AI Based Cybersecurity for Internet of Things Networks via Self-Attention Deep Learning and Metaheuristic Algorithms
DOI:
https://doi.org/10.15662/IJRAI.2025.0803010Keywords:
Cybersecurity, IoT, Tuna Swarm Optimization, Hyperparameter Selection, Attacks, Data NormalizationAbstract
Recently, Internet of Things (IoT) usage has increased rapidly, and cybersecurity concerns have also improved. Cybersecurity attacks are exclusive to the IoT, which has unique limitations and characteristics. Considering that many attacks and threats are being presented daily against IoT. So, it is significant to recognize these kinds of attacks and discover solutions to alleviate their risks. The modern approach to cybersecurity comprises the application of artificial intelligence (AI) to develop complex models for protecting systems and networks, specifically in IoT environments. Cyber attackers have also adapted by leveraging AI technologies, using adversarial AI to execute advanced cybersecurity threats. This constant evolution of AI-driven threats and defenses necessitates developing more robust, adaptive, and real-time cybersecurity models to stay ahead of increasingly advanced attacks. This paper presents an Intelligent Cybersecurity System Using Self-Attention-based
Deep Learning and Metaheuristic Optimization Algorithm (ICSSADL-MHOA). The proposed ICSSADLMHOA model aims to enhance a robust cybersecurity system in IoT networks. At first, the data normalization stage employs min–max normalization to ensure consistency, accuracy, and efficiency by organizing data into a standardized format. Furthermore, the improved tuna swarm optimization (ITSO) model is implemented for the feature selection process to detect the most relevant features in the data. Besides, the proposed ICSSADL-MHOA model utilizes the bidirectional long short-term memory with self-attention (BiLSTM-SA) model for the detection and classification method of cybersecurity. Finally, the parameter selection of the BiLSTM-SA technique is performed by employing the hunger games search (HGS) technique. Comprehensive studies under the ToN-IoT and Edge-IIoT datasets validate the efficiency of the ICSSADL-MHOA method. The experimental validation of the ICSSADL-MHOA method illustrated a superior accuracy value of 99.37% over existing techniques.
References
1. Al-Haija, Q. A. & Zein-Sabatto, S. An efficient deep-learning-based detection and classification system for cyber-attacks in iot communication networks. Electronics 9, 2152 (2020).
2. Sarı, T. & GülesYigitol, H. K. B. Awareness and readiness of industry 4.0: The case of turkish manufacturing industry. Adv. Prod. Eng. Manag. 15, 57–68 (2020).
3. Gupta, S., Sabitha, A. S. & Punhani, R. Cyber security threat intelligence using data mining techniques and artificial intelligence. Int. J. Recent Technol. Eng. 8, 6133–6140 (2019).
4. Navandar, Pavan. " Unveiling the Power of Data Masking: Safeguarding Sensitive Information in the Digital Age" International Journal of Core Engineering & Management 5, no.6 (2019): 27-32.
5. Navandar, P. (2021). "Developing Advanced Fraud Prevention Techniques using Data Analytics and ERP Systems" Int J Sci Res, 10(5), 1326-1329.
6. Ameen, A. H., Mohammed, M. A. & Rashid, A. N. Enhancing security in IoMT: A blockchain-based cybersecurity framework for machine learning-driven ECG signal classification. Fusion Pract. Appl. https://doi.org/10.54216/FPA.140117 (2024).
7. Smith, K. J., Dhillon, G. & Carter, L. User values and the development of a cybersecurity public policy for IoT. Int. J. Inf. Manag. 56, 102123 (2021).
8. Zhang, T., Zhao, Y., Jia, W. & Chen, M. Y. Collaborative algorithms that combine AI with IoT towards monitoring and control system. Futur. Gener. Comput. Syst. 125, 677–686 (2021).
9. Al-Omari, M., Rawashdeh, M., Qutaishat, F. & AlshiraAbabneh, H. M. N. An intelligent tree-based intrusion detection model for cyber security. J. Netw. Syst. Manag. 29, 20 (2021).
10. Navandar, Pavan. "Decoy Password Managers: Securing Against PII and Partial" ESP Journal of Engineering & Technology Advancements 4, no.2 (2024): 154-159. Doi: 10.56472/25832646/JETA-V4I2P126
11. Islam, U. et al. Detection of distributed denial of service (DDoS) attacks in IOT based monitoring system of banking sector using machine learning models. Sustainability 14, 8374 (2022).
12.Navandar, Pavan. "User Management Security: Best Practices and Strategies" European Journal of Advances in Engineering and Technology, 2021, 8(7):84-86
DOI: https://doi.org/10.5281/zenodo.11907037
13. HanEL-HasnonyCai, Y. I. M. W. Dragonfly algorithm with gated recurrent unit for cybersecurity in social networking. J. Cybersec. Inform. Manag. 2, 75–85 (2019).
14. Imtiaz, N. et al. A deep learning-based approach for the detection of various internet of things intrusion attacks through optical networks. Photonics. 12(1), 35 (2025).
15. Deshmukh, A. & Ravulakollu, K. An efficient CNN-based intrusion detection system for IoT: Use case towards cybersecurity. Technologies 12(10), 203 (2024).
16. Sattarpour, S., Barati, A. & Barati, H. EBIDS: Efficient BERT-based intrusion detection system in the network and application layers of IoT. Clust. Comput. 28(2), 1–21 (2025).
17. Navandar “Empowering Organizations with SAP Governance, Risk, and Compliance (GRC) Solutions" Journal of Scientific and Engineering Research, 2022, 9(10):70-74.
18. Ragab, M. et al. Artificial intelligence driven cyberattack detection system using integration of deep belief network with convolution neural network on industrial IoT. Alex. Eng. J. 110, 438–450 (2025).
19. Alsoufi, M. A. et al. Anomaly-based intrusion detection model using deep learning for IoT networks. Comput. Model. Eng. Sci. 141(1), 823–845 (2024).
20.Al-Neami, I. A., Hameed, Z. S. & Al-zubaydi, Z. A. Adaptive FPGA-based intrusion detection system for real-time internet of things security. J. Intel. Syst. Net. Things https://doi.org/10.54216/JISIoT.140122 (2025).
21.Saravana Ram, R. & Gopi Saminathan, A. An intrusion detection system in wsn using an optimized self-attention-based progressive generative adversarial network. IETE J. Res. https://doi.org/10.1080/03772063.2025.2452339 (2025).
22. Tewari, A. & Gupta, B. B. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Futur. Gener. Comput. Syst. 108, 909–920 (2020).
23. Pavan Navandar, "Leveraging SAP GUI Scripting for Enhanced Automation" Journal of Artificial Intelligence Learning and Data Science , URF Publisher, 2022, https://doi.org/10.51219/JAIMLD/pavan-navandar/73
24. Santhanamari, P., Kathirgamam, V., Subramanian, L., Panneerselvam, T. & Chirakkal Radhakrishnan, R. Security enhancement in 5G networks by identifying attacks using optimized cosine convolutional neural network. Net. Technol. Lett. 8(2), e70003 (2025).
25. Zhao, G., Li, X. & Li, H. A trusted authentication scheme using semantic LSTM and blockchain in IoT access control system. Int. J. Semant. Web Inform. Syst. (IJSWIS) 20(1), 1–27 (2024).
26. Mohamed, A. A., Al-Saleh, A., Sharma, S. K. & Tejani, G. G. Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet). Sci. Rep. 15(1), 4036 (2025).
27. Ashwini, K. & Nagasundara, K. B. An intelligent ransomware attack detection and classification using dual vision transformer with mantis search split attention network. Comput. Electr. Eng. 119, 109509 (2024).
28. Zareh Farkhady, R., Majidzadeh, K., Masdari, M. & Ghaffari, A. 3DLBS-BCHO: A three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT. Clust. Comput. 28(2), 83 (2025).
29. Perumal, E., Arulanthu, P., Ramachandran, R. and Singh, R. February. Enhanced Metaheuristics with Deep Learning Model for Blockchain Assisted Cyber Security Solution in Internet of Things Environment. In 2024 Second, International Conference on Emerging Trends in Information Technology and Engineering (ICETITE) 1–7 IEEE (2024).
30. Babitha, S. Efficient quantum inspired blockchain-based cyber security framework in IoT using deep learning and huristic algorithms. Intell. Decis. Technol. 18(2), 1203–1232 (2024).
31. Lakicevic, B., Spalevic, Z., Volas, I., Jovanovic, L., Zivkovic, M., Zivkovic, T. and Bacanin, N. 2024 December. Artificial Neural Networks with Soft Attention: Natural Language Processing for Phishing Email Detection Optimized with Modified Metaheuristics. In International Conference on Advanced Network Technologies and Intelligent Computing 421–438 Cham: Springer Nature Switzerland (2024).
32. Althobaiti, M. M. & Escorcia-Gutierrez, J. Weighted salp swarm algorithm with deep learning-powered cyber-threat detection for robust network security. AIMS Math. 9(7), 17676–17695 (2024).
33. Yussif, A. F. S., Seini, T. & Adu, C. Improved tuna swarm optimization (ITSO) algorithm based on adaptive fitness-weight for global optimization. Int. J. Electr. Eng. Appl. Sci. (IJEEAS) https://doi.org/10.54554/ijeeas.2024.7.02.011 (2024).





