Efficient Host-Based Intrusion Detection for IoT Using Lightweight ML Models and Fuzzy Ranking

Authors

  • Uday H A Department of Computer Science Engineering, University of Visvesvaraya College of Engineering, Bengaluru, Karnataka, India Author
  • Arunalatha J S Professor, Department of Computer Science Engineering, University of Visvesvaraya College of Engineering, Bengaluru, Karnataka, India Author

DOI:

https://doi.org/10.32628/IJSRST2613151

Keywords:

Internet of Things, Host-Based Intrusion Detection, Lightweight Machine Learning, Botnet Traffic Analysis, Fuzzy Decision-Making, CTU-13 Dataset

Abstract

The rising integration of IoT devices into various applications has amplified security risks, particularly in resource-limited setups with constrained computing capacity and storage. Standard intrusion detection approaches often prove inadequate for these contexts owing to their intensive resource needs. This work proposes a host-based intrusion detection system customized for IoT infrastructures, harnessing compact and adaptable machine learning strategies. The developed system examines diverse classifier groups, encompassing tree-oriented models like Decision Tree and Random Forest, boosting-oriented techniques such as LightGBM and XGBoost, support vector machines including LinearSVC, and linear-based classifiers encompassing Logistic Regression, Stochastic Gradient Descent, Passive-Aggressive methods, and Perceptron algorithms. To identify the optimal detection algorithms suited to varied IoT application environments, a multi-factor decision framework integrating TOPSIS, VIKOR, MOORA, and WASPAS ranking methodologies is utilized. Outcomes from trials reveal that linear classifiers and streamlined tree models deliver strong detection performance alongside brief training periods and lowered processing demands.The solution achieves a top accuracy rate of 98.7%, with training times under two seconds for the majority of algorithms, yielding roughly 15-20 times enhancement in efficiency relative to typical ensemble-driven intrusion detection systems.

Downloads

Download data is not yet available.

References

B. C. Chung and G.-B. Han, “A DeepSHAP-Based Adversarial Attack on Machine Learning-Based Network Intrusion Detection,” Institute of Electrical and Electronics Engineers Access, vol. 14, pp. 2566–2575, January. 2026, doi: 10.1109/ACCESS.2025.3650123. DOI: https://doi.org/10.1109/ACCESS.2025.3650123

Q. Liu, V. Hagenmeyer, and H. B. Keller, “A review of rule learning based intrusion detection systems and their prospects in smart grids,”IEEE Access, vol. 9, pp. 49547–49567, 2021, doi: 10.1109/AC-CESS.2021.3071263. DOI: https://doi.org/10.1109/ACCESS.2021.3071263

S. Gopikrishnan, P. Jonnalagadda, M. Adriss, and W. Boulila, “EFS-IDS:An enhanced feature-selective intrusion detection system for imbalanced IoT traffic data,” IEEE Open Journal of the Communications Society,2025, doi: 10.1109/OJCOMS.2025.3630471. DOI: https://doi.org/10.1109/OJCOMS.2025.3630471

S. B. Sharma and A. K. Bairwa, “Leveraging AI for intrusion detection in IoT ecosystems: A comprehensive study,”IEEE Access, 2025, doi:10.1109/ACCESS.2025.3550392. DOI: https://doi.org/10.1109/ACCESS.2025.3550392

Folgado, F.J.; Calder´on, D.; Gonz´alez, I.; Calder´on, A.J. Review of Industry 4.0 from the Perspective of Automation and Supervision Systems: Definitions, Architectures and Recent Trends. Electronics2024, 13, 782. https://doi.org/10.3390/electronics13040782. DOI: https://doi.org/10.3390/electronics13040782

J. Li, M. S. Othman, X. Ying, D. S. M. Hassan, H. Chen, and L. M. Yusuf, “Adaptive NetFlow IIoT Intrusion Detection With Deep Transfer Learning, Genetic Optimization, and Ensemble Methods for Network Management,” Institute of Electrical and Electronics Engineers Transactions on Network and Service Management, vol. 23, pp. 681–698, Oct. 2025, doi: 10.1109/TNSM.2025.3617765. DOI: https://doi.org/10.1109/TNSM.2025.3617765

J. Ababneh, E. Y. A. Al-Nsour, M. R. Al-Mousa, A. Al-Shaikh, A. Al-Zabin, M. Assasfeh, and H. Abualese, “Enhancing DevOps Continuous Monitoring Phase: Hybrid Intrusion Detection and Ensemble Learning System (HIDELS),” Institute of Electrical and Electronics Engineers Access, vol. 14, pp. xxx–xxx, 2026, doi: 10.1109/ACCESS.2026.3650793. DOI: https://doi.org/10.1109/ACCESS.2026.3650793

M. K. Nallakaruppan, S. R. K. Somayaji, S. Fuladi, F. Benedetto, S. K. Ulaganathan, and G. Yenduri, “Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things,” Institute of Electrical and Electronics Engineers Access, vol. 12, pp. 31788–31797, Jan. 2024, doi: 10.1109/ACCESS.2024.3355794. DOI: https://doi.org/10.1109/ACCESS.2024.3355794

J. Asharf, N. Moustafa, H. Khurshid, E. Debie, W. Haider, and A. Wahab, “A Review of Intrusion Detection Systems Using Machine and Deep Learning in the Internet of Things: Challenges, Solutions, and Future Directions,” Electronics,Multi-disciplinary Digital Publishing Institute, vol. 9, no. 7, Art. no. 1177, Jul. 2020, doi: 10.3390/electronics9071177.

A. Churcher, R. Ullah, J. Ahmad, S. ur Rehman, F. Masood, M. Gogate, F. Alqahtani, B. Nour, and W. J. Buchanan, “An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks,” Sensors,Multi-disciplinary Digital Publishing Institute, vol. 21, no. 2, Art. no. 446, Jan. 2021, doi: 10.3390/s21020446. DOI: https://doi.org/10.3390/s21020446

T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, M. Ghogho, and F. El Moussa, “DeepIDS: Deep Learning Approach for Intrusion Detection in Software-Defined Networking,” Electronics,Multi-disciplinary Digital Publishing Institute, vol. 9, no. 9, Art. no. 1533, Sep. 2020, doi: 10.3390/electronics9091533. DOI: https://doi.org/10.3390/electronics9091533

M. Verkerken, L. D’hooge, D. Sudyana, Y.-D. Lin, T. Wauters, B. Volckaert, and F. De Turck, “A Novel Multi-Stage Approach for Hierarchical Intrusion Detection,” Institute of Electrical and Electronics Engineers Transactions on Network and Service Management, vol. PP, no. 99, pp.1–1, Sep. 2023, doi: 10.1109/TNSM.2023.3259474. DOI: https://doi.org/10.1109/TNSM.2023.3259474

R. S. Miani, G. D. G. Bernardo, G. W. Cassales, H. Senger, and E. R. de Faria, “A Survey of Data Stream-Based Intrusion Detection Systems,” Institute of Electrical and Electronics Engineers Access, vol. 13, pp.April 2025, doi: 10.1109/ACCESS.2025.3561105. DOI: https://doi.org/10.1109/ACCESS.2025.3561105

D. E. Denning, “An Intrusion-Detection Model,” Institute of Electrical and Electronics Engineers Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222–232, Feb. 1987, doi: 10.1109/TSE.1987.232894. DOI: https://doi.org/10.1109/TSE.1987.232894

A. Hussain, E. Mar´ın-Tordera, X. Masip-Bruin, and H. C. Leligou, “Rule-based with machine learning IDS for DDoS attack detection in cyber-physical production systems (CPPS),” IEEE Access, 2024, doi:10.1109/ACCESS.2024.3445261. DOI: https://doi.org/10.1109/ACCESS.2024.3445261

D. Jay, T. Bhattacharjee, U. Manickam, and S. S., “Intelligent Intrusion Detection Mechanism for Cyber Attacks in Digital Substations,” Institute of Electrical and Electronics Engineers Access, vol. 13, pp. xxx–xxx, 2025, doi: 10.1109/ACCESS.2025.3615247. DOI: https://doi.org/10.1109/ACCESS.2025.3615247

W.-H. Choi and J. Kim, “Unsupervised Learning Approach for Anomaly Detection in Industrial Control Systems,” Applied System Innovation, vol. 7, Art. no. 18, 2024, doi: 10.3390/asi7020018. DOI: https://doi.org/10.3390/asi7020018

S. Ben Atitallah, M. Driss, W. Boulila, and A. Koubaa, “Securing industrial IoT environments: A fuzzy graph attention network for robust intrusion detection,” IEEE Open Journal of the Computer Society,2025, doi: 10.1109/OJCS.2025.3587486. DOI: https://doi.org/10.1109/OJCS.2025.3587486

H. M. Saleh, H. Marouane, and A. Fakhfakh, “Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning,” IEEE Access, 2024, doi: 10.1109/ACCESS.2023.3349248. DOI: https://doi.org/10.1109/ACCESS.2023.3349248

W. Villegas-Ch, J. Govea, A. M. Navarro, and P. P. J´ativa, “Intrusion Detection in IoT Networks Using Dynamic Graph Modeling and Graph- Based Neural Networks,” Institute of Electrical and Electronics Engineers Access, vol. 13, 2025, doi: 10.1109/ACCESS.2025.3559325. DOI: https://doi.org/10.1109/ACCESS.2025.3559325

H. Hakami, M. Faheem, and M. B. Ahmad, “Machine Learning Techniques for Enhanced Intrusion Detection in IoT Security,” Institute of Electrical and Electronics Engineers Access, vol. 13, 2025, doi:10.1109/ACCESS.2025.3542227. DOI: https://doi.org/10.1109/ACCESS.2025.3542227

N. Hafsa, H. Alzoubi, and S. Imran, “Machine Learning-Based Intrusion Detection and Prevention Using Cross-Layer Features in IoT Networks,” Journal of Communications and Networks, vol. 27, no. 5, pp. 345–358, 2025, doi: 10.23919/JCN.2025.000053. DOI: https://doi.org/10.23919/JCN.2025.000053

S. Yang, W. Pan, M. Li, M. Yin, H. Ren, Y. Chang, Y. Liu, S. Zhang, and F. Lou, “Industrial Internet of Things Intrusion Detection System Based on Graph Neural Network,” Symmetry,Multi-disciplinary Digital Publishing Institute, vol. 17, no. 7, Art. no. 997, Jun. 2025, doi:10.3390/sym17070997. DOI: https://doi.org/10.3390/sym17070997

M. J. Cabral and S. Reis, “Scalable Intrusion Detection in IoT Networks via Property Testing and Federated Edge AI,” Institute of Electrical and Electronics Engineers Access, vol. 13, 2025, doi: 10.1109/ACCESS.2025.3603937. DOI: https://doi.org/10.1109/ACCESS.2025.3603937

Y. Song, S. Hyun, and Y.-G. Cheong, “Analysis of Autoencoders for Network Intrusion Detection,” Sensors,”Multi-disciplinary Digital Publishing Institute, vol. 21, no. 13, Art. no. 4294, 2021, doi:10.3390/s21134294. DOI: https://doi.org/10.3390/s21134294

Z. Benamor, Z. A. Seghir, M. Djezzar, and M. Hemam, “A Comparative Study of Machine Learning Algorithms for Intrusion Detection in IoT Networks,” Revue d’Intelligence Artificielle, vol. 37, no. 3, pp. 567–576, 2023, doi: 10.18280/ria.370305. DOI: https://doi.org/10.18280/ria.370305

S. Yang, Deep Neural Networks for Network Intrusion Detection, M.Phil. thesis, University of New South Wales, Australia, 2021, doi:10.26190/unsworks/23881.

J. Asharf, N. Moustafa, H. Khurshid, E. Debie, W. Haider, and A.Wahab, “A Review of Intrusion Detection Systems Using Machine and Deep Learning in the Internet of Things,” Electronics,Multi-disciplinary Digital Publishing Institute,, vol. 9, no. 7, Art. no. 1177, 2020, doi:10.3390/electronics9071177. DOI: https://doi.org/10.3390/electronics9071177

F. T. Sheldon, Y. S. Bhaskar, B. P. Rimal, A. Abdel-Rahim, M. Cox, and A. A. Jillepalli, “Taxonomy of existing sustainable smart city IoT projects,” IEEE Access, 2025, doi: 10.1109/ACCESS.2025.3591230. DOI: https://doi.org/10.1109/ACCESS.2025.3591230

The CTU13 dataset is available on the Stratosphere IPS website https://www.stratosphereips.org/datasets-ctu13

Downloads

Published

20-02-2026

Issue

Section

Research Articles

How to Cite

[1]
Uday H A and Arunalatha J S, Trans., “Efficient Host-Based Intrusion Detection for IoT Using Lightweight ML Models and Fuzzy Ranking”, Int J Sci Res Sci & Technol, vol. 13, no. 1, pp. 317–335, Feb. 2026, doi: 10.32628/IJSRST2613151.