
Int J Performability Eng ›› 2025, Vol. 21 ›› Issue (10): 593-604.doi: 10.23940/ijpe.25.10.p6.593604
Kamaljit Singh Saini* and Sumit Chaudhary
Submitted on
;
Revised on
;
Accepted on
Contact:
* E-mail address: kamaljit.cse@cumail.in
Kamaljit Singh Saini and Sumit Chaudhary. HydraBoost++: An Optimized Deep Fusion Network for Multi-Class Intruder Detection in IoT Network Security [J]. Int J Performability Eng, 2025, 21(10): 593-604.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
| [1] Gupta A., Chaudhary S., Naruka M.S., Singh D.K., andBisht N., 2025. IoT-propelled sustainable aquaponics system for enhanced efficiency and reliability. In2025 International Conference on Pervasive Computational Technologies (ICPCT), pp. 343-347. [2] Singh P., andSaini K.S., 2024. Intelligent security of redistribution management in DMVPN-based IoT networks. InInternational Conference on Artificial Intelligence and Its Application, pp. 163-177. [3] Chaudhary S., Singh V., Malik N., Sidhu K.S., Kirola M., andJoshi K., 2024. Digital signature security enhancement: using X-OR operation on RSA and AES with 4096 bits key length. In2024 International Conference on Computing, Sciences and Communications (ICCSC), pp. 1-6. [4] Malik M., andSaini K.S., 2023. Network intrusion detection system using reinforcement learning techniques. In2023 International Conference on Circuit Power and Computing Technologies (ICCPCT), pp. 1642-1649. [5] Heidari A., andJabraeil Jamali M.A., 2023. Internet of things intrusion detection systems: a comprehensive review and future directions. [6] Sharma P., Saini K.S., andSidhu P.K., 2024. Lightweight, secure and authenticated blockchain-optimized network routing protocol for wireless body area networks. In2024 2nd World Conference on Communication & Computing (WCONF), pp. 1-6. [7] Menon U.V., Kumaravelu V.B., Kumar C.V., Rammohan A., Chinnadurai S., Venkatesan R., Hai H., andSelvaprabhu P., 2025. AI-powered IoT: A survey on integrating artificial intelligence with IoT for enhanced security, efficiency, and smart applications. [8] Saini K.S., andChaudhary S., 2025. Investigation on attack detection in IoT networks: A study and analysis of the existing machine learning and deep learning techniques. In2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), pp. 711-719. [9] Bikila D.D., andČapek J., 2025. Machine learning-based attack detection for the internet of things. [10] Ntayagabiri J.P., Bentaleb Y., Ndikumagenge J., andEl Makhtoum H., 2025. A comparative analysis of supervised machine learning algorithms for IoT attack detection and classification. [11] Alabdan R., Alabduallah B., Alruwais N., Arasi M.A., Asklany S.A., Alghushairy O., Alallah F.S., andAlshareef A., 2025. Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics. [12] Karunamurthy A., Vijayan K., Kshirsagar P.R., andTan K.T., 2025. An optimal federated learning-based intrusion detection for IoT environment. [13] Shaaban M.F., andAli A., 2025. An efficient convolutional neural network based attack detection for smart grid in 5G-IoT. [14] Imtiaz N., Wahid A., Ul Abideen S.Z., Muhammad Kamal M., Sehito N., Khan S., Virdee B.S., Kouhalvandi L., andAlibakhshikenari M., 2025. A deep learning-based approach for the detection of various internet of things intrusion attacks through optical networks. In [15] Gupta B.B., Gaurav A., Attar R.W., Arya V., Bansal S., Alhomoud A., andChui K.T., 2025. A hybrid ant lion optimization algorithm based lightweight deep learning framework for cyber attack detection in IoT environment. [16] Malathi S., andBegum S.R., 2024. Enhancing trustworthiness among IoT network nodes with ensemble deep learning-based cyber attack detection. [17] Kavitha D., andRamalakshmi R., 2024. Machine learning-based DDOS attack detection and mitigation in SDNs for IoT environments. [18] Sarhan M., Layeghy S., Moustafa N., Gallagher M., andPortmann M., 2024. Feature extraction for machine learning-based intrusion detection in IoT networks. [19] Kannan A., Selvi M., Santhosh Kumar S.V.N., Thangaramya K., andShalini S., 2024. Machine learning based intelligent rpl attack detection system for IoT networks. InAdvanced Machine Learning with Evolutionary and Metaheuristic Techniques, pp. 241-256. [20] Abbas S., Bouazzi I., Ojo S., Al Hejaili A., Sampedro G.A., Almadhor A., andGregus M., 2024. Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. [21] Malini P., andKavitha K.R., 2024. An efficient deep learning mechanisms for IoT/non-IoT devices classification and attack detection in SDN-enabled smart environment. [22] Abid Y.A., Wu J., Xu G., Fu S., andWaqas M., 2024. Multilevel deep neural network approach for enhanced distributed denial-of-service attack detection and classification in software-defined internet of things networks. [23] Ali M., Shahroz M., Mushtaq M.F., Alfarhood S., Safran M., andAshraf I., 2024. Hybrid machine learning model for efficient botnet attack detection in IoT environment. [24] Jullian O., Otero B., Rodriguez E., Gutierrez N., Antona H., andCanal R., 2023. Deep-learning based detection for cyber-attacks in IoT networks: A distributed attack detection framework. [25] Awajan A.,2023. A novel deep learning-based intrusion detection system for IoT networks. [26] Sharma B., Sharma L., Lal C., andRoy S., 2023. Anomaly based network intrusion detection for IoT attacks using deep learning technique. [27] Thakkar A., andLohiya R., 2023. Attack classification of imbalanced intrusion data for IoT network using ensemble-learning-based deep neural network. [28] Chaganti R., Suliman W., Ravi V., andDua A., 2023. Deep learning approach for SDN-enabled intrusion detection system in IoT networks. [29] Almarshdi R., Nassef L., Fadel E., andAlowidi N., 2023. Hybrid deep learning based attack detection for imbalanced data classification. [30] Bhandari S., Chaudhary S., Vaidya H., Kumar U., Kirola M., andAnandaram H., 2024. Design of an efficient model for enhanced IoT security and maintenance in smart cities. In2024 First International Conference on Technological Innovations and Advance Computing (TIACOMP), pp. 308-313. [31] Brindha Devi V., Ranjan N.M., andSharma H., 2024. IoT attack detection and mitigation with optimized deep learning techniques. [32] Priyanka and Kumar, A., 2025. Optimization-based feature selection and classification with modified activation-tuned deep BiLSTM for attack detection in IoT.International Journal of Image and Graphics, 2750005. [33] Maazalahi M., andHosseini S., 2025. Machine learning and metaheuristic optimization algorithms for feature selection and botnet attack detection. [34] Chauhan P., andAtulkar M., 2025. An efficient attack detection approach for software defined internet of things using jaya optimisation based feature selection technique. [35] Prasad K.S., Udayakumar P., Laxmi Lydia E., Ahmed M.A., Ishak M.K., Karim F.K., andMostafa S.M., 2025. A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security. [36] Logeswari G., Roselind J.D., Tamilarasi K., andNivethitha V., 2025. A comprehensive approach to intrusion detection in IoT environments using hybrid feature selection and multi-stage classification techniques. [37] Alkhonaini M.A., Al Mazroa A., Aljebreen M., Hassine S.B.H., Allafi R., Dutta A.K., Alsubai S., andKhamparia A., 2024. Hybrid sine-cosine chimp optimization based feature selection with deep learning model for threat detection in IoT sensor networks. [38] Jayasankar T., Kiruba Buri R., andMaheswaravenkatesh P., 2024. Intrusion detection system using metaheuristic fireworks optimization based feature selection with deep learning on internet of things environment. [39] Habeeb M.S., andBabu T.R., 2024. Coarse and fine feature selection for network intrusion detection systems (IDS) in IoT networks. [40] Nazir A., Memon Z., Sadiq T., Rahman H., andKhan I.U., 2023. A novel feature-selection algorithm in IoT networks for intrusion detection. [41] Liu X., andDu Y., 2023. Towards effective feature selection for IoT botnet attack detection using a genetic algorithm. [42] Mohy-Eddine M., Guezzaz A., Benkirane S., andAzrour M., 2023. An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. [43] Saheed Y.K., Usman A.A., Sukat F.D., andAbdulrahman M., 2023. A novel hybrid autoencoder and modified particle swarm optimization feature selection for intrusion detection in the internet of things network. [44] Dey A.K., Gupta G.P., andSahu S.P., 2023. A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks. [45] Fareena N., Banu E.A., Sivakumar J., andChaudhary S., 2025. Enhanced security and efficiency in flying ad-hoc networks through blockchain-enabled clustering routing and optimized rotation-invariant coordinate convolutional neural networks. [46] Gharehchopogh F.S., Ucan A., Ibrikci T., Arasteh B., andIsik G., 2023. Slime mould algorithm: A comprehensive survey of its variants and applications. [47] Bacea D.S., andOniga F., 2023. Single stage architecture for improved accuracy real-time object detection on mobile devices. [48] Sudheera K.L.K., Divakaran D.M., Singh R.P., andGurusamy M., 2021. ADEPT: detection and identification of correlated attack stages in IoT networks. [49] Moustafa N., andSlay J., 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In2015 Military Communications and Information Systems Conference (MilCIS), pp. 1-6. [50] Mittal M., Kumar K., andBehal S., 2023. Deep learning approaches for detecting DDoS attacks: A systematic review. [51] Hezam A.A., Mostafa S.A., Baharum Z., Alanda A., andSalikon M.Z., 2021. Combining deep learning models for enhancing the detection of botnet attacks in multiple sensors internet of things networks. [52] Riaz S., Latif S., Usman S.M., Ullah S.S., Algarni A.D., Yasin A., Anwar A., Elmannai H., andHussain S., 2022. Malware detection in internet of things (IoT) devices using deep learning. [53] Mohmand M.I., Hussain H., Khan A.A., Ullah U., Zakarya M., Ahmed A., Raza M., Rahman I.U., andHaleem M., 2022. A machine learning-based classification and prediction technique for DDoS attacks. |
| [1] | Preety, Shubham Kumar Sharma. Serverless Architectures for Scalable and Cost-Efficient Information Systems in SMEs [J]. Int J Performability Eng, 2025, 21(8): 438-449. |
| [2] | Sharma Ji and Abhishek Mishra. A Hybrid Deep Learning-Based IoT System Security Framework for 5G-Enabled Smart Cities [J]. Int J Performability Eng, 2025, 21(7): 361-371. |
| [3] | Tejaswini Patil and S. U. Mane. Multi-Objective Hybrid Approach for Solving the Multi-Objective Constrained Electric Vehicle Routing Problem [J]. Int J Performability Eng, 2025, 21(7): 372-381. |
| [4] | Latika Pinjarkar, Devanshu Sawarkar, Pratham Agrawal, Devansh Motghare, and Nidhi Bansal. Multi Object Image Captioning via CNNs and Transformer Model [J]. Int J Performability Eng, 2025, 21(5): 259-268. |
| [5] | Suman Lata, Dheerendra Singh, and Gaurav Raj. Enhancing Cloud Load Balancing with Multi-Objective Optimization in Task Scheduling [J]. Int J Performability Eng, 2025, 21(5): 278-287. |
| [6] | Santosh Kumar and Sandip Kumar Goyal. A Meta-Heuristic Framework for Trust Establishment in Social Cloud Computing [J]. Int J Performability Eng, 2025, 21(4): 209-218. |
| [7] | Meroua Sahraoui, Ahmed Bellaouar, Abdoul-Razac Sané, and Fouad Maliki. Multi-Objective Optimization of Production Lines using Multi-Agent Systems Modeling and Genetic Algorithms: A Case Study [J]. Int J Performability Eng, 2025, 21(4): 226-234. |
| [8] | Meroua Sahraoui and Ahmed Bellaouar. Improving Industrial Production Efficiency: A Hybrid Approach to Dynamic Scheduling - A Case Study [J]. Int J Performability Eng, 2025, 21(2): 104-111. |
| [9] | Pancham Singh, Updesh Kumar Jaiswal, Eshank Jain, Nikhil Kumar, and Vimlesh Mishra. A Novel Methodology Utilizing Modern CCTV Cameras and Software as a Service Model for Crime Detection and Prediction [J]. Int J Performability Eng, 2025, 21(2): 112-121. |
| [10] | Swati Vishnoi and Meenakshi Pareek. Edge-Aware Possibilistic Clustering with Uncertainty-Weighted Ensemble Learning for Land Cover Mapping [J]. Int J Performability Eng, 2025, 21(10): 549-558. |
| [11] | Dhwaniket Kamble and Mahip Bartere. Unified Attention-Guided Digital Forensic Framework for Enhanced Forgery Detection [J]. Int J Performability Eng, 2025, 21(10): 583-592. |
| [12] | Updesh Kumar Jaiswal and Amarjeet Prajapati. An Effective PSO-Driven Method for Test Data Generation in Branch Coverage Software Testing [J]. Int J Performability Eng, 2025, 21(1): 1-9. |
| [13] | Archana Sharma and Dharmveer Singh Rajpoot. A DNN Anti-Predatory Algorithm-Based Model to Enhance the Efficiency of Software Effort Estimation [J]. Int J Performability Eng, 2025, 21(1): 10-23. |
| [14] | Seema Kalonia and Amrita Upadhyay. Comparative Analysis of Machine Learning Model and PSO Optimized CNN-RNN for Software Fault Prediction [J]. Int J Performability Eng, 2025, 21(1): 48-55. |
| [15] | Manu Banga. Enhancing Software Fault Prediction using Machine Learning [J]. Int J Performability Eng, 2024, 20(9): 529-540. |
|