Swarm Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection
Keywords:
Swarm Intelligence, Hyper parameter Optimization, Internet of Things (IoT), AI-based Threat Detection, Cybersecurity, Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO).Abstract
The growing complexity and scale of Internet of Things (IoT) networks demand advanced, intelligent threat detection systems capable of rapid adaptation and high accuracy. This study proposes a novel framework that integrates swarm intelligence-based hyper parameter optimization with AI-powered threat detection models to enhance security in IoT environments. Traditional deep learning models often suffer from suboptimal performance due to manually selected hyperparameters, leading to poor generalization and increased false positives. To address this, swarm intelligence algorithms—such as Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO)—are employed to automatically fine-tune critical hyperparameters, including learning rates, dropout rates, and network depth. These optimized models are then deployed to detect a wide spectrum of IoT-specific threats, such as botnet activity, unauthorized access, and anomaly behavior in sensor data. Experimental evaluations on benchmark IoT security datasets demonstrate significant improvements in detection accuracy, convergence speed, and robustness, compared to baseline models. This approach offers a scalable and adaptive solution for real-time IoT threat detection with reduced human intervention.
Downloads
References
Moustafa, N., & Slay, J. (2016). The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 dataset and the comparison with the KDD99 dataset. Information Security Journal: A Global Perspective, 25(1–3), 18–31.
Jiang, K., Yin, Y., Cheng, Y., & Zhao, J. (2018). A novel intrusion detection method for industrial control systems based on transfer learning. IEEE Access, 6, 37955–37964.
Al-Turaiki, I., Al-Yahya, M. and Al-Askar, H. 2021. Optimizing deep learning hyperparameters using metaheuristic algorithms: A comparative study. IEEE Access, 9, pp.25051–25063.
Zhang, Y., Wang, S., & Phillips, P. (2014). Particle swarm optimization for parameter determination and feature selection of support vector machines. Expert Systems with Applications, 38(10), 13971–13981.
Almomani, A., & Mehmood, R. (2017). Swarm intelligence optimization for anomaly detection in smart cities. Journal of Artificial Intelligence and Soft Computing Research, 7(3), 195–204.
Yang, X. S. (2010). Nature-Inspired Metaheuristic Algorithms. Luniver Press.
Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey Wolf Optimizer. Advances in Engineering Software, 69, 46–61.
Xue, B., Zhang, M., & Browne, W. N. (2014). Particle swarm optimization for feature selection in classification: A multi-objective approach. IEEE Transactions on Cybernetics, 43(6), 1656–1671.
Reddy, A., & Kiran, R. (2019). Hyperparameter tuning for machine learning models using evolutionary algorithms: A review. Procedia Computer Science, 143, 207–214.
Sahu, S. S., & Panda, M. (2018). A novel hybrid IDS using fuzzy SVM and probabilistic GA-based feature selection. Neural Computing and Applications, 30, 1129–1147.
Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Applications.
Aydin, M. A., Zaim, A. H., & Aydin, M. (2009). A hybrid intrusion detection system design for computer network security. Computers & Electrical Engineering, 35(3), 517–526.
García, S., Luengo, J., & Herrera, F. (2016). Data pre-processing in data mining. Springer International Publishing.
Abraham, A., & Grosan, C. (2008). Swarm intelligence in data mining. In Swarm Intelligence in Data Mining (pp. 3–20). Springer.
Gogoi, P., Bhattacharyya, D. K., & Kalita, J. K. (2011). A survey of outlier detection methods in network anomaly identification. The Computer Journal, 54(4), 570–588.
Choudhury, B., Bhattacharyya, D. and Kalita, J.K. 2021. Swarm intelligence-based intrusion detection system for Internet of Things communication networks. Computer Communications, 166, pp.110–122.
Gao, Y., et al. (2018). A particle swarm optimization-based deep learning model for intelligent intrusion detection. Computational Intelligence and Neuroscience, 2018, 1–10.
Abraham, A., & Nath, B. (2001). A neuro-fuzzy approach for modeling electricity demand in Victoria. Applied Soft Computing, 1(2), 127–138.
Pradeepini, G., & Jyothi, S. (2016). Optimized intrusion detection system using particle swarm optimization with decision tree classifier. Indian Journal of Science and Technology, 9(28).
Ghosh, S., & Ghosh, P. (2019). Smart cyber-physical system for real-time intrusion detection using swarm intelligence-based hyperparameter optimization. International Journal of Information Technology, 11(3), 547–556
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.