Proceedings of International Conference on Applied Innovation in IT
2026/03/31, Volume 14, Issue 1, pp.715-726

An Improved Framework Using LDA and LSTM with RSO for Intrusion Detection in IoT


Hussein Ali Manji Nasrawi, Hasanain Salim Kadhim, Rifaq Adil Majeed and Hussain Ali Hussain


Abstract: This paper proposes a lightweight and efficient intrusion detection framework for Internet of Things (IoT) and Wireless Sensor Network (WSN) environments by integrating Linear Discriminant Analysis (LDA), Long Short-Term Memory (LSTM) networks, and Rat Swarm Optimization (RSO). The proposed approach first applies LDA to reduce high-dimensional network traffic data into a compact and discriminative feature space, improving class separability while reducing computational complexity. Subsequently, an LSTM-based deep learning model is employed to capture temporal dependencies in network traffic for multi-class intrusion classification. To enhance model performance and stability, RSO is utilized to optimize critical LSTM hyperparameters, including learning rate, batch size, and hidden units, enabling an effective balance between exploration and exploitation during training. The framework is evaluated on two benchmark datasets, CIC-IDS2018 and TON_IoT, representing diverse and realistic IoT attack scenarios. Experimental results demonstrate that the proposed model achieves high detection performance, with accuracy exceeding 99%, along with strong precision, recall, and F1-scores, and a low false alarm rate. Furthermore, ROC-AUC and PR-AUC values confirm robust discriminative capability under imbalanced data conditions. Deployment experiments on edge devices such as Raspberry Pi 4 and NVIDIA Jetson Nano show low inference latency and moderate resource consumption, validating the suitability of the proposed framework for real-time intrusion detection in resource-constrained IoT environments.

Keywords: Wireless Sensor Networks, Intrusion Detection, Long Short-Term Memory (LSTM), Rat Swarm Optimization (RSO), Feature Selection (LDA).

DOI: Under indexing

Download: PDF

References:

  1. A. Lanzolla and M. Spadavecchia, “Wireless sensor networks for environmental monitoring,” Sensors, vol. 21, p. 1172, 2021, doi: 10.3390/s21041172.
  2. S. Alsudani, H. Nasrawi, M. Shattawi, and A. Ghazikhani, “Enhancing spam detection: A crow-optimized FFNN with LSTM for email security,” Wasit J. Comput. Math. Sci., vol. 3, pp. 1-15, 2024, doi: 10.31185/wjcms.199.
  3. A. A. Laghari, H. Li, A. A. Khan, Y. Shoulin, and S. Karim, “Internet of Things (IoT) applications security trends and challenges,” Discov. Internet Things, vol. 4, p. 36, 2024, doi: 10.1007/s43926-024-00090-5.
  4. S. W. A. Alsudani and G. K. Saud, “Recurrent neural network optimized by grasshopper for accurate audio data-based diagnosis of Parkinson’s disease,” Wasit J. Pure Sci., vol. 4, no. 2, pp. 56-75, 2025, doi: 10.31185/wjps.766.
  5. S. S. Al-Janabi and A. A. Al-Shourbaji, “Swarm intelligence inspired intrusion detection systems: A systematic literature review,” Comput. Netw., vol. 198, p. 108567, 2021, doi: 10.1016/j.comnet.2021.108567.
  6. F. Laghrissi, S. Douzi, K. Douzi, and B. Hssina, “Intrusion detection systems using long short-term memory (LSTM),” J. Big Data, vol. 8, p. 65, 2021, doi: 10.1186/s40537-021-00448-4.
  7. M. A. Ali and S. A. H. Al-Sharafi, “Intrusion detection in IoT networks using machine learning and deep learning approaches for MitM attack mitigation,” Discov. Internet Things, vol. 5, p. 48, 2025, doi: 10.1007/s43926-025-00104-w.
  8. A. R. Singh, B. Dey, M. Bajaj, et al., “Advanced microgrid optimization using price-elastic demand response and greedy rat swarm optimization for economic and environmental efficiency,” Sci. Rep., vol. 15, p. 2261, 2025, doi: 10.1038/s41598-025-86232-3.
  9. J. Wang, L. Wang, N. Ji et al., “Enhancing patent text classification with Bi-LSTM technique and alpine skiing optimization for improved diagnostic accuracy,” Multimed. Tools Appl., vol. 84, pp. 9257-9286, 2025, doi: 10.1007/s11042-024-18806-8.
  10. S. K. Singh, P. Kumar, and J. P. Singh, “Wireless sensor network security: A recent review based on state-of-the-art,” SAGE Open, vol. 13, pp. 1-15, 2023, doi: 10.1177/18479790231157220.
  11. R. Manivannan and S. Senthilkumar, “Intrusion detection system for network security using novel adaptive recurrent neural network-based fox optimizer concept,” Int. J. Comput. Intell. Syst., vol. 18, p. 37, 2025, doi: 10.1007/s44196-025-00767-x.
  12. M. R. Mohapatra, A. K. Mishra, and S. Mishra, “MLSTL-WSN: Machine learning-based intrusion detection using SMOTE-Tomek in wireless sensor networks,” Int. J. Inf. Secur., vol. 23, pp. 1827-1846, 2024, doi: 10.1007/s10207-024-00833-z.
  13. E. S. A. Alars and S. Kurnaz, “Enhancing network intrusion detection systems with combined network and host traffic features using deep learning,” Inf. Retr. J., vol. 27, pp. 183-204, 2024, doi: 10.1007/s10791-024-09480-3.
  14. A. Biju and S. W. Franklin, “Dual feature-based intrusion detection system for IoT network security,” Int. J. Comput. Intell. Syst., vol. 18, p. 66, 2025, doi: 10.1007/s44196-025-00790-y.
  15. D. B. Mohan and P. Arumugam, “Boosting security: An effective approach to intrusion detection in wireless sensor networks with AdaBoost classifiers,” in Innovations in Computational Intelligence and Computer Vision (ICICV 2024), S. Roy, D. Sinwar, N. Dey, T. Perumal, and J. M. R. S. Tavares, Eds., Lecture Notes in Networks and Systems, vol. 1117, Springer, Singapore, 2024, doi: 10.1007/978-981-97-6992-6_6.
  16. H. Q. Gheni and W. L. Al-Yaseen, “Using CICIoMT2024 dataset for improved intrusion detection system,” in Proc. Data Analytics and Management (ICDAM 2024), A. Swaroop, B. Virdee, S. D. Correia, and Z. Polkowski, Eds., Lecture Notes in Networks and Systems, vol. 1302, Springer, Singapore, 2025, doi: 10.1007/978-981-96-3381-4_24.
  17. W. M. Sahib, Z. A. A. Alhuseen, I. D. I. Saeedi et al., “Leveraging machine learning for enhanced cybersecurity: an intrusion detection system,” Serv. Oriented Comput. Appl., vol. 19, pp. 107-124, 2025, doi: 10.1007/s11761-024-00435-6.
  18. A. Bhardwaj and N. Kumar, “Artificial intelligence and machine learning in cybersecurity: A comprehensive review,” Knowl. Inf. Syst., vol. 67, pp. 1125-1160, 2025, doi: 10.1007/s10115-025-02429-y.
  19. H. Zeghida, M. Boulaiche, R. Chikh et al., “Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks,” Cluster Comput., vol. 28, p. 58, 2025, doi: 10.1007/s10586-024-04752-5.
  20. N. E. Oueslati, H. Mrabet, and A. Jemai, “Intrusion detection using an enhancement Bi-LSTM recurrent neural network model,” in Verification and Evaluation of Computer and Communication Systems (VECoS 2024), B. Ben Hedia, M. Ghazel, and B. Monsuez, Eds., Lecture Notes in Computer Science, vol. 15466, Springer, Cham, Switzerland, 2025, pp. 156-169, doi: 10.1007/978-3-031-85356-2_9.
  21. C. S. Parvathy and J. P. Jayan, “Stacking based deep ensemble classifier with bridging ConvNeXt and U-Net for an automatic prediction of lung cancer,” Netw. Model. Anal. Health Inform. Bioinform., vol. 14, p. 111, 2025, doi: 10.1007/s13721-025-00605-2.
  22. A. K. Silivery and R. M. R. Kovvur, “A model for multi-attack classification to improve intrusion detection performance using deep learning approaches,” 2023, [Online]. Available: https://arxiv.org/abs/2310.16380.
  23. Z. Cao, Z. Zhao, W. Shang et al., “Using the ToN-IoT dataset to develop a new intrusion detection system for industrial IoT devices,” Multimed. Tools Appl., vol. 84, pp. 16425-16453, 2025, doi: 10.1007/s11042-024-19695-7.
  24. I. U. Hewapathirana, “A comparative study of two-stage intrusion detection using modern machine learning approaches on the CSE-CIC-IDS2018 dataset,” Knowledge, vol. 5, no. 1, p. 6, 2025, doi: 10.3390/knowledge5010006.
  25. Y. Li et al., “Network intrusion detection model based on CNN and GRU,” Appl. Sci., vol. 12, p. 4184, 2022, doi: 10.3390/app12094184.
  26. G. Dhiman, M. Garg, A. Nagar et al., “A novel algorithm for global optimization: rat swarm optimizer,” J. Ambient Intell. Humaniz. Comput., vol. 12, pp. 8457-8482, 2021, doi: 10.1007/s12652-020-02580-0.
  27. J. Manokaran and G. Vairavel, “DL-ADS: Improved grey wolf optimization enabled AE-LSTM technique for efficient network anomaly detection in Internet of Thing edge computing,” IEEE Access, vol. 12, pp. 75983-76002, 2024, doi: 10.1109/ACCESS.2024.340562.
  28. Z. Yan, P. K. Shukla, P. K. Shukla et al., “Intrusion detection and mitigation method for the industrial Internet of Things using bidirectional convolutional long short-term memory and deep recurrent convolutional Q-networks,” Int. J. Comput. Intell. Syst., vol. 18, p. 154, 2025, doi: 10.1007/s44196-025-00890-9.
  29. U. Otokwala, A. Petrovski, and H. Kalutarage, “Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of Things,” Int. J. Inf. Secur., vol. 23, pp. 2559-2581, 2024, doi: 10.1007/s10207-024-00855-7.
  30. H. R. Sayegh, W. Dong, and A. M. Al-Madani, “Enhanced intrusion detection with LSTM-based model, feature selection, and SMOTE for imbalanced data,” Appl. Sci., vol. 14, p. 479, 2024, doi: 10.3390/app14020479.
  31. M. S. Sakib and N. Tabassum, “Analyzing deep learning model performance for intrusion detection on CIC-IDS2017 dataset,” SSRN Electron. J., 2025, doi: 10.2139/ssrn.5217054.


    HOME

       - Conference
       - Journal
       - Paper Submission to Conference
       - Paper Submission to Journal
       - Fee Payment
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceeding


    PROCEEDINGS

       - Volume 14, Issue 1 (ICAIIT 2026)
       - Volume 13, Issue 5 (ICAIIT 2025)
       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    LAST CONFERENCE

       ICAIIT 2026
         - Photos
         - Reports

    PAST CONFERENCES

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.