<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">46396</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2024.046396</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>CL2ES-KDBC: A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems</article-title>
<alt-title alt-title-type="left-running-head">CL2ES-KDBC: A Novel Covariance Embedded Selection based on Kernel Distributed Bayes Classifier for Detection of Cyber-attacks in IoT Systems</alt-title>
<alt-title alt-title-type="right-running-head">CL2ES-KDBC: A Novel Covariance Embedded Selection based on Kernel Distributed Bayes Classifier for Detection of Cyber-attacks in IoT Systems</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Albalawi</surname><given-names>Talal</given-names></name></contrib>
<contrib id="author-2" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Ganeshkumar</surname><given-names>P.</given-names></name><email>gpperumal@imamu.edu.sa</email></contrib>
<aff><institution>Computer Science Department, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU)</institution>, <addr-line>Riyadh, 11432</addr-line>, <country>Saudi Arabia</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: P. Ganeshkumar. Email: <email>gpperumal@imamu.edu.sa</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2024</year></pub-date>
<pub-date date-type="pub" publication-format="electronic"><day>26</day>
<month>3</month>
<year>2024</year></pub-date>
<volume>78</volume>
<issue>3</issue>
<fpage>3511</fpage>
<lpage>3528</lpage>
<history>
<date date-type="received">
<day>28</day>
<month>9</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>11</day>
<month>1</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2024 Albalawi and Ganeshkumar</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Albalawi and Ganeshkumar</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_46396.pdf"></self-uri>
<abstract>
<p>The Internet of Things (IoT) is a growing technology that allows the sharing of data with other devices across wireless networks. Specifically, IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks. In this framework, a Covariance Linear Learning Embedding Selection (CL2ES) methodology is used at first to extract the features highly associated with the IoT intrusions. Then, the Kernel Distributed Bayes Classifier (KDBC) is created to forecast attacks based on the probability distribution value precisely. In addition, a unique Mongolian Gazellas Optimization (MGO) algorithm is used to optimize the weight value for the learning of the classifier. The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets, The obtained results are then compared with current classification methods regarding accuracy (97%), precision (96.5%), and other factors. Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed, which provides valuable insight into its performance, efficiency, and suitability for securing IoT networks.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>IoT</kwd>
<kwd>security</kwd>
<kwd>attack detection</kwd>
<kwd>covariance linear learning embedding selection</kwd>
<kwd>kernel distributed bayes classifier</kwd>
<kwd>mongolian gazellas optimization</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Internet of Things (IoT) [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-2">2</xref>] is seen as a fast-evolving paradigm that has significantly advanced over the past few decades. It has come together with the internet and hundreds of billions of gadgets from various platforms. A large number of networked devices that communicate with one another to enable interactions between people and objects make up the IoT, a rapidly expanding networking paradigm. There are many established IoT configurations [<xref ref-type="bibr" rid="ref-3">3</xref>,<xref ref-type="bibr" rid="ref-4">4</xref>], where the sensor devices operate in difficult radio settings with persuasive radio links that have drastically changing capabilities. The base station gathers, stores, and analyzes the incoming data [<xref ref-type="bibr" rid="ref-5">5</xref>]. IoT uses the internet and real-time applications to give users a simple and effective environment [<xref ref-type="bibr" rid="ref-6">6</xref>,<xref ref-type="bibr" rid="ref-7">7</xref>]. Securing IoT [<xref ref-type="bibr" rid="ref-8">8</xref>&#x2013;<xref ref-type="bibr" rid="ref-10">10</xref>] is a difficult task due to its heterogeneity, size, hardware resource limitations, and accessibility options. Security attacks on IoT devices can be divided into five types [<xref ref-type="bibr" rid="ref-11">11</xref>]. Physical attacks target the IoT networks&#x2019; hardware components. Because physical attacks demand a lot of resources to accomplish [<xref ref-type="bibr" rid="ref-12">12</xref>], they are challenging to carry out in IoT systems. Side-channel attacks, which draw on data retrieved via the encryption device&#x2019;s side channel. The opponents recover the device&#x2019;s key using the information they have obtained. Cryptanalysis attacks target the ciphertext as a means of weakening the encryption system and obtaining the plaintext. Software attacks [<xref ref-type="bibr" rid="ref-13">13</xref>] occur due to software security flaws. These attacks typically use deserialization techniques that insert malicious programs. Network assaults, flaws in wireless connectivity. The majority of IoT devices have minimal computing capacity, which means that only simple implementations of the cryptographic hash functions are available. Before transmitting data, every new IoT device introduced to the network must be authorized based on device authentication. Here, machine learning or deep learning models [<xref ref-type="bibr" rid="ref-14">14</xref>] are used to find unapproved IoT devices in a network. An additional defense against unauthorized access to the physical IoT layer is anonymity, which involves concealing sensitive data such as network node identities and positions.</p>
<p>Generally, the IoT attack detection models [<xref ref-type="bibr" rid="ref-15">15</xref>] are classified into the following types: signature-based and anomaly-based. The signature-based models help to identify the attacks in the incoming network traffic. On the other hand, machine learning-based artificial intelligence (AI) models [<xref ref-type="bibr" rid="ref-16">16</xref>] are used in anomaly detection strategies for spotting intrusions according to their characteristics. When compared to signature-based models, anomaly-based techniques are widely applied in many security application systems. Most of the AI-based security methodologies used in conventional work have some of the following challenges [<xref ref-type="bibr" rid="ref-17">17</xref>&#x2013;<xref ref-type="bibr" rid="ref-19">19</xref>]: complexity in system deployment, high time requirements for training the classifier, increased false alarms, and computational burden. Therefore, the proposed work intends to develop a new intrusion detection methodology for spotting several attacks on IoT systems.</p>
<p>The main contributions of this article are as follows: To extract the features that are highly correlated to IoT intrusions, a Covariance Linear Learning Embedding Selection (CL2ES) methodology is implemented. To accurately predict the attacks based on the probability distribution value, the Kernel Distributed Bayes Classifier (KDBC) is developed. To optimize the weight value for improving the learning of the classifier, a novel Mongolian Gazellas Optimization (MGO) algorithm is utilized. Several IoT cyber-attack datasets have been used to evaluate the proposed CL2ES-KDBC framework&#x2019;s security performance.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Works</title>
<p>A systematic and comprehensive review is presented in this section to investigate several machine learning and deep learning methods used in IoT security. In [<xref ref-type="bibr" rid="ref-20">20</xref>], the authors implemented an SVM-based classification algorithm for the identification of two different attacks, such as cloning and jamming, in IoT networks. Because of their restricted features and capabilities, IoT devices are vulnerable to several security threats and intimidation. Wireless communications between the energy nodes typically occur sporadically. For instance, a node repetition assault may result from the seizure of IoT devices. In [<xref ref-type="bibr" rid="ref-21">21</xref>], a novel countermeasure model designed to detect reactive jamming attacks in IoT networks is introduced. The utilization of security attack modeling provides a means to determine effective mitigation strategies and gain insight into the actual workings of jamming attacks within IoT networks. In traditional work, various defense strategies and countermeasures are developed for addressing jamming attacks in the network, which is a kind of DoS attack that aims to disrupt normal communication among the IoT sensors or nodes. In the suggested work, a new consistency algorithm has been developed for resolving the issues of jamming in IoT networks. However, the major problems with this technique are reduced network throughput and increased time for attack detection. In [<xref ref-type="bibr" rid="ref-22">22</xref>], a deep auto-encoder-based security model for IoT networks is deployed. In [<xref ref-type="bibr" rid="ref-23">23</xref>], a fuzzy logic-based machine learning algorithm for protecting wireless networks against jamming attacks is carried out. Vu et al. [<xref ref-type="bibr" rid="ref-24">24</xref>] employed a deep transfer learning mechanism for detecting cyber threats from IoT systems. The suggested model is developed by incorporating two auto-encoders, which predict intrusions by training data with a reduced loss function. However, the suggested framework limits the key issues of increased computational burden, high time complexity, and false alarms. In [<xref ref-type="bibr" rid="ref-25">25</xref>], a hybrid intrusion detection framework is developed for IoT security. This hybridized system comprises the sub-modules of placement strategy, detection strategy, and validation strategy. Khan and colleagues in their research [<xref ref-type="bibr" rid="ref-26">26</xref>] conducted an extensive analysis of various attack types in IoT networks, with a primary focus on identifying botnet attacks using advanced detection methods. Most IoT botnet detection approaches predominantly rely on behavioral strategies, primarily leveraging machine learning techniques, and occasionally incorporating deep learning methods. Otoum et al. [<xref ref-type="bibr" rid="ref-27">27</xref>] presented a comprehensive survey that delves into the various learning-based algorithms employed in detecting cyber-attacks within IoT networks. Here, several datasets used to protect IoT systems are discussed, which comprise the following: First cyber-attacks dataset: DS2OS; Second cyber-attacks dataset: NN-BaIoT; Third cyber-attacks dataset: Kyoto 2006&#x002B;; Fourth cyber-attacks dataset: NSL-KDD; Fifth cyber-attacks dataset: ISOT; Six cyber-attacks dataset: IoTID20</p>
<p>Samy et al. [<xref ref-type="bibr" rid="ref-28">28</xref>] conducted a detailed survey to analyze several deep-learning techniques for detecting cyber-attacks for fog-IoT systems. Here, the performance of the methodologies is assessed according to the detection accuracy and type of strategy used for intrusion identification. Bhayo et al. [<xref ref-type="bibr" rid="ref-29">29</xref>] used a machine learning technique to detect distributed denial of service (DDOS) of service attacks. Zagrouba et al. [<xref ref-type="bibr" rid="ref-30">30</xref>] proposed a machine learning-based attack detection algorithm for detecting some of the most common IoT attacks for DDOS attacks. In [<xref ref-type="bibr" rid="ref-31">31</xref>&#x2013;<xref ref-type="bibr" rid="ref-33">33</xref>], straightforward machine learning-based attack detection for IoT networks is carried out.</p>
<p>Thus, the existing literature currently lacks the amalgamation of feature engineering, kernel classification, and population-based optimization for weight value for intrusion detection in IoT. This paper aims to address this gap by developing a kernel-distributed Bayes classifier with a novel covariance-embedded selection method and Mongolian Gazellas optimization.</p>
</sec>
<sec id="s3">
<label>3</label>
<title>Proposed Methodology</title>
<p>The complete explanation for the proposed attack detection methodology is presented in this section. The main objective of this paper is to construct a novel framework with advanced mechanisms for guaranteeing the security of IoT systems. The workflow of the proposed security system is shown in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>, which comprises the following stages: CL2ES, KDBC, and MGO.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Workflow model of the proposed framework</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_46396-fig-1.tif"/>
</fig>
<p>As shown in the workflow model, the intrusion detection IoT datasets are taken as the input for system modeling, where feature extraction is carried out first with the use of CL2ES. This technique is mainly used to extract features that are highly correlated to IoT intrusions or attacks. According to the features, the classifier can predict the type of intrusion with the appropriate class. Here, the novel KDBC mechanism is used to categorize the class of attack based on the probability distribution value. To optimize the weight value of this classifier, the MGO algorithm is deployed, which simplifies classification. The primary advantages of using this proposed CL2ES-KDBC-based security framework are as follows: it is simple to deploy, highly capable of handling very large intrusion datasets, has a low processing time, and is easy to comprehend.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Covariance Linear Learning Embedding Selection (CL2ES)</title>
<p>CL2ES model is implemented to extract certain features that are more correlated to the IoT intrusions. Typically, feature extraction is one of the most important operating stages of any intrusion detection system since the training process of the classifier completely depends on the features of the dataset. Thus, the proposed work intends to use a new learning-based feature extraction model for developing a security framework. It is a kind of linear algorithm that represents each data point according to the weight coefficient value. According to the geometric relations, linear mapping is performed in this model, where the high-dimensional space is transformed into a low-dimensional space with the operations of scaling and translation. Based on this process, it effectively preserves the geometric relationship between the data points. Let, <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi>Z</mml:mi><mml:mo>&#x2282;</mml:mo><mml:msup><mml:mi>B</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> is a low dimensional vector encased in the high dimensional space <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:msup><mml:mi>B</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula>, where <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:mi>n</mml:mi><mml:mo>&#x226A;</mml:mo><mml:mi>N</mml:mi></mml:math></inline-formula>; n indicates the number of data points in the high dimensional space v, as represented below:</p>
<p><disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:mi>v</mml:mi><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2223;</mml:mo><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi><mml:mo>,</mml:mo><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mi>B</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></disp-formula></p>
<p>At the beginning, the nearest <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mi>c</mml:mi></mml:math></inline-formula> points are filtered <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:msub><mml:mi>K</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:msubsup><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:msubsup><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:msubsup><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:msubsup><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msubsup><mml:mo>}</mml:mo></mml:mrow></mml:math></inline-formula> using the KNN criterion for each D-dimensional data point <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, and the neighborhood graph <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mrow><mml:mover><mml:mi>G</mml:mi><mml:mo>&#x02D8;</mml:mo></mml:mover></mml:mrow></mml:math></inline-formula> is constructed based on the Euclidean distance. A weighted linear representation of each data point&#x2019;s neighborhood points can be used to portray it, and the reconstruction error can be minimized by lowering the following objective functions:</p>
<p><disp-formula id="ueqn-2"><mml:math id="mml-ueqn-2" display="block"><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>&#x03B4;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="fraktur">w</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>g</mml:mi></mml:mrow></mml:munderover><mml:msup><mml:mrow><mml:mo symmetric="true">&#x2016;</mml:mo><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:munderover><mml:msub><mml:mrow><mml:mi mathvariant="fraktur">w</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mtext>*</mml:mtext></mml:mrow><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo symmetric="true">&#x2016;</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mi>s</mml:mi><mml:mo>.</mml:mo><mml:mi>t</mml:mi><mml:mo>.</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing=".2em" columnspacing="1em" displaystyle="false"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="fraktur">w</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2209;</mml:mo><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:munder><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:munder><mml:msub><mml:mrow><mml:mi mathvariant="fraktur">w</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math></disp-formula></p><p>where, <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:msub><mml:mrow><mml:mi mathvariant="fraktur">w</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mi>f</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the weight value of the reconstructed contribution, j, and f are the sample points, <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> denotes the number of neighborhood points in <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mi>c</mml:mi></mml:math></inline-formula>. The value of <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:msub><mml:mrow><mml:mi mathvariant="fraktur">w</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mi>f</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is set to 1, if the sample <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:mi>f</mml:mi></mml:math></inline-formula> is the neighborhood of the point <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:mi>j</mml:mi></mml:math></inline-formula>; otherwise, it is set as 0. Then, the parameter <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is used to construct the d-dimensional embedded space according to the cost function as computed below:</p>
<p><disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mi>&#x03B4;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi mathvariant="normal">&#x2135;</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:munder><mml:msup><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:munder><mml:msub><mml:mrow><mml:mi mathvariant="fraktur">w</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math></disp-formula></p>
<p>Based on this model, the optimal weight value <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:msub><mml:mrow><mml:mi mathvariant="fraktur">w</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mi>f</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is computed that helps to reduce the cost function, and also the optimized low dimensional coordinate <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is obtained as given in <xref ref-type="disp-formula" rid="eqn-4">Eq. (4)</xref>.
<disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mrow><mml:mi mathvariant="normal">&#x2135;</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>g</mml:mi><mml:mo>,</mml:mo><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mi>B</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo>}</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>Moreover, the covariance matrix &#x2211; is estimated that helps to define the relationship between the center point <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> of the neighborhood and the rest of the sample points <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mo>.</mml:mo></mml:math></inline-formula> The matrix is constructed by using the following equation:</p>
<p><disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:mo>&#x2211;</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mi>d</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mfrac><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:munderover><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:mover><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mo>)</mml:mo></mml:mrow><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:mover><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msup></mml:math></disp-formula></p>
<p>Consequently, the Mahalanobis Distance (MD) is estimated by using the covariance matrix and center point as shown in <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref>.
<disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula>
<disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:msub><mml:mrow><mml:mo>&#x0271;</mml:mo></mml:mrow><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msqrt><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:mover><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:mover><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mo>)</mml:mo></mml:mrow></mml:msqrt></mml:math></disp-formula></p>
<p>Then, a descending order of <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:msub><mml:mrow><mml:mo>&#x0271;</mml:mo></mml:mrow><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is obtained by choosing the nearest points <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, and it can be set as the neighborhood <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:mi>A</mml:mi></mml:math></inline-formula>. Moreover, the features are extracted by updating the center point set as shown in <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref>.
<disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:mi>A</mml:mi><mml:mo>=</mml:mo><mml:mi>A</mml:mi><mml:mo>&#x222A;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mo>.</mml:mo></mml:math></disp-formula></p>
<p>This set of features <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:mi>A</mml:mi></mml:math></inline-formula> can be further used by the classifier for training and testing processes.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Kernel Distributed Bayes Classifier (KDBC)</title>
<p>After feature extraction, the novel KDBC classification technique is applied to categorize the type of intrusion in the dataset. Here, the classifier&#x2019;s training and testing operations are performed using features extracted from the previous stage. In the existing work, several machine learning and deep learning classification approaches are used for attack identification and categorization. Most of the models have the key problems of high error rates, mis-prediction outcomes, high processing times, and a lack of reliability. Thus, the proposed work intends to use a new kernel classification model to ensure the security of IoT networks. One of the most popular classifiers used for analytical data mining is the Bayesian network. The directed acyclic graph that serves as the foundation for the Bayesian network has nodes that represent attributes and arcs that indicate attribute relationships. The attribute dependencies are quantified in this manner by the conditional probabilities for each node based on the attributes of its parents. In this study, the kernel classifier model is used to resolve the intrusion detection issue due to its successful utilization in past research in other fields. The weight assigned to each characteristic in the attribute weighting approach is based on how much it contributes to the categorization. If the dataset&#x2019;s underlying distribution is understood, the data expansion strategy can address the high variance issue in learning caused by a lack of training data by adding more examples with the same pattern. To represent a hidden parent for each characteristic, which includes influences from all other attributes, the KDBC model creates a second layer. Algorithm 1 presents the pseudo code of KDBC. In this algorithm, the training set, testing set, and class label are obtained as the inputs for classification, and the predicted attack label is produced as the output.</p>
<fig id="fig-7">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_46396-fig-7.tif"/>
</fig>
<p>At first, the training features <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>s</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> are determined as the nodes of the classifier as represented in <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>.
<disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></disp-formula></p>
<p>Then, the sample values <inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> of instances <inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:msub><mml:mi>I</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> are considered as the nodes in the network. After that, the network construction is performed as represented in the following model:</p>
<p><disp-formula id="eqn-10"><label>(10)</label><mml:math id="mml-eqn-10" display="block"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>I</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:munder><mml:mrow><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>g</mml:mi><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x03B3;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:munder><mml:mo>&#x2061;</mml:mo><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>Here, the attributes are naively assumed as independent, and the given class is represented as shown in <xref ref-type="disp-formula" rid="eqn-11">Eq. (11)</xref>.
<disp-formula id="eqn-11"><label>(11)</label><mml:math id="mml-eqn-11" display="block"><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>I</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msubsup><mml:mo movablelimits="false">&#x220F;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msubsup><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>Typically, this type of classifier is simple to construct, due to the computational simplicity of reaching <inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-38"><mml:math id="mml-ieqn-38"><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula>.
<disp-formula id="eqn-12"><label>(12)</label><mml:math id="mml-eqn-12" display="block"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>I</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:munder><mml:mrow><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>g</mml:mi><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x03B3;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:munder><mml:mo>&#x2061;</mml:mo><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:msubsup><mml:mo movablelimits="false">&#x220F;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msubsup><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>This model is built based on the conditional mutual information, which describes the interaction among the Bayesian nodes as represented below:</p>
<p><disp-formula id="eqn-13"><label>(13)</label><mml:math id="mml-eqn-13" display="block"><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mi>I</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>T</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msub><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mi>&#x03D1;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mi>log</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:mrow><mml:mi>&#x03D1;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>&#x03D1;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mi>&#x03D1;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p><p>where, <inline-formula id="ieqn-39"><mml:math id="mml-ieqn-39"><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>and</mml:mtext></mml:mrow><mml:mspace width="thinmathspace" /><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> are the values of samples. Then, the value of <inline-formula id="ieqn-40"><mml:math id="mml-ieqn-40"><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mi>I</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>T</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> indicates the weight of the arc&#x2019;s link to attribute nodes <inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mi>T</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> on the Bayesian network and is calculated for each attribute pair. Moreover, each attribute in the hidden pattern <inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:msubsup><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>h</mml:mi><mml:mi>p</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula> is estimated concerning the weighted influences of all the attributes as shown in below:</p>
<p><disp-formula id="eqn-14"><label>(14)</label><mml:math id="mml-eqn-14" display="block"><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mi>p</mml:mi><mml:mi>r</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msubsup><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>h</mml:mi><mml:mi>p</mml:mi></mml:mrow></mml:msubsup><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:munderover><mml:msubsup><mml:mi>W</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msubsup><mml:mrow><mml:mtext>*</mml:mtext></mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mi>I</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>
<disp-formula id="eqn-15"><label>(15)</label><mml:math id="mml-eqn-15" display="block"><mml:msubsup><mml:mi>W</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mtext>&#xA0;*&#xA0;</mml:mtext></mml:mrow><mml:mi>&#x03D1;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msubsup><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>h</mml:mi><mml:mi>p</mml:mi></mml:mrow></mml:msubsup><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:munderover><mml:mi>&#x03D1;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msubsup><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>h</mml:mi><mml:mi>p</mml:mi></mml:mrow></mml:msubsup><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:math></disp-formula></p><p>where, <inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:mi>d</mml:mi></mml:math></inline-formula>, and <inline-formula id="ieqn-45"><mml:math id="mml-ieqn-45"><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> indicates the parameter estimated by using the MGO.</p>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Mongolian Gazellias Optimization (MGO)</title>
<p>In the proposed framework, the purpose of using the MGO algorithm is to compute the weight value for improving the process of classification. It is one of the newly developed meta-heuristic optimization algorithms that inspired the behavior of gazelles. Specifically, it is a kind of population-based optimization model that is more suitable for solving complex optimization problems. The gazelle is aware that it will become food for the day if it cannot outrun and outpace its predators. Algorithm 2 presents the pseudo code of MGO. This algorithm begins with the process of population initialization, which is stochastically performed according to the upper <inline-formula id="ieqn-46"><mml:math id="mml-ieqn-46"><mml:mi>b</mml:mi><mml:msup><mml:mi>o</mml:mi><mml:mrow><mml:mi>u</mml:mi><mml:mi>p</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> and lower bounds <inline-formula id="ieqn-47"><mml:math id="mml-ieqn-47"><mml:mi>b</mml:mi><mml:msup><mml:mi>o</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>o</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> as represented in <xref ref-type="disp-formula" rid="eqn-16">Eq. (16)</xref>.
<disp-formula id="eqn-16"><label>(16)</label><mml:math id="mml-eqn-16" display="block"><mml:mi>P</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mtable columnalign="center center center center center" rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>h</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>h</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mi>h</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mi>h</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x22EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x22EE;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:mtable columnalign="left" rowspacing="0em 0em 0.4em" columnspacing="1em"><mml:mtr><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x22EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x22EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mo>,</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mo>,</mml:mo><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mo>,</mml:mo><mml:mi>h</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mo>,</mml:mo><mml:mi>h</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p><p>where, <inline-formula id="ieqn-48"><mml:math id="mml-ieqn-48"><mml:mi>P</mml:mi></mml:math></inline-formula> indicates the set of current candidate populations generated randomly, <inline-formula id="ieqn-49"><mml:math id="mml-ieqn-49"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the position of the <inline-formula id="ieqn-50"><mml:math id="mml-ieqn-50"><mml:msup><mml:mi>n</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>h</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> dimension of the <inline-formula id="ieqn-51"><mml:math id="mml-ieqn-51"><mml:msup><mml:mi>m</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>h</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> population and <inline-formula id="ieqn-52"><mml:math id="mml-ieqn-52"><mml:mi>g</mml:mi></mml:math></inline-formula> denotes the total number of the population. Then, the sample of the population is defined based on <xref ref-type="disp-formula" rid="eqn-17">Eq. (17)</xref>.
<disp-formula id="eqn-17"><label>(17)</label><mml:math id="mml-eqn-17" display="block"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mrow><mml:mtext>*</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>b</mml:mi><mml:msubsup><mml:mi>o</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow><mml:mrow><mml:mi>u</mml:mi><mml:mi>p</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:mi>b</mml:mi><mml:msubsup><mml:mi>o</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow><mml:mrow><mml:mi>l</mml:mi><mml:mi>o</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msubsup><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mi>b</mml:mi><mml:msubsup><mml:mi>o</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow><mml:mrow><mml:mi>l</mml:mi><mml:mi>o</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msubsup></mml:math></disp-formula></p>
<p>A stochastic process in which the normal probability distribution function with zero mean <inline-formula id="ieqn-53"><mml:math id="mml-ieqn-53"><mml:mover><mml:mi>&#x03C9;</mml:mi><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> and unit variance (<inline-formula id="ieqn-54"><mml:math id="mml-ieqn-54"><mml:msup><mml:mrow><mml:mi>&#x03D5;</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>) is used to determine the step length. At this point <inline-formula id="ieqn-55"><mml:math id="mml-ieqn-55"><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:math></inline-formula>, the standard Brownian motion is determined based on <xref ref-type="disp-formula" rid="eqn-18">Eq. (18)</xref>.
<disp-formula id="eqn-18"><label>(18)</label><mml:math id="mml-eqn-18" display="block"><mml:mrow><mml:mi>&#x0273;</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow><mml:mo>,</mml:mo><mml:mover><mml:mi>&#x03C9;</mml:mi><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mo>,</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03D5;</mml:mi></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:msqrt><mml:mn>2</mml:mn></mml:msqrt><mml:mi>&#x03C0;</mml:mi><mml:msup><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03D5;</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mfrac><mml:msup><mml:mi>exp</mml:mi><mml:mrow><mml:mo stretchy="false">[</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mover><mml:mi>&#x03C9;</mml:mi><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mn>2</mml:mn><mml:msup><mml:mrow><mml:mi>&#x03D5;</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mfrac><mml:mo stretchy="false">]</mml:mo></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:msqrt><mml:mn>2</mml:mn></mml:msqrt><mml:mi>&#x03C0;</mml:mi></mml:mrow></mml:mfrac><mml:msup><mml:mi>exp</mml:mi><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:msup><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mn>2</mml:mn></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:msup></mml:math></disp-formula></p>
<p>Based on the Levy distribution, the random walk is performed by the Levy flight as shown in <xref ref-type="disp-formula" rid="eqn-19">Eq. (19)</xref>.
<disp-formula id="eqn-19"><label>(19)</label><mml:math id="mml-eqn-19" display="block"><mml:msub><mml:mrow><mml:mtext>V</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>L</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>n</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2248;</mml:mo><mml:msup><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>n</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mi mathvariant="normal">&#x03C6;</mml:mi></mml:mrow></mml:mrow></mml:msup></mml:math></disp-formula></p><p>where, <inline-formula id="ieqn-56"><mml:math id="mml-ieqn-56"><mml:msub><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>n</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> represents the flight length and <inline-formula id="ieqn-57"><mml:math id="mml-ieqn-57"><mml:mn>1</mml:mn><mml:mo>&#x003C;</mml:mo><mml:mi>&#x03C6;</mml:mi><mml:mo>&#x2264;</mml:mo><mml:mn>2</mml:mn></mml:math></inline-formula> is the power-law exponent. Then, the L&#x00E9;vy stable process as an integral step is represented below:</p>
<p><disp-formula id="eqn-20"><label>(20)</label><mml:math id="mml-eqn-20" display="block"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mtext>V</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>L</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow><mml:mo>,</mml:mo><mml:mover><mml:mi>&#x03C9;</mml:mi><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mo>,</mml:mo><mml:mrow><mml:mi>&#x03D5;</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mi>&#x03C0;</mml:mi></mml:mfrac><mml:msubsup><mml:mo>&#x222B;</mml:mo><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x221E;</mml:mi></mml:mrow></mml:msubsup><mml:msup><mml:mi>exp</mml:mi><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>s</mml:mtext></mml:mrow><mml:msup><mml:mrow><mml:mtext>z</mml:mtext></mml:mrow><mml:mrow><mml:mi>&#x03C6;</mml:mi></mml:mrow></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:msup><mml:mo>&#x2061;</mml:mo><mml:mi>cos</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>z * p</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p><p>where, <inline-formula id="ieqn-58"><mml:math id="mml-ieqn-58"><mml:mrow><mml:mi mathvariant="normal">&#x03C6;</mml:mi></mml:mrow></mml:math></inline-formula> is the distribution index that controls the scale properties of the motion within the range of 0.3&#x2013;1.99, and <inline-formula id="ieqn-59"><mml:math id="mml-ieqn-59"><mml:mrow><mml:mtext>z</mml:mtext></mml:mrow></mml:math></inline-formula> represents the scale unit. Moreover, the Levy motion is updated based on the following model, which is considered the optimal value:</p>
<p><disp-formula id="eqn-21"><label>(21)</label><mml:math id="mml-eqn-21" display="block"><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mover><mml:mi>&#x03C9;</mml:mi><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mo>,</mml:mo><mml:mrow><mml:mi>&#x03D5;</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0.05</mml:mn><mml:mrow><mml:mtext>&#xA0;*&#xA0;</mml:mtext></mml:mrow><mml:mfrac><mml:mrow><mml:mtext>u</mml:mtext></mml:mrow><mml:msup><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:mtext>q</mml:mtext></mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mi>&#x03C6;</mml:mi></mml:mfrac></mml:mrow></mml:msup></mml:mfrac></mml:math></disp-formula><disp-formula id="eqn-22"><label>(22)</label><mml:math id="mml-eqn-22" display="block"><mml:msub><mml:mrow><mml:mi>&#x03D5;</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>u</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mo>[</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:mover><mml:mi mathvariant="normal">&#x0393;</mml:mi><mml:mo>&#x00B4;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mi>&#x03C6;</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mi>sin</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mi>&#x03C0;</mml:mi><mml:mi>&#x03C6;</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:mfrac></mml:mstyle><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mover><mml:mi mathvariant="normal">&#x0393;</mml:mi><mml:mo>&#x00B4;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mi>&#x03C6;</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:mfrac></mml:mstyle><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mtext>*&#xA0;</mml:mtext></mml:mrow><mml:msup><mml:mi>&#x03C6;</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mtext>&#xA0;*</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C6;</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:mfrac></mml:mstyle><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mi>&#x03C6;</mml:mi></mml:mfrac></mml:mrow></mml:msup></mml:math></disp-formula></p><p>where, <inline-formula id="ieqn-60"><mml:math id="mml-ieqn-60"><mml:mrow><mml:mtext>u</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mi>&#x1D4A9;</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:msubsup><mml:mrow><mml:mi>&#x03D5;</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>u</mml:mtext></mml:mrow></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula>, <inline-formula id="ieqn-61"><mml:math id="mml-ieqn-61"><mml:mrow><mml:mtext>q</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mi>&#x1D4A9;</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:msubsup><mml:mrow><mml:mi>&#x03D5;</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>q</mml:mtext></mml:mrow></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula>, <inline-formula id="ieqn-62"><mml:math id="mml-ieqn-62"><mml:msub><mml:mrow><mml:mi>&#x03D5;</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-63"><mml:math id="mml-ieqn-63"><mml:mrow><mml:mi mathvariant="normal">&#x03C6;</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mn>0.5</mml:mn></mml:math></inline-formula>. The obtained optimal value can be used to compute the weight value of the classifier.</p>
<fig id="fig-8">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_46396-fig-8.tif"/>
</fig>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Experimental Results</title>
<p>By using a variety of performance indicators, the outcomes of the current and proposed security frameworks are verified and compared. Additionally, this investigation uses a variety of recent and well-known IoT intrusion datasets for validation [<xref ref-type="bibr" rid="ref-32">32</xref>,<xref ref-type="bibr" rid="ref-33">33</xref>]. It includes the datasets of KDD Cup&#x2019;99, UNSW-NB 15, NSL-KDD, IoTID20, and CICIDS 2017. The main contribution of this security framework is to spot the most harmful intrusions against the IoT networks, which include the following: jamming, flooding, black holes, Sybil, selective forwarding, vulnerability, and packet flooding. The results of confusion matrix and ROC analysis is depicted in <xref ref-type="fig" rid="fig-2">Figs. 2</xref> and <xref ref-type="fig" rid="fig-3">3</xref>, respectively, where the different types of attacks are considered. Typically, the attack detection performance and effectiveness of the classification method are determined based on the detection accuracy. To estimate the level of accuracy, the confusion matrix could be more useful, where the actual classes are categorized by the classifiers. Based on the generated matrix, it is evident that the proposed CL2ES-KDBC accurately predicts the true classes of attacks. Moreover, the receiver operating characteristics (ROC) are analyzed for the proposed model concerning the True Positive Rate (TPR) and False Positive Rate (FPR), as shown in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>. The results indicate that the TPR of the proposed classifier is highly increased for all seven different types of attacks.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Confusion matrix</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_46396-fig-2.tif"/>
</fig><fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>ROC analysis</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_46396-fig-3.tif"/>
</fig>
<sec id="s4_1">
<label>4.1</label>
<title>Performance Measures</title>
<p>The results of the proposed security model are validated by using the following parameters: accuracy, precision, recall, and F1-score. <xref ref-type="fig" rid="fig-4">Fig. 4</xref> compares the current and proposed CL2ES-KDBC security frameworks based on accuracy and precision. Typically, accuracy is one of the most essential parameters of the prediction system, since it determines the efficacy of the entire classification system. Similarly, the accuracy, precision, and F1-score are also widely used in many intrusion detection frameworks for validating the attack detection efficacy of the classification approaches. <xref ref-type="fig" rid="fig-5">Fig. 5</xref> compares the current and proposed CL2ES-KDBC security frameworks based on the parameters of detection rate, precision, recall, and F1-score. The accuracy, precision, and F1-score are also widely used in many intrusion detection frameworks for validating the attack detection efficacy of the classification approaches.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Accuracy and precision</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_46396-fig-4.tif"/>
</fig><fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>False alarm rate</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_46396-fig-5.tif"/>
</fig>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Results Analysis</title>
<p>The proposed CL2ES-KDBC approach has been evaluated on different datasets for the detection of cyber-security attacks on IoT environments. As shown in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>, the accuracy and precision rate of the existing and proposed security approaches are validated and compared. Most of the literature deals with the key problem of an increased false alarm rate while detecting intrusions from the network. A good intrusion detection framework should effectively reduce the number of false alarms to ensure reliable attack detection. Here, the false alarm rates of the existing and proposed attack detection models are validated and compared, as shown in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>. Overall, the obtained results indicate that the proposed CL2ES-KDBC outperforms the other existing models with an increased accuracy, precision, and reduced false alarms.</p>
<p><xref ref-type="fig" rid="fig-5">Fig. 5</xref> compares the existing machine learning, deep learning, and proposed CL2ES-KDBC security models in terms of accuracy, precision, recall, and F1-score. Additionally, this research shows that, when compared to the other models, the CL2ES-KDBC approach yields better outcomes. Consequently, the accuracy of several existing and proposed classification approaches is validated and contrasted with the use of the NSL-KDD and IoTID20 datasets.</p>
<p>As shown in <xref ref-type="fig" rid="fig-6">Fig. 6</xref>, the training and testing performance of the proposed classification approach is validated by using the UNSW-NB 15 dataset based on the parameters of accuracy, precision, recall, and F1-score. Similar to that, the misclassification error is also validated for both classical and proposed models. To prove the superiority of the proposed CL2ES-KDBC approach, the accuracy is validated and compared by using different IoT intrusion datasets. Furthermore, the detection accuracy for the classical machine learning and proposed security models is compared using the NSL-KDD dataset. By using the CL2ES-based feature selection model, the attack detection process of the KDBC is highly improved in the proposed framework. It also helps to reduce the misclassification rate by accurately spotting attacks in IoT systems. Hence, the overall accuracy of the CL2ES-KDBC is highly maximized when contrasted with the other classification models.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Misclassification error rate</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_46396-fig-6.tif"/>
</fig>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Computational Analysis</title>
<p>Analyzing the computational complexity of the proposed CL2ES-KDBC algorithm using Big O notation provides insights into how its performance scales with dataset size and complexity. Feature Extraction (CL2ES): Computational Complexity: O(N &#x00D7; M^2), where N is the number of data points (samples), and M is the number of features. CL2ES algorithm involves pairwise feature comparisons, resulting in quadratic time complexity. It iterates through all data points, comparing features for feature selection.</p>
<p>Classification (KDBC): Computational Complexity: O(N &#x00D7; M &#x00D7; C), where N is the number of data points, M is the number of features, and C is the number of classes (intrusion types). The KDBC classifier processes each data point by calculating probabilities for each class. This involves multiplying feature values with weights and calculating class probabilities.</p>
<p>Optimization (MGO): The computational complexity of MGO depends on the specific optimization method applied. It can vary widely based on the algorithm&#x2019;s complexity and convergence behavior.</p>
<p>Overall Complexity (CL2ES-KDBC): The overall computational complexity of the CL2ES-KDBC system is dominated by the most computationally intensive component, which is often the CL2ES feature extraction step. Complexity for the entire system can be approximated as O(N &#x00D7; M^2) since feature extraction is typically the most time-consuming part.</p>
<p>Hypothetical computational times for the proposed CL2ES-KDBC algorithm when applied to various IoT intrusion datasets are found. These times are provided in seconds and are for illustrative purposes, not based on actual measurements. In this hypothetical scenario, processing the KDD Cup&#x2019;99 dataset would take an estimated time of 250 s, while the UNSW-NB 15 dataset would require around 420 s. The NSL-KDD dataset is processed in approximately 280 s, and the IoTID20 dataset takes roughly 440 s. For the CICIDS 2017 dataset, which may be more complex, the algorithm hypothetically requires approximately 470 s to complete its intrusion detection task.</p>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>Comparison with State-of-the Machine-Learning Algorithms</title>
<p>Comparison of the CL2ES-KDBC algorithm with various machine learning and deep learning algorithms, including SVM, ANN, and several deep learning techniques such as deep belief networks, AE (Autoencoders), DNN (Deep Neural Networks), LSTM (Long Short-Term Memory), CNN (Convolutional Neural Network), and RNN (Recurrent Neural Network), in terms of key characteristics are described in <xref ref-type="table" rid="table-1">Table 1</xref>. <xref ref-type="table" rid="table-1">Table 1</xref> shows that CL2ES-KDBC offers a balance between interpretability and performance, while deep learning models are powerful for complex data patterns but may require additional resources.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Comparison of CL2ES-KDBC algorithm with various machine and/or deep learning algorithms</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Characteristic</th>
<th>CL2ES-KDBC</th>
<th>SVM</th>
<th>ANN</th>
<th>DBN</th>
<th>AE</th>
<th>DNN</th>
<th>LSTM</th>
<th>CNN</th>
<th>RNN</th>
</tr>
</thead>
<tbody>
<tr>
<td>Feature extraction</td>
<td>CL2ES</td>
<td>Manual</td>
<td>Manual</td>
<td>Automatically</td>
<td>Automatically</td>
<td>Automatically</td>
<td>Automatically</td>
<td>Automatically</td>
<td>Automatically</td>
</tr>
<tr>
<td>Interpretability</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Low</td>
<td>Low</td>
<td>Low</td>
<td>Low</td>
<td>Low</td>
<td>Low</td>
</tr>
<tr>
<td>Model<break/>complexity</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Moderate</td>
<td>High</td>
<td>Moderate</td>
<td>High</td>
<td>Moderate</td>
<td>High</td>
<td>High</td>
</tr>
<tr>
<td>Training time</td>
<td>Short</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Long</td>
<td>Moderate</td>
<td>Long</td>
<td>Moderate</td>
<td>Long</td>
<td>Long</td>
</tr>
<tr>
<td>Dataset size</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Large</td>
<td>Moderate</td>
<td>Large</td>
<td>Large</td>
<td>Large</td>
<td>Large</td>
</tr>
<tr>
<td>Handling non-linearity</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
</tr>
<tr>
<td>Robustness to noisy data</td>
<td>Sensitive</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Moderate</td>
</tr>
<tr>
<td>Hyperparameter tuning</td>
<td>Moderate</td>
<td>High</td>
<td>High</td>
<td>High</td>
<td>High</td>
<td>High</td>
<td>High</td>
<td>High</td>
<td>High</td>
</tr>
<tr>
<td>Model size</td>
<td>Small</td>
<td>Moderate</td>
<td>Moderate</td>
<td>Large</td>
<td>Moderate</td>
<td>Large</td>
<td>Large</td>
<td>Large</td>
<td>Large</td>
</tr>
<tr>
<td>Performance</td>
<td>Dataset-<break/>dependent</td>
<td>Dataset-<break/>dependent</td>
<td>Dataset-<break/>dependent</td>
<td>Dataset-<break/>dependent</td>
<td>Dataset-<break/>dependent</td>
<td>Dataset-<break/>dependent</td>
<td>Dataset-<break/>dependent</td>
<td>Dataset-<break/>dependent</td>
<td>Dataset-<break/>dependent</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Discussions</title>
<p>This section introduces the proposed intrusion detection framework, emphasizing its novel features. The framework comprises three key stages: feature extraction using the CL2ES methodology, attack prediction through the KDBC, and weight optimization using the MGO algorithm. The CL2ES model is discussed as the first step in feature extraction. This linear algorithm is chosen for its ability to represent data points based on weight coefficients, focusing on features highly correlated with IoT intrusions. The quality of features extracted at this stage is crucial for subsequent classification. The discussion then moves to the second stage, where KDBC is used for attack prediction. This classifier categorizes intrusion types based on probability distribution values and leverages a second layer to address attribute dependencies. The importance of classifying attacks accurately is highlighted. The third stage, weight optimization using the MGO algorithm, is explained. MGO is described as a newly developed metaheuristic optimization algorithm inspired by gazelles&#x2019; behavior. It was chosen to improve classifier learning by optimizing weight values and simplifying classification operations. The framework&#x2019;s ability to reduce false alarms is discussed as a critical aspect of intrusion detection. It is highlighted that the proposed CL2ES-KDBC outperforms existing models in terms of reduced false alarms. The discussion includes a comparative analysis of the proposed framework against classical machine learning and deep learning models. Metrics such as accuracy, precision, recall, and F1-score are used to demonstrate the superiority of the CL2ES-KDBC approach. The robustness and generalization of the proposed approach are evaluated using various IoT intrusion datasets. It is emphasized that the framework consistently achieves high accuracy across different datasets, highlighting its reliability.</p>
<sec id="s5_1">
<label>5.1</label>
<title>Applications of CL2ES-KDBC Approach Related to IoT-Intrusion Datasets</title>
<p>The proposed CL2ES-KDBC approach has versatile applications across different IoT intrusion datasets. It consistently aims to improve intrusion detection accuracy, reduce false alarms, and enhance overall security in IoT systems, making it a valuable tool for safeguarding IoT networks from a variety of cyber threats as described in <xref ref-type="table" rid="table-2">Table 2</xref>.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>A table describing the applications of the proposed CL2ES-KDBC approach on various IoT intrusion datasets</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>IoT intrusion dataset</th>
<th>Application of CL2ES-KDBC approach</th>
</tr>
</thead>
<tbody>
<tr>
<td>1. KDD Cup&#x2019;99</td>
<td>- Accurately detect and categorize various intrusion types, including jamming, flooding, blackhole, Sybil, selective forwarding, vulnerability, and packet flooding.</td>
</tr>
<tr>
<td>2. UNSW-NB 15</td>
<td>- Improve intrusion detection accuracy, precision, recall, and F1-score. - Reduce false alarms and misclassification errors.</td>
</tr>
<tr>
<td>3. NSL-KDD</td>
<td>- Enhance the overall security performance of IoT systems by effectively identifying intrusions.</td>
</tr>
<tr>
<td/>
<td>- Provide robust intrusion detection across diverse attack scenarios.</td>
</tr>
<tr>
<td>4. IoTID20</td>
<td>- Enable the detection of specific and harmful intrusions, contributing to IoT network security.</td>
</tr>
<tr>
<td/>
<td>- Offer a reliable security framework for IoT applications.</td>
</tr>
<tr>
<td>5. CICIDS 2017</td>
<td>- Provide a powerful defense mechanism against various IoT cyber threats.</td>
</tr>
<tr>
<td/>
<td>- Optimize the weight values for improved classification and intrusion detection.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Advantages of CL2ES-KDBC Approach</title>
<p>The results of the CL2ES-KDBC approach in the context of IoT intrusion detection are highlighted as follows:
<list list-type="order">
<list-item>
<p>The CL2ES-KDBC approach demonstrates high accuracy in detecting and categorizing various types of intrusions within IoT networks. It effectively distinguishes between different attack classes, including jamming, flooding, black hole, Sybil, selective forwarding, vulnerability, and packet flooding.</p></list-item>
<list-item>
<p>One of the significant achievements of the CL2ES-KDBC approach is its ability to significantly reduce false alarms. This means that the intrusion detection system based on this approach is less likely to generate false positive alerts, leading to improved reliability and decreased unnecessary alerts for network administrators.</p></list-item>
<list-item>
<p>The precision and recall metrics are substantially improved compared to existing intrusion detection models. This signifies that the CL2ES-KDBC approach not only identifies intrusions accurately (high precision) but also effectively captures instances of true intrusions (high recall).</p></list-item>
<list-item>
<p>The use of the MGO algorithm in the framework leads to optimized weight values. This optimization enhances the learning process of the classifier, contributing to the system&#x2019;s overall performance.</p></list-item>
<list-item>
<p>The CL2ES-KDBC approach exhibits robustness and generalization across various IoT intrusion datasets, including KDD Cup&#x2019;99, UNSW-NB 15, NSL-KDD, IoTID20, and CICIDS 2017. This robustness ensures that the approach maintains high accuracy and reliability in different attack scenarios.</p></list-item>
<list-item>
<p>Comparative analyses against classical machine learning and deep learning models consistently demonstrate the superiority of the CL2ES-KDBC approach. It outperforms existing models in terms of accuracy, precision, recall, and F1-score.</p></list-item>
<list-item>
<p>The reduction in false alarms and false positives contributes to a more efficient intrusion detection system. Network administrators can trust the alerts generated by the CL2ES-KDBC approach, focusing their attention on genuine threats.</p></list-item>
<list-item>
<p>Overall, the CL2ES-KDBC approach provides an improved security framework for IoT networks. It excels in detecting a wide range of attacks, optimizing classification processes, and ensuring the reliability of intrusion detection systems in IoT applications.</p></list-item>
</list></p>
<p>In summary, the CL2ES-KDBC approach achieves outstanding results in IoT intrusion detection by combining feature extraction, probabilistic classification, and optimization techniques. Its ability to reduce false alarms, enhance accuracy, and adapt to various IoT intrusion datasets makes it a valuable tool for strengthening the security of IoT networks against cyber threats.</p>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Conclusion</title>
<p>The IoT, a promising technology, has been developed for various uses, from modest smart home systems to massive networks. However, this sizable network is vulnerable to several issues, jeopardizing its dependability. This study focuses on creating a portable security framework for IoT intrusion detection. This paper mainly aims to accurately identify the seven different types of intrusions in IoT systems by utilizing the CL2ES-KDBC methodology. Besides, popular IoT intrusion datasets are used in this work to prove the superiority of the proposed model. Here, the employed CL2ES methodology helped extract the features highly associated with IoT incursions. Then, the research created the KDBC for precise attack detection based on the probability distribution value. Moreover, a unique MGO algorithm is used to optimize the weight value for the improvement of the learning process of the classifier. To validate the results of the framework, the paper has analyzed several performance indicators. It includes the measures of accuracy, detection rate, misclassification rate, precision, recall, etc. Finally, the results indicate that the combination of CL2ES-KDBC outperforms the other classification approaches with improved performance values. Due to the inclusion of proper feature extraction and intrusion classification, the proposed CL2ES-KDBC performs more effectively. In the future, this framework will be implemented for smart city networks.</p>
</sec>
</body>
<back>
<ack>
<p>Not applicable.</p>
</ack>
<sec><title>Funding Statement</title>
<p>The authors received no specific funding for this study.</p>
</sec>
<sec><title>Author Contributions</title>
<p>The authors confirm contribution to the paper as follows: study conception and design: Talal Albalawi, P. Ganeshkumar; data collection: Talal Albalawi, P. Ganeshkumar; analysis and interpretation of results: Talal Albalawi; draft manuscript preparation: P. Ganeshkumar. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability"><title>Availability of Data and Materials</title>
<p>Data available on request from the authors. The data that support the findings of this study are available from the corresponding author, P. Ganeshkumar, upon reasonable request.</p>
</sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Alosaimi</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Almutairi</surname></string-name></person-group>, &#x201C;<article-title>An intrusion detection system using BoT-IoT</article-title>,&#x201D; <source>Appl. Sci.</source>, vol. <volume>13</volume>, no. <issue>9</issue>, pp. <fpage>5427</fpage>&#x2013;<lpage>5440</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.3390/app13095427</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Awajan</surname></string-name></person-group>, &#x201C;<article-title>A novel deep learning-based intrusion detection dystem for IoT networks</article-title>,&#x201D; <source>Comput.</source>, vol. <volume>12</volume>, no. <issue>2</issue>, pp. <fpage>34</fpage>&#x2013;<lpage>45</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.3390/computers12020034</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Bhayo</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Jafaq</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Ahmed</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Hameed</surname></string-name>, and <string-name><given-names>S. A.</given-names> <surname>Shah</surname></string-name></person-group>, &#x201C;<article-title>A time-efficient approach toward DDoS attack detection in IoT network using SDN</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>9</volume>, no. <issue>5</issue>, pp. <fpage>3612</fpage>&#x2013;<lpage>3630</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2021.3098029</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Ullah</surname></string-name> and <string-name><given-names>Q.</given-names> <surname>Mahmoud</surname></string-name></person-group>, &#x201C;<article-title>Design and development of a deep learning-based model for anomaly detection in IoT networks</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>9</volume>, pp. <fpage>103906</fpage>&#x2013;<lpage>103926</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2021.3094024</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O. A.</given-names> <surname>Alkhudaydi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Krichen</surname></string-name>, and <string-name><given-names>A. D.</given-names> <surname>Alghamdi</surname></string-name></person-group>, &#x201C;<article-title>A deep learning methodology for predicting cybersecurity attacks on the Internet of Things</article-title>,&#x201D; <source>Information</source>, vol. <volume>14</volume>, no. <issue>10</issue>, pp. <fpage>550</fpage>&#x2013;<lpage>569</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.3390/info14100550</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y. S.</given-names> <surname>Almutairi</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Alhazmi</surname></string-name>, and <string-name><given-names>A. A.</given-names> <surname>Munshi</surname></string-name></person-group>, &#x201C;<article-title>Network intrusion detection using machine learning techniques</article-title>,&#x201D; <source>J. Adv. Sci. Tecnol. Res.</source>, vol. <volume>16</volume>, no. <issue>3</issue>, pp. <fpage>193</fpage>&#x2013;<lpage>206</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.12913/22998624/149934</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Ullah</surname></string-name> and <string-name><given-names>Q. H.</given-names> <surname>Mahmoud</surname></string-name></person-group>, &#x201C;<article-title>Design and development of RNN anomaly detection model for IoT networks</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>10</volume>, pp. <fpage>62722</fpage>&#x2013;<lpage>62750</lpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Laassar</surname></string-name> and <string-name><given-names>M. Y.</given-names> <surname>Hadi</surname></string-name></person-group>, &#x201C;<article-title>Intrusion detection systems for Internet of Thing based big data: A review</article-title>,&#x201D; <source>Int. J. Reconfigurable Embed. Syst.</source>, vol. <volume>12</volume>, no. <issue>1</issue>, pp. <fpage>87</fpage>&#x2013;<lpage>96</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.11591/ijres.v12.i1</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. C.</given-names> <surname>Altunay</surname></string-name> and <string-name><given-names>Z. A.</given-names> <surname>Albayrak</surname></string-name></person-group>, &#x201C;<article-title>Hybrid CNN&#x002B;LSTM based intrusion detection system for industrial IoT networks</article-title>,&#x201D; <source>Int. J. Eng. Sci. Technol.</source>, vol. <volume>38</volume>, pp. <fpage>101322</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1016/j.jestch.2022.101322</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Lansky</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Deep learning-based intrusion detection systems: A systematic review</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>9</volume>, pp. <fpage>101574</fpage>&#x2013;<lpage>101599</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2021.3097247</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B. K.</given-names> <surname>Mohanta</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Jena</surname></string-name>, <string-name><given-names>U.</given-names> <surname>Satapathy</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Patnaik</surname></string-name></person-group>, &#x201C;<article-title>Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology</article-title>,&#x201D; <source>Internet of Things</source>, vol. <volume>11</volume>, no. <issue>8</issue>, pp. <fpage>100227</fpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1016/j.iot.2020.100227</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Verma</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Ranga</surname></string-name></person-group>, &#x201C;<article-title>Machine learning based intrusion detection systems for IoT applications</article-title>,&#x201D; <source>Kluw. Commun.</source>, vol. <volume>111</volume>, no. <issue>4</issue>, pp. <fpage>2287</fpage>&#x2013;<lpage>2310</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1007/s11277-019-06986-8</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Jose</surname></string-name> and <string-name><given-names>D. V.</given-names> <surname>Jose</surname></string-name></person-group>, &#x201C;<article-title>Deep learning algorithms for intrusion detection systems in Internet of Things using CIC-IDS, 2017 dataset</article-title>,&#x201D; <source>Int. J. Electr. Comput. Eng.</source>, vol. <volume>13</volume>, no. <issue>1</issue>, pp. <fpage>1134</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.11591/ijece.v13i1.pp1134-1141</pub-id>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Awajan</surname></string-name></person-group>, &#x201C;<article-title>A novel deep learning-based intrusion detection system for IoT networks</article-title>,&#x201D; <source>Comput.</source>, vol. <volume>12</volume>, no. <issue>2</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>34</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.3390/computers12020034</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I. A.</given-names> <surname>Kandhro</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>11</volume>, pp. <fpage>9136</fpage>&#x2013;<lpage>9148</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2023.3238664</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Lal</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Ravichandran</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Kavin</surname></string-name>, <string-name><given-names>N. A.</given-names> <surname>Kumar</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Bordoloi</surname></string-name> and <string-name><given-names>R. G.</given-names> <surname>Kumar</surname></string-name></person-group>, &#x201C;<article-title>IoT-based cyber security identification model through machine learning technique</article-title>,&#x201D; <source>Meas.: Sens.</source>, vol. <volume>27</volume>, pp. <fpage>100791</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1016/j.measen.2023.100791</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D. J.</given-names> <surname>Atul</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Kamalraj</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Ramesh</surname></string-name>, <string-name><given-names>K. S.</given-names> <surname>Sankaran</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Sharma</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Khasim</surname></string-name></person-group>, &#x201C;<article-title>A machine learning based IoT for providing an intrusion detection system for security</article-title>,&#x201D; <source>Microprocess. Microsyst.</source>, vol. <volume>82</volume>, no. <issue>4</issue>, pp. <fpage>103741</fpage>&#x2013;<lpage>103754</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1016/j.micpro.2020.103741</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Saba</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Rehman</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Sadad</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Kolivand</surname></string-name>, and <string-name><given-names>S. A.</given-names> <surname>Bahaj</surname></string-name></person-group>, &#x201C;<article-title>Anomaly-based intrusion detection system for IoT networks through deep learning model</article-title>,&#x201D; <source>Comput. Electr. Eng.</source>, vol. <volume>99</volume>, no. <issue>5</issue>, pp. <fpage>107810</fpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1016/j.compeleceng.2022.107810</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O. A.</given-names> <surname>Wahab</surname></string-name></person-group>, &#x201C;<article-title>Intrusion detection in the IoT under data and concept drifts: Online deep learning approach</article-title>,&#x201D; <source>IEEE Internet Things J.</source>, vol. <volume>9</volume>, no. <issue>20</issue>, pp. <fpage>19706</fpage>&#x2013;<lpage>19716</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2022.3167005</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Ganeshkumar</surname></string-name> and <string-name><given-names>T.</given-names> <surname>Albalawi</surname></string-name></person-group>, &#x201C;<article-title>A locality-sensitive hashing-based jamming detection system for IoT networks</article-title>,&#x201D; <source>Comput. Mater. Contin.</source>, vol. <volume>73</volume>, no. <issue>3</issue>, pp. <fpage>5943</fpage>&#x2013;<lpage>5959</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.32604/cmc.2022.030388</pub-id>; <pub-id pub-id-type="pmid">37303558</pub-id></mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Bhavsar</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Roy</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Kelly</surname></string-name>, and <string-name><given-names>O.</given-names> <surname>Olusola</surname></string-name></person-group>, &#x201C;<article-title>Anomaly-based intrusion detection system for IoT application</article-title>,&#x201D; <source>Discover Int. Things</source>, vol. <volume>3</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>15</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s43926-023-00034-5</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Saba</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Rehman</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Sadad</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Kolivand</surname></string-name>, and <string-name><given-names>S. A.</given-names> <surname>Bahaj</surname></string-name></person-group>, &#x201C;<article-title>Anomaly-based intrusion detection system for IoT networks through deep learning model</article-title>,&#x201D; <source>Comput. Electr. Eng.</source>, vol. <volume>99</volume>, no. <issue>5</issue>, pp. <fpage>107810</fpage>&#x2013;<lpage>107823</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1016/j.compeleceng.2022.107810</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Ganeshkumar</surname></string-name>, <string-name><given-names>K. P.</given-names> <surname>Vijayakumar</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Anandaraj</surname></string-name></person-group>, &#x201C;<article-title>A novel jammer detection framework for cluster-based wireless sensor networks</article-title>,&#x201D; <source>EURASIP J. Wirel. Commun. Netw.</source>, vol. <volume>2016</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>25</lpage>, <year>2016</year>. doi: <pub-id pub-id-type="doi">10.1186/s13638-016-0528-1</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Vu</surname></string-name>, <string-name><given-names>Q. U.</given-names> <surname>Nguyen</surname></string-name>, <string-name><given-names>D. N.</given-names> <surname>Nguyen</surname></string-name>, <string-name><given-names>D. T.</given-names> <surname>Hoang</surname></string-name>, and <string-name><given-names>E.</given-names> <surname>Dutkiewicz</surname></string-name></person-group>, &#x201C;<article-title>Deep transfer learning for IoT attack detection</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>107335</fpage>&#x2013;<lpage>107344</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2020.3000476</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Smys</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Basar</surname></string-name>, and <string-name><given-names>H.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>Hybrid intrusion detection system for Internet of Things (IoT)</article-title>,&#x201D; <source>J. ISMAC</source>, vol. <volume>2</volume>, no. <issue>4</issue>, pp. <fpage>190</fpage>&#x2013;<lpage>199</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.36548/jismac.2020.4.002</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. A.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Rehman</surname></string-name>, <string-name><given-names>K. M.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>Alghamdi</surname></string-name>, and <string-name><given-names>H. S.</given-names> <surname>Almotiri</surname></string-name></person-group>, &#x201C;<article-title>Enhance intrusion detection in computer networks based on deep extreme learning machine</article-title>,&#x201D; <source>Comput. Mater. Contin.</source>, vol. <volume>66</volume>, no. <issue>1</issue>, pp. <fpage>467</fpage>&#x2013;<lpage>480</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.32604/cmc.2020.013121</pub-id>; <pub-id pub-id-type="pmid">37303558</pub-id></mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Otoum</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Liu</surname></string-name>, and <string-name><given-names>A.</given-names> <surname>Nayak</surname></string-name></person-group>, &#x201C;<article-title>DL-IDS: A deep learning-based intrusion detection framework for securing IoT</article-title>,&#x201D; <source>Trans. Emerg. Telecommun. Technol.</source>, vol. <volume>33</volume>, no. <issue>3</issue>, pp. <fpage>3803</fpage>&#x2013;<lpage>3823</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1002/ett.3803</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Samy</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Yu</surname></string-name>, and <string-name><given-names>H.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Fog-based attack detection framework for Internet of Things using deep learning</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, no. <issue>1</issue>, pp. <fpage>74571</fpage>&#x2013;<lpage>74585</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Bhayo</surname></string-name>, <string-name><given-names>S. A.</given-names> <surname>Shah</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Hameed</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Ahmed</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Nasir</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Draheim</surname></string-name></person-group>, &#x201C;<article-title>Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks</article-title>,&#x201D; <source>Eng. Appl. Artif. Intel.</source>, vol. <volume>123</volume>, pp. <fpage>106432</fpage>&#x2013;<lpage>106447</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1016/j.engappai.2023.106432</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Zagrouba</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Alhajri</surname></string-name></person-group>, &#x201C;<article-title>Machine learning based attacks detection and countermeasures in IoT</article-title>,&#x201D; <source>Int. J. Commun. Netw. Inf. Secur.</source>, vol. <volume>13</volume>, no. <issue>1</issue>, pp. <fpage>158</fpage>&#x2013;<lpage>167</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.17762/ijcnis.v13i2.4943</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B. M.</given-names> <surname>Pampapathi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Nageswaraguptha</surname></string-name>, and <string-name><given-names>M. S.</given-names> <surname>Hema</surname></string-name></person-group>, &#x201C;<article-title>Towards an effective deep learning-based intrusion detection system in the Internet of Things</article-title>,&#x201D; <source>Telemat. Inform. Rep.</source>, vol. <volume>7</volume>, no. <issue>1</issue>, pp. <fpage>100009</fpage>&#x2013;<lpage>100029</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1016/j.teler.2022.100009</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O.</given-names> <surname>Jullian</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Otero</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Rodriguez</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Gutierrez</surname></string-name>, and <string-name><given-names>H.</given-names> <surname>Antona</surname></string-name></person-group>, &#x201C;<article-title>Deep-learning based detection for cyber-attacks in IoT networks: A distributed attack detection framework</article-title>,&#x201D; <source>J. Netw. Syst. Manag.</source>, vol. <volume>31</volume>, no. <issue>2</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>33</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s10922-023-09722-7</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Cheng</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Jiang</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Dai</surname></string-name></person-group>, &#x201C;<article-title>Building an efficient intrusion detection system based on feature selection and ensemble classifier</article-title>,&#x201D; <source>Comput. Netw.</source>, vol. <volume>174</volume>, no. <issue>8</issue>, pp. <fpage>107247</fpage>&#x2013;<lpage>107262</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1016/j.comnet.2020.107247</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>