Hybrid Optimization and Machine Learning Models for IoT Intrusion Detection in Smart Homes

Abstract

The rapid technological growth of IoT devices has significantly enhanced connectivity and usability in smart homes. However, these advantages come with substantial security risks. This study presents a hybrid machine learning approach to predict smart home intrusions using two base classifiers Random Forest Classification (RFC) and Decision Tree Classification (DTC) optimized with Dandelion Optimization (DO) and Rhizostoma Optimization Algorithm (ROA). These combinations result in four hybrid models: RFDO (RFC + DO), RFRO (RFC + ROA), DTDO (DTC + DO), and DTRO (DTC + ROA). A benchmark intrusion detection dataset tailored for smart home environments was used to train and evaluate these models. Among all models, DTRO achieved the highest accuracy of 0.981 during testing, followed by RFRO with 0.977, while the base RFC model performed the worst with 0.915, outperforming the other models in terms of precision, recall, F1-score, and Matthews correlation coefficient. This comparative analysis shows that integrating optimization techniques into traditional classifiers significantly enhances intrusion detection capabilities in resource-constrained IoT environments. The proposed models are suitable for real-time applications in smart home cybersecurity.

References

M. L. Martin, A. Sanchez-Esguevillas, and B. Carro, “Review of methods to predict connectivity of IoT wireless devices,” Novel applications of Machine Learning to Network Traffic Analysis and Prediction, 95, 2017.

J. Manyika et al., “Unlocking the potential of the Internet of Things, McKinsey & Company,” URL http://www. mckinsey. com/insights/business_technology/The_Internet_of_Things_ The_value_of_digitizing_the_physical_world, 2015.

T. A. Ahanger and A. Aljumah, “Internet of Things: A comprehensive study of security issues and defense mechanisms,” IEEE Access, 7: 11020–11028, 2018. https://doi.org/10.1109/ACCESS.2018.2876939

C. Kolias, G. Kambourakis, and M. Maragoudakis, “Swarm intelligence in intrusion detection: A survey,” Comput Secur, 30(8): 625–642, 2011. https://doi.org/10.1016/j.cose.2011.08.009

P. Shukla, “ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things,” in 2017 intelligent systems conference (IntelliSys), IEEE, 2017: 234–240. https://doi.org/10.1109/IntelliSys.2017.8324298

D. Yin, L. Zhang, and K. Yang, “A DDoS attack detection and mitigation with software-defined Internet of Things framework,” IEEE Access, 6: 24694–24705, 2018. https://doi.org/10.1109/ACCESS.2018.2831284

E. Anthi, L. Williams, M. Słowińska, G. Theodorakopoulos, and P. Burnap, “A supervised intrusion detection system for smart home IoT devices,” IEEE Internet Things J, 6(5): 9042–9053, 2019. https://doi.org/10.1109/JIOT.2019.2926365

R. Heartfield, G. Loukas, A. Bezemskij, and E. Panaousis, “Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning,” IEEE Transactions on Information Forensics and Security, 16: 1720–1735, 2020. https://doi.org/10.1109/TIFS.2020.3042049

A. Procopiou, N. Komninos, and C. Douligeris, “ForChaos: Real time application DDoS detection using forecasting and chaos theory in smart home IoT network,” Wirel Commun Mob Comput, 2019: 2019. https://doi.org/10.1155/2019/8469410

D. Yuan et al., “Intrusion detection for smart home security based on data augmentation with edge computing,” in ICC 2020-2020 IEEE International Conference on Communications (ICC), IEEE, 2020: 1–6. https://doi.org/10.1109/ICC40277.2020.9148632

R. Doshi, N. Apthorpe, and N. Feamster, “Machine learning ddos detection for consumer internet of things devices,” in 2018 IEEE Security and Privacy Workshops (SPW), IEEE, 2018: 29–35. https://doi.org/10.1109/SPW.2018.00013

Y. Meidan et al., “N-baiot—network-based detection of iot botnet attacks using deep autoencoders,” IEEE Pervasive Comput, 17(3): 12–22, 2018. https://doi.org/10.1109/MPRV.2018.03367731

R. Sridharan, R. R. Maiti, and N. O. Tippenhauer, “WADAC: Privacy-preserving anomaly detection and attack classification on wireless traffic,” in Proceedings of the 11th ACM conference on security & privacy in wireless and mobile networks, 2018: 51–62. https://doi.org/10.1145/3212480.3212495

R. Stephen and L. Arockiam, “Intrusion detection system to detect sinkhole attack on RPL protocol in Internet of Things,” International Journal of Electrical Electronics and Computer Science, 4(4): 16–20, 2017.

A. Lotfi, C. Langensiepen, S. M. Mahmoud, and M. J. Akhlaghinia, “Smart homes for the elderly dementia sufferers: identification and prediction of abnormal behaviour,” J Ambient Intell Humaniz Comput, 3: 205–218, 2012. https://doi.org/10.1007/s12652-010-0043-x

N. Butt et al., “Intelligent deep learning for anomaly-based intrusion detection in IoT smart home networks,” Mathematics, 10(23): 4598, 2022. https://doi.org/10.3390/math10234598

M. Usha and P. Kavitha, “Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier,” Wireless Networks, 23: 2431–2446, 2017. https://doi.org/10.1007/s11276-016-1300-5

M. E. Aminanto, R. Choi, H. C. Tanuwidjaja, P. D. Yoo, and K. Kim, “Deep abstraction and weighted feature selection for Wi-Fi impersonation detection,” IEEE Transactions on Information Forensics and Security, 13(3): 621–636, 2017. https://doi.org/10.1109/TIFS.2017.2762828

S. Khare and M. Totaro, “Ensemble learning for detecting attacks and anomalies in iot smart home,” in 2020 3rd international conference on data intelligence and security (ICDIS), IEEE, 2020: 56–63. https://doi.org/10.1109/ICDIS50059.2020.00014

E. D. Alalade, “Intrusion detection system in smart home network using artificial immune system and extreme learning machine,” 2020, University of Cincinnati. https://doi.org/10.1109/WF-IoT48130.2020.9221151

M. S. Alam and S. T. Vuong, “Random forest classification for detecting android malware,” in 2013 IEEE international conference on green computing and communications and IEEE Internet of Things and IEEE cyber, physical and social computing, IEEE, 2013: 663–669. https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.122

A. S. More and D. P. Rana, “Review of random forest classification techniques to resolve data imbalance,” in 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), IEEE, 2017: 72–78. https://doi.org/10.1109/ICISIM.2017.8122151

A. Palczewska, J. Palczewski, R. Marchese Robinson, and D. Neagu, “Interpreting random forest classification models using a feature contribution method,” Integration of reusable systems, pp. 193–218, 2014. https://doi.org/10.1007/978-3-319-04717-1_9

J. L. Speiser, M. E. Miller, J. Tooze, and E. Ip, “A comparison of random forest variable selection methods for classification prediction modeling,” Expert Syst Appl, 134: 93–101, 2019. https://doi.org/10.1016/j.eswa.2019.05.028

M. J. Aitkenhead, “A co-evolving decision tree classification method,” Expert Syst Appl, 34(1): 18–25, 2008. https://doi.org/10.1016/j.eswa.2006.08.008

B. Charbuty and A. Abdulazeez, “Classification based on decision tree algorithm for machine learning,” Journal of Applied Science and Technology Trends, 2(01): 20–28, 2021. https://doi.org/10.38094/jastt20165

M. A. Friedl and C. E. Brodley, “Decision tree classification of land cover from remotely sensed data,” Remote Sens Environ, 61(3): 399–409, 1997. https://doi.org/10.1016/S0034-4257(97)00049-7

A. Priyam, G. R. Abhijeeta, A. Rathee, and S. Srivastava, “Comparative analysis of decision tree classification algorithms,” International Journal of current engineering and technology, 3(2): 334–337, 2013.

Y.-Y. Song and L. U. Ying, “Decision tree methods: applications for classification and prediction,” Shanghai Arch Psychiatry, 27(2): 130, 2015. https://doi.org/10.11919/j.issn.1002-0829.215044

E. A. Mahareek, M. A. Cifci, H. El-Zohni, and A. S. Desuky, “Rhizostoma optimization algorithm and its application in different real-world optimization problems,” International Journal of Electrical and Computer Engineering (IJECE)., 13(4): 4317–4338, 2023.

A. T. Sulaiman et al., “A Particle Swarm and Smell Agent-Based Hybrid Algorithm for Enhanced Optimization,” Algorithms, 17(2): 53, 2024. https://doi.org/10.3390/a17020053

Authors

  • Shaoying LI Sanda University Shanghai 201209, China

DOI:

https://doi.org/10.31449/inf.v50i9.7714

Downloads

Published

03/12/2026

How to Cite

LI, S. (2026). Hybrid Optimization and Machine Learning Models for IoT Intrusion Detection in Smart Homes. Informatica, 50(9). https://doi.org/10.31449/inf.v50i9.7714