method for secure IoT Devices. In the first stage, the
SCADLZTIDS approach endures min-max scaler utilizing data preprocessing to transform the actual
data into beneficial forms. Moreover, the deep neural network (DNN) technique is employed
for the identification and classification of intrusions. Furthermore, the sine cosine algorithm
(SCA) is utilized for fine-tuning the parameters contained in the DNN method. To describe the
heightened performance of the SCADL-ZTIDS approach, wide range of empirical analyses are
implemented on benchmark datasets, and the results are studied below various features.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>
        Dhanya and Chitra [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] present a DL method named Autoencoder to encode the IoMT data.
The encoding features are provided to an XGBoost Classification whose hyper-parameters are
enhanced by utilizing the Genetic Algorithms. XGBoost classification identifies the occurrence
of malware in the clamp and IoMT datasets by a precision correspondingly. This lightweight
method attains the reduction of dimensionality using Autoencoder and efficiently identifies
malware with an enhanced XGBoost classification through limited computing cost and faster
convergence. In [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], an improved DL method based on uniting XGBoost and AutoEncoder (AE)
method is presented. At initial, the SHapley Additive exPlanations (SHAPs) FS technique is
utilized to choose the proper subset features. Then, the AE is trained on the preceding subsets
to study a squeeze representation of the input feature. The latent representation produced by
the AE is utilized as input for the XGBoost method, simultaneously, Grid Search Cross
Validation (GSCV) is utilized to detect the optimum hyper-parameters for the AE-XGBoost.
      </p>
      <p>
        Zhu and Liu [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] present a new technique that leverages a single combination of ensemble
learning and subspace clustering. This structure incorporates 3 advanced tactics: Iterative
Feedback Loop (IFL), Two Level Decision Making (TDM), and Clustering Results as Features
(CRFs). This method uses common data for the selection of features and uses 4 sub space
clustering methods–, LOF, SUBCLU, PROCLUS, and CLIQUE– to generate further feature sets.
3 base learners – XGB, NB, and LGBM– are utilized in conjunction with a Logistic Regression
(LR) Meta learners. To tune our method, the method employs a Particle Swarm Optimizer (PSO)
for the optimization of hyper-parameters. Cheng et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] present an in vehicle IDS, which
incorporates an integration of stream clustering and sparse regularization convolutional AE
(SRCAE) to create a deep evolving stream clustering method, like DESC-IDS. Particularly, this
technique encodes the constant message as a 2D data frame that is fed into the SRCAE created
by the temporal CN (TCN) method. In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], an optimum secure defense mechanism is presented
for DDoS in IoT networks utilizing the feature optimization and intrusion detection system
(OSD-IDS). The method proposes an improved ResNet structure for feature extraction that
mines many profound features from the traces of given traffic traces. An improved quantum
query optimizer (IQQO) method is utilized in FS. The model designs an accurate and fast
intrusion detection mechanism, called as hybrid DL method that incorporates CNN and
diagonal XG boosting (CNN-DigXG) methods.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Methodology</title>
      <p>
        In this article, we have introduced a novel SCADL-ZTIDS method for secure IoT Devices. The
foremost intention of the SCADL-ZTIDS technique rests in the effectual and automated
classification of zero trust IDS. It contains three distinct processes such as preprocessing,
classification, and parameter tuning are demonstrated in Fig. 1.
In the first stage, the SCADL-ZTIDS approach endures min-max scaler utilizing data
preprocessing to transform the actual data into beneficial forms. The Min-Max Scaler is a vital
data pre-processing method employed to regularize the scope of feature values [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. By scaling
feature to a standard range, usually [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ], the Min-Max Scaler certifies that every feature
donates evenly to the method, averting any distinct feature from unevenly influencing the
outcomes. This normalization is vital to enhance the accuracy and performance of ML
techniques in identifying intrusions, as it permits the model to progress input data effectively
and consistently, increasing its capability to detect latent security threats in an IoT
environment.
3.2.
      </p>
      <p>
        Intrusion Detection using DNN Model
Next, the DNN technique is utilized for the identification and classifier of intrusions. A DNN is
a novel kind of artificial neural network (ANN), which contains many layers and authorizes it
to obtain data and appeal conclusions from wide databases [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. DNN excels in speech and
image detection tasks, exhibiting their skill to identify compound patterns and deliver specific
forecasts. DNN has 3 main layers such as input, output, and hidden layer (HL). The DNN is
organized with double HLs to easily acquire the map relation between the output and input data
by engaging the weight fitness. Throughout the stage of training, the DNN utilizes JOA to attain
its objectives. In the HL, the weight of the nodes was modified. Always, the neural networks
are regulating the decision limit of the categorized training data owing to the enlarged amount
of training iteration. To get superior identification accuracy and quicker DNN training, dual
HLs are generated. The complete quantity of nodes in the HL is defined utilizing Eq. (1).
      </p>
      <p>= √ +  +  (1)</p>
      <p>The input and output layers have  and  nodes, respectively. The HL has  nodes, which
refers to a constant value between 1 and 10, and is signified as .</p>
      <p>1 + !"
 denotes the input data and is activated by the map function #.</p>
      <p>−</p>
      <p>
        Eventually, the SCA is utilized for fine-tuning the parameters contained in the DNN method.
The SCA is a population‐based optimization algorithm that randomly produces many promising
solutions for the optimization problem [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. It exploits the mathematical equation of Sin‐Cos to
oscillate away from or towards the optimum solution, highlighting exploration and exploitation
to find a global optimum solution in the search range.
      </p>
      <p>Compared to another population‐based approach, SCA has shown its maximum
effectiveness in reaching global optimal solution. It explores various milestones in the search
range when the sin and cos functions produce values below or beyond the one. This can be
mathematically formulated as follows:</p>
      <p>$13, = $1 + ,sin(%) ∗ [&amp;$1 − $1[ (6)
$13, = $1 + ,cos(%) ∗ [&amp;$1 − $1[ (7)
Where, $1 and $1 are the current and best candidate locations in the 12 dimension at 12
iterations. ,, %, &amp;, and 4 are the random integers.</p>
      <p>$13, = _
$1 + , ∗ sin(%) ∗ [&amp;$1 − $1[, 4 &lt; 0.5
$1 + , ∗ cos(%) ∗ [&amp;$1 − $1[, 4 ≥ 0.5</p>
      <p>In Eq. (8), ,, defines whether the search range stays within or extends beyond the solution
space. %, define the extent of this deviance from the destination. &amp; presents a random weight
to the destination, de‐emphasizing ((&amp;) &lt; 1) or emphasizing d(&amp;) &gt; 1f its influence on the
distance. Finally, 4 smoothly alternates between the sin and cos components. During the search
process, Eq. (9) dynamically fine‐tunes , to balance exploration and exploitation.

, =  −  (9)

Where  is the optimum iteration counter,  is the existing iteration and  is a constant value.</p>
      <p>The SCA is harnessed for optimizing the learning rate of Patch GAN discriminator and the
generator. The learning rate considerably influences performance of the model. The algorithm
finds the optimum value configuration that increases a performance measure. It modifies the
learning rate iteratively through a metaheuristic algorithm that seeks the configuration that
leads to effective generation of real images. This ensures that the generator has been
instrumental in the overall image quality.</p>
      <p>$( + 1) = $() + ,() ⋅ sin() ⋅ |56)1() − $()|</p>
      <p>+%() ⋅ cos() ⋅ |56)1() − $()| (10)</p>
      <p>
        In Eq. (10), () refers to the location of 12 particles at 12 iteration. 56)1() and 56)1()
are the optimum location and the global optimum location of each particle.  shows the angular
frequency. () and () are two random values within [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ]. Thus, the update of learning rate
can be formulated as follows:
      </p>
      <p>l7816 = l + 0.5 ⋅ ( − ) ⋅ d1 + sin()f (11)</p>
      <p>In Eq. (11),  and  are the lower and upper boundaries of learning rates. The parameter 
differs with all the iterations as follows:
 =</p>
      <p>2
max$167</p>
      <p>In Eq. (12),  and max$167 are the existing and the maximal iteration counters.  indicates
the mathematical constant . The variable  is adjusted according to the 12 existing iteration
to the max$167. This makes a smooth changing variable that proportionally increases with the
iteration count. The 2 term proposes a full cycle, hence the parameter  differs over the full
cycle as the process repeats from 1 to max$167.</p>
      <p>The SCA obtains a FF to achieve enhanced classifier performances. It defines a positive
integer to express the best performances of the candidate solution. In this research, the
reduction of the classifier rate of error is examined as the FF, as provided in Eq. (13).
(8)
(12)
($) = ($)</p>
      <p>=</p>
    </sec>
    <sec id="sec-4">
      <title>4. Result Analysis and Discussion</title>
      <p>
        In this section, the stimulation validation analysis of the SCADL-ZTIDS method is tested
using UNSW-NB18 dataset [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], which contains 2500 sample records under five classes are
represented in Table 1.
      </p>
      <p>Table 2 represents the detection results of the SCADL-ZTIDS approach with 70%TRAP and
30%TESP. The results inferred that the SCADL-ZTIDS model has appropriately identified five
classes. With 70%TRAP, the SCADL-ZTIDS methodology gains an average 9, :, ;,
1)&lt;=76, and MCC of 96.07%, 90.28%, 90.12%, 90.05%, and 87.72%, respectively. Moreover, with
30%TESP, the SCADL-ZTIDS approach obtains average 9, :, ;, 1)&lt;=76, and MCC
of 96.48%, 91.31%, 91.21%, 91.19%, and 89.04%, accordingly.</p>
      <p>In Fig. 4, the training and validation accuracy outcomes of the SCADL-ZTIDS method are
established. The precision values are calculated for 0-25 epoch counts. This figure underlined
that the training and validation accuracy values display a growing trend that informed the
capability of the SCADL-ZTIDS technique with enhanced performance across numerous
iterations. Moreover, the training accuracy and validation accuracy stay nearer over the epoch
counts which specifies less minimum overfitting and shows greater performance of the
SCADLZTIDS systems, assuring continuous prediction on hidden instances.</p>
      <p>In Fig. 5, the training and validation loss graph of the SCADL-ZTIDS approach is presented.
The loss values are calculated throughout 0-25 epoch counts. It is portrayed that the training
and validation accuracy values demonstrate the lowest trend that reported the capacity of the
SCADL-ZTIDS technique to balance a trade-off between generalization and data fitting. The
consistent decrease in loss values also promises better performance of the SCADL-ZTIDS
methodology and tuning of the prediction outcomes in time.
91.21
89.73
91.19
83.01</p>
      <p>KNN Model
Densely-ResNet</p>
      <p>In Table 3 and Fig. 6, the performance outcomes of the SCADL-ZTIDS method with the
existing technique are provided [20-22]. These outcomes display that the Densely-ResNet
approach showed inferior performance with 9, :, ;, and 1)&lt;=76 of 73.93%,
80.94%, 76.68%, and 88.11%, correspondingly. Simultaneously, the KNN methodology has
attained marginally improved results with 9, :, ;, and 1)&lt;=76 of 75.62%, 79.92%,
75.61%, and 76.58%, appropriately. Further, the MLP, CNN, and DT techniques have achieved
reasonably adjacent performance. In the meantime, the RF approach has caused significant
results with9, :, ;, and 1)&lt;=76 of 95.43%, 85.89%, 89.73%, and 83.01%,
proportionately. Then the SCADL-ZTIDS model exceeds the other technique with
greater9, :, ;, and 1)&lt;=76 of 96.48%, 91.31%, 91.21%, and 91.19%, correspondingly
[21].</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>In this article, we have introduced a novel SCADL-ZTIDS method for secure IoT Devices.
The foremost intention of the SCADL-ZTIDS technique rests in the effectual and automated
classification of zero trust IDS. In the first stage, the SCADL-ZTIDS approach endures min-max
scaler utilizing data pre-processing to convert the actual data into beneficial form. Moreover,
the DNN technique is employed for the identification and classification of intrusions.
Furthermore, the SCA is utilized for fine-tuning the parameters contained in the DNN method.
To describe the heightened performance of the SCADL-ZTIDS approach, wide range of
empirical analyses are implemented on benchmark datasets, and the outcomes are examined
under various features. The simulation outcomes highlighted the improved intrusion detection
performance of the SCADL-ZTIDS approach over the recent DL techniques.
[20] I. Katib, M. Ragab, Blockchain-assisted hybrid harris hawks optimization based deep DDoS
attack detection in the IoT environment, Mathematics, 11.8 (2023) 1887.
[21] I. Tareq, B.M. Elbagoury, S. El-Regaily , E.S.M. El-Horbaty, Analysis of ton-iot, unw-nb15,
and edge-iiot datasets using dl in cybersecurity for iot, Applied Sciences, 12.19, (2022) 9572.
[22] M. Basheri, M. Ragab, Quantum Cat Swarm Optimization Based Clustering with Intrusion
Detection Technique for Future Internet of Things Environment, Computer Systems
Science &amp; Engineering, 46.3, (2023) 3783-3798.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Simon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kapileswar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.K.</given-names>
            <surname>Polasi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Elaveini</surname>
          </string-name>
          ,
          <article-title>Hybrid intrusion detection system for wireless IoT networks using deep learning algorithm</article-title>
          ,
          <source>Computers and Electrical Engineering</source>
          ,
          <volume>102</volume>
          , (
          <year>2022</year>
          )
          <fpage>108190</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>G.</given-names>
            <surname>Parimala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kayalvizhi</surname>
          </string-name>
          ,
          <article-title>An Effective Intrusion Detection System for Securing IoT Using Feature Selection and Deep Learning, 2021 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore</article-title>
          , India, (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Salama</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragab</surname>
          </string-name>
          ,
          <article-title>Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for Clustered IoT Driven Ubiquitous Computing System</article-title>
          ,
          <source>Computer Systems Science &amp; Engineering, 46.3</source>
          , (
          <year>2023</year>
          )
          <fpage>2917</fpage>
          -
          <lpage>2932</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Fraihat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Makhadmeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Awad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Al-Betar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Al-Redhaei</surname>
          </string-name>
          ,
          <article-title>Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm</article-title>
          , Internet of Things, (
          <year>2023</year>
          )
          <fpage>100819</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.D.</given-names>
            <surname>Jasim</surname>
          </string-name>
          ,
          <article-title>A survey of intrusion detection using deep learning in internet of things</article-title>
          ,
          <source>Iraqi Journal For Computer Scienc., Mathematics</source>
          ,
          <volume>3</volume>
          .1, (
          <year>2022</year>
          )
          <fpage>83</fpage>
          -
          <lpage>93</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Musleh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Alotaibi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Alhaidari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rahman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.M.</given-names>
            <surname>Mohammad</surname>
          </string-name>
          ,
          <article-title>Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT</article-title>
          ,
          <source>Journal of Sensor and Actuator Networks</source>
          ,
          <volume>12</volume>
          .2, (
          <year>2023</year>
          )
          <fpage>29</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>B. R</surname>
          </string-name>
          , S. Deepajothi, P. G, D. T, P. Karthikeyan ,
          <string-name>
            <surname>V. S,</surname>
          </string-name>
          <article-title>Survey on Intrusions Detection System using Deep learning in</article-title>
          <source>IoT Environment</source>
          ,
          <source>2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)</source>
          , Erode, India, (
          <year>2022</year>
          )
          <fpage>195</fpage>
          -
          <lpage>199</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.F. S.</given-names>
            <surname>Sabir</surname>
          </string-name>
          ,
          <article-title>Outlier detection with optimal hybrid deep learning enabled intrusion detection system for ubiquitous and smart environment</article-title>
          ,
          <source>Sustainable Energy Technologies and Assessments</source>
          ,
          <volume>52</volume>
          (
          <year>2022</year>
          )
          <fpage>102311</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Shareena</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ramdas</surname>
          </string-name>
          ,
          <string-name>
            <surname>H. AP</surname>
          </string-name>
          ,
          <article-title>Intrusion detection system for iot botnet attacks using deep learning</article-title>
          ,
          <source>SN Computer Science</source>
          ,
          <volume>2</volume>
          .3, (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Intrusion detection for IoT based on improved genetic algorithm and deep belief network</article-title>
          ,
          <source>IEEE Access</source>
          ,
          <volume>7</volume>
          , (
          <year>2019</year>
          )
          <fpage>31711</fpage>
          -
          <lpage>31722</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>Dhanya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Chitra</surname>
          </string-name>
          ,
          <article-title>A novel autoencoder based feature independent GA optimised XGBoost classifier for IoMT malware detection</article-title>
          ,
          <source>Expert Systems with Applications</source>
          ,
          <volume>237</volume>
          , (
          <year>2024</year>
          )
          <fpage>121618</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Setitra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.E.A.</given-names>
            <surname>Bensalem</surname>
          </string-name>
          ,
          <article-title>An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparameter tuning optimization</article-title>
          ,
          <source>Transactions on Emerging Telecommunications Technologies</source>
          ,
          <volume>34</volume>
          .9, (
          <year>2023</year>
          )
          <fpage>4827</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <article-title>An integrated intrusion detection framework based on subspace clustering and ensemble learning</article-title>
          ,
          <source>Computers and Electrical Engineering</source>
          ,
          <volume>115</volume>
          , (
          <year>2024</year>
          )
          <fpage>109113</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14] P. Cheng, M. Han,
          <string-name>
            <surname>G</surname>
          </string-name>
          . Liu, DESC-IDS:
          <article-title>Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering</article-title>
          ,
          <source>Future Generation Computer Systems</source>
          ,
          <volume>140</volume>
          , (
          <year>2023</year>
          )
          <fpage>266</fpage>
          -
          <lpage>281</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.S.</given-names>
            <surname>Prasath</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.I.</given-names>
            <surname>Shyja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Chandrakanth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.K.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Raja</given-names>
            <surname>Basha</surname>
          </string-name>
          ,
          <article-title>An optimal secure defense mechanism for DDoS attack in IoT network using feature optimization and intrusion detection system</article-title>
          ,
          <source>Journal of Intelligent &amp; Fuzzy Systems</source>
          , (Preprint), (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>B.</given-names>
            <surname>Deepa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Ramesh</surname>
          </string-name>
          ,
          <article-title>Epileptic seizure detection using deep learning through min max scaler normalization</article-title>
          ,
          <source>Int. J. Health Sci</source>
          ,
          <volume>6</volume>
          , (
          <year>2022</year>
          )
          <fpage>10981</fpage>
          -
          <lpage>10996</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , M. Effatparvar,
          <article-title>Improved sports image classification using deep neural network and novel tuna swarm optimization</article-title>
          ,
          <source>Scientific Reports</source>
          ,
          <volume>14</volume>
          .1, (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alqushaibi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.H.</given-names>
            <surname>Hasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.J.</given-names>
            <surname>Abdulkadir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.U.</given-names>
            <surname>Danyaro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.G.</given-names>
            <surname>Al-Selwi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.H.</given-names>
            <surname>Sumiea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Alhussian</surname>
          </string-name>
          ,
          <article-title>Enhanced Colon Cancer Segmentation and Image Synthesis through Advanced Generative Adversarial Networks based-Sine Cosine Algorithm</article-title>
          , in IEEE Access,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>[19] https://www.kaggle.com/datasets/dhoogla/unswnb15</mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>