Multi-Objective Feature Selection for Intrusion Detection Systems: A Comparative Analysis of Bio-Inspired Optimization Algorithms
Abstract
1. Introduction
- We formulate IDS feature selection as a bi-objective problem (classification error and subset size) and implement MOGWO, MOGA, MOPSO, and MOACO within a single, unified evaluation pipeline that fixes pre-processing, classifier choice, metrics, and repetition counts for fair comparison.
- We provide a quantitative, Pareto-aware comparison on X-IIoTID, reporting accuracy, FPR, FNR, runtime, and subset size/reduction, alongside indicators of Pareto-front diversity, so that designers can reason about accuracy–efficiency–latency compromises rather than a solitary score.
- We translate empirical results into actionable guidance: GA for maximum accuracy and lowest FPR; GWO for the best accuracy–subset balance (near-best accuracy with substantially fewer features); PSO for near-best accuracy albeit at higher training time; and ACO for the fastest training and most aggressive sparsity, all under the same protocol. The consolidated outcomes demonstrate these distinctions clearly.
- We delineate a representative scope of bio-inspired optimization—hierarchy (GWO), evolution (GA), swarm (PSO), and stigmergy (ACO)—as a reproducible baseline for IDS feature selection. While not exhaustive (e.g., DE, ABC, FA, CS, BA, Whale Optimization remain of interest), this scope meaningfully spans major search paradigms and operational footprints; extending the comparison to a broader family is left to future work.
2. Related Work
2.1. IDS for IoT/IIoT and Sensor-Centric Networks
2.2. Intrusion Detection in Vehicular Networks (VANET/IoV)
2.3. SDN, Cloud, and Big-Data Environments
2.4. Other Domains and General ML/DL Directions
2.5. Automation, RL/LLMs, and Privacy-Preserving Learning
2.6. Comparison, Gaps, and Contributions
3. Methodology
3.1. Problem Formulation and Dataset Preparation
3.2. Multi-Objective Algorithm Implementation and Evaluation Framework
Algorithm 1: Multi-Objective Feature Selection Framework Procedure |
INPUT: Dataset OUTPUT: Performance metrics and visualizations // Data Preprocessing LOAD dataset. SPLIT dataset into training (80%) and testing (20%) sets. STANDARDIZE features of both sets. // Optimization and Training INITIALIZE algorithms: GWO, GA, PSO, ACO. FOR each algorithm IN [GWO, GA, PSO, ACO]: best_features, pareto_front = OPTIMIZE(algorithm, training_set). classifier = TRAIN_CLASSIFIER(best_features, training_set). metrics = EVALUATE(classifier, testing_set). STORE results (accuracy, FPR, FNR, runtime). |
4. Results and Discussion
4.1. Comparative Performance Analysis and Algorithm Evaluation
4.2. Trade-Off Analysis and Multi-Objective Optimization Effectiveness
4.3. Practical Implications, Deployment Considerations, and Limitations
5. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
ACO | Ant Colony Optimization |
AE | Autoencoder |
CNN | Convolutional Neural Network |
CPS | Cyber-Physical System |
GA | Genetic Algorithm |
ICS | Industrial Control System |
IIoT | Industrial Internet of Things |
IoT | Internet of Things |
IoV | Internet of Vehicles |
MOACO | Multi-Objective Ant Colony Optimization |
MOGA | Multi-Objective Genetic Algorithm |
MOGWO | Multi-Objective Grey Wolf Optimizer |
MOPSO | Multi-Objective Particle Swarm Optimization |
SDN | Software-Defined Network |
XAI | Explainable Artificial Intelligence |
References
- Rakine, I.; Oukaira, A.; El Guemmat, K.; Atouf, I.; Ouahabi, S.; Talea, M.; Bouragba, T. Comprehensive Review of Intrusion Detection Techniques: ML and DL in Different Networks. IEEE Access 2025, 13, 104345–104367. [Google Scholar] [CrossRef]
- Anbiaee, Z.; Dadkhah, S.; Ghorbani, A.A. FIGS: A Realistic Intrusion-Detection Framework for Highly Imbalanced IoT Environments. Electronics 2025, 14, 2917. [Google Scholar] [CrossRef]
- Aslam, M.M.; De Silva, L.C.; Apong, R.A.A.H.M.; Tufail, A. An Optimized Anomaly Detection Framework in Industrial Control Systems Through Grey Wolf Optimizer and Autoencoder Integration. Sci. Rep. 2025, 15, 27579. [Google Scholar] [CrossRef]
- Singh, A.K.; Kumar, A. Multi-Objective: Hybrid Particle Swarm Optimization with Firefly Algorithm for Feature Selection with Leaky ReLU. Discov. Artif. Intell. 2025, 5, 192. [Google Scholar] [CrossRef]
- Prabu, M.; Sasikala, L.; Suresh, S.; Ramya, R. A Novel Intrusion Detection System: Integrating Greedy Sand Cat Swarm Optimization and Dual Attention Graph Convolutional Networks. Int. J. Syst. Assur. Eng. Manag. 2025, 1–21. [Google Scholar] [CrossRef]
- Hnamte, V.; Najar, A.A.; Laldinsanga, C.; Hussain, J.; Hmingliana, L. A Lightweight Intrusion Detection System Using Deep Convolutional Neural Network. Comput. Electr. Eng. 2025, 127, 110561. [Google Scholar] [CrossRef]
- Asha, M.L.; Johnpeter, T. Optimized Ensemble Learning Framework with Enhanced Feature Selection for Efficient and Accurate Classification. SN Comput. Sci. 2025, 6, 669. [Google Scholar] [CrossRef]
- Al-Hawawreh, M.; Sitnikova, E.; Aboutorab, N. X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things. IEEE Internet Things J. 2022, 9, 3962–3977. [Google Scholar] [CrossRef]
- Kamal, H.; Mashaly, M. Combined Dataset System Based on a Hybrid PCA–Transformer Model for Effective Intrusion Detection Systems. AI 2025, 6, 168. [Google Scholar] [CrossRef]
- Sezgin, A.; Boyacı, A. AID4I: An Intrusion Detection Framework for Industrial Internet of Things Using Automated Machine Learning. Comput. Mater. Contin. 2023, 76, 2121–2143. [Google Scholar] [CrossRef]
- Sezgin, A.; Boyacı, A. Enhancing Intrusion Detection in Industrial Internet of Things through Automated Preprocessing. Adv. Sci. Technol. Res. J. 2023, 17, 120–135. [Google Scholar] [CrossRef]
- Aleisa, M.A. WSNetDefender: Securing Wireless Sensor Networks Using BBIDNet and Fuzzy-DQN Threat Mitigation System (FD-TMS). IEEE Access 2025, 13, 93439–93452. [Google Scholar] [CrossRef]
- Khayat, M.; Barka, E.; Serhani, A.; Sallabi, F.; Shuaib, K.; Khater, H.M. Reinforcement Learning with Deep Features: A Dynamic Approach for Intrusion Detection in IoT Networks. IEEE Access 2025, 13, 92319–92337. [Google Scholar] [CrossRef]
- Devi, M.; Nandal, P.; Sehrawat, H. Federated Learning-Enabled Lightweight Intrusion Detection System for Wireless Sensor Networks: A Cybersecurity Approach against DDoS Attacks in Smart City Environments. Intell. Syst. Appl. 2025, 27, 200553. [Google Scholar] [CrossRef]
- Vasanthamma, H.V.M.N.; Thankaswamy, J. A Hybrid Stacked Sparse Autoencoder and LightGBM Framework for High-Performance Intrusion Detection in IoT Networks. Iran J. Comput. Sci. 2025, 1–24. [Google Scholar] [CrossRef]
- Krishnan, D.; Singh, S.; Sugumaran, V. Explainable AI for Zero-Day Attack Detection in IoT Networks Using Attention Fusion Model. Discov. Internet Things 2025, 5, 83. [Google Scholar] [CrossRef]
- Yang, W.; Wang, X.; Zhang, Z.; Chen, S.; Hou, C.; Luo, S. Intrusion Detection Using Hybrid Pearson Correlation and GS-PSO Optimized Random Forest Technique for RPL-Based IoT. IEEE Access 2025, 13, 78320–78334. [Google Scholar] [CrossRef]
- Sun, Y.; Wang, Z. Intrusion Detection in IoT and Wireless Networks Using Image-Based Neural Network Classification. Appl. Soft Comput. 2025, 177, 113236. [Google Scholar] [CrossRef]
- Sezgin, A.; Boyacı, A. A Survey of Privacy and Security Challenges in Industrial Settings. In Proceedings of the International Symposium on Digital Forensics and Security (ISDFS), Chattanooga, TN, USA, 11–12 May 2023. [Google Scholar]
- Wang, S.; Cheng, J.; Wang, Y.; Li, S.; Kang, L.; Dai, Y. ConvGRU: A Lightweight Intrusion Detection System for Vehicle Networks Based on Shallow CNN and GRU. IEEE Access 2025, 13, 73297–73318. [Google Scholar] [CrossRef]
- Anand, M.; Muthurajkumar, S. An Intelligent IDS Using Bagging Based Fuzzy CNN for Secured Communication in Vehicular Networks. Sci. Rep. 2025, 15, 26952. [Google Scholar] [CrossRef]
- Christy, C.; Nirmala, A.; Teena, A.M.O.; Amali, A.I. Machine Learning-Based Multi-Stage Intrusion Detection System and Feature Selection Ensemble Security in Cloud Assisted Vehicular Ad Hoc Networks. Sci. Rep. 2025, 15, 27058. [Google Scholar] [CrossRef]
- Li, J.; Ma, Y.; Bai, J.; Chen, C.; Xu, T.; Ding, C. A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security. Sensors 2025, 25, 4622. [Google Scholar] [CrossRef]
- Alharthi, M.; Medjek, F.; Djenouri, D. Ensemble Learning Approaches for Multi-Class Intrusion Detection Systems for the Internet of Vehicles (IoV): A Comprehensive Survey. Future Internet 2025, 17, 317. [Google Scholar] [CrossRef]
- Fan, M.; Lan, J.; Zhou, Y.; Pan, M.; Li, J.; Zhang, D. DDoS Attack Detection in SDN-Assisted Federated Learning Environment Based on Contrastive Learning. IEEE Access 2025, 13, 108798–108814. [Google Scholar] [CrossRef]
- Bahashwan, A.A.; Anbar, M.; Manickam, S.; Al-Amiedy, T.A.; Aladaileh, M.A.; Bin-Salem, A.A. A Deep Learning-Based Mechanism for Detecting Variable-Rate DDoS Attacks in Software-Defined Networks. Mob. Netw. Appl. 2025, 1–30. [Google Scholar] [CrossRef]
- Mrudula, P.S.; Raj, R.D.A.; Pallakonda, A.; Reddy, Y.R.M.; Prakasha, K.K.; Anandkumar, V. Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration. IEEE Access 2025, 13, 128938–128958. [Google Scholar] [CrossRef]
- Rehman, S.U.; Alhulayyil, H.; Alzahrani, T.; AlSagri, H.; Khalid, M.U.; Gruhn, V. Intrusion Detection System Framework for Cyber-Physical Systems. Egypt. Inform. J. 2025, 30, 100600. [Google Scholar] [CrossRef]
- Sikdar, S.; Kule, M. Hybrid Intelligence: Integrating Machine Learning and Nature-Inspired Algorithms for Malware Detection. J. Comput. Virol. Hacking Tech. 2025, 21, 23. [Google Scholar] [CrossRef]
- Parimala, R.; Gunasekaran, S. H2RNN: Automatic Intrusion Detection Model on Cloud Environment Using Hybrid Feature Selection Model with Hybrid Hopfield Recurrent Neural Network. J. Comput. Virol. Hacking Tech. 2025, 21, 22. [Google Scholar] [CrossRef]
- Almadhor, A.; Alsubai, S.; Kryvinska, N.; Al Hejaili, A.; Bouallegue, B.; Ayari, M.; Abbas, S. Transfer Learning with XAI for Robust Malware and IoT Network Security. Sci. Rep. 2025, 15, 26971. [Google Scholar] [CrossRef]
- Alabdulatif, A. A Novel Ensemble of Deep Learning Approach for Cybersecurity Intrusion Detection with Explainable Artificial Intelligence. Appl. Sci. 2025, 15, 7984. [Google Scholar] [CrossRef]
- Mamatha, P.; Balaji, S.; Anuraghav, S.S. A Novel Ensemble of Hybrid Starling Murmuration Optimized Stacked Gated Ghostnets for Robust Classification of DDoS Attacks. Discov. Comput. 2025, 28, 1–29. [Google Scholar] [CrossRef]
- Sun, H.; Li, X.; Fan, Q.; Wang, P. TIDS: Tensor Based Intrusion Detection System (IDS) and Its Application in Large Scale DDoS Attack Detection. Comput. Mater. Contin. 2025, 84, 1659–1679. [Google Scholar] [CrossRef]
- Chen, L.; Li, H.; Wu, P.; Hu, L.; Chen, T.; Zeng, N. MLF-DOU: A Metric Learning Framework with Dual One-Class Units for Network Intrusion Detection. Neurocomputing 2025, 649, 130754. [Google Scholar] [CrossRef]
- Hakiki, R.I.; Azerine, A.; Tlemsani, R.; Golabi, M.; Idoumghar, L. Enhancing IoT Intrusion Detection with Genetic Algorithm-Optimized Convolutional Neural Networks. J. Supercomput. 2025, 81, 1190. [Google Scholar] [CrossRef]
- Li, X.; Zheng, Z.; Zhao, M.; Zhao, Y.; Shi, L.; Wang, B. RLFE-IDS: A Framework of Intrusion Detection System Based on Retrieval Augmented Generation and Large Language Model. Comput. Netw. 2025, 268, 111341. [Google Scholar] [CrossRef]
- Ghourabi, A.; Alkhalil, A. A Federated Learning Model for Detecting Cyberattacks in Internet of Medical Things Networks. IEEE Access 2025, 13, 123018–123030. [Google Scholar] [CrossRef]
- Peng, H.; Wu, C.; Xiao, Y. FD-IDS: Federated Learning with Knowledge Distillation for Intrusion Detection in Non-IID IoT Environments. Sensors 2025, 25, 4309. [Google Scholar] [CrossRef]
- Tang, J.; Huang, Z.; Li, C. MT-FBERT: Malicious Traffic Detection Based on Efficient Federated Learning of BERT. Future Internet 2025, 17, 323. [Google Scholar] [CrossRef]
- Mosaiyebzadeh, F.; Pouriyeh, S.; Han, M.; Liu, L.; Xie, Y.; Zhao, L.; Batista, D.M. Privacy-Preserving Federated Learning-Based Intrusion Detection System for IoHT Devices. Electronics 2025, 14, 67. [Google Scholar] [CrossRef]
- Duc, M.V.; Dang, P.M.; Phuong, T.T.; Truong, T.D.; Hai, V.; Thanh, N.H. Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection. Future Internet 2025, 17, 299. [Google Scholar] [CrossRef]
Item | Value |
---|---|
Total records Total features Feature sources | 820,834 (Normal: 421,417, Attack: 399,417)–51.34% Normal, 48.66% Attack |
63 (includes 3 label levels: normal vs. attack, attack sub-category, attack-sub-sub-category) | |
Network traffic, system logs, application logs, device resources, commercial IDS logs | |
Protocols & connectivity | New IIoT protocols and industrial/transport, traffic across edge, mobile, and cloud |
Attack families (examples) | Reconnaissance (scanning, fuzzing, discovery), Weaponisation (brute force, dictionary, insider), Exploitation (reverse shell, MitM), Lateral movement (MQTT broker, Modbus register read, TCP relay), C2/Data exfiltration/Tampering (false data injection), Ransomware, DoS |
Label granularity | Binary (Normal/Attack) and hierarchical multi-class via sub-category & sub-sub-category labels |
Algorithm | Accuracy (%) | Selected Features | Feature Reduction (%) | FPR (%) | FNR (%) | Runtime(s) | Pareto Solutions |
---|---|---|---|---|---|---|---|
MOGWO | 99.50 | 22 | 65.08 | 0.50 | 0.51 | 6644.22 | 738 |
MOGA | 99.60 | 34 | 46.03 | 0.39 | 0.41 | 25,485.80 | 10 |
MOPSO | 99.58 | 32 | 49.21 | 0.40 | 0.44 | 26,476.83 | 155 |
MOACO | 97.65 | 7 | 88.89 | 2.30 | 2.40 | 3001.21 | 1339 |
Objective | 1st Place | 2nd Place | 3rd Place | 4th Place |
---|---|---|---|---|
Accuracy | MOGA (99.60%) | MOPSO (99.58%) | MOGWO (99.50%) | MOACO (97.65%) |
Feature Reduction | MOACO (89%) | MOGWO (65%) | MOPSO (49%) | MOGA (46%) |
Low FPR | MOGA (0.39%) | MOPSO (0.40%) | MOGWO (0.50%) | MOACO (2.30%) |
Fast Training | MOACO (3001 s) | MOGWO (6644 s) | MOGA (25,486 s) | MOPSO (26,477 s) |
Pareto Diversity | MOACO (1339) | MOGWO (738) | MOPSO (155) | MOGA (10) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sezgin, A.; Ulaş, M.; Boyacı, A. Multi-Objective Feature Selection for Intrusion Detection Systems: A Comparative Analysis of Bio-Inspired Optimization Algorithms. Sensors 2025, 25, 6099. https://doi.org/10.3390/s25196099
Sezgin A, Ulaş M, Boyacı A. Multi-Objective Feature Selection for Intrusion Detection Systems: A Comparative Analysis of Bio-Inspired Optimization Algorithms. Sensors. 2025; 25(19):6099. https://doi.org/10.3390/s25196099
Chicago/Turabian StyleSezgin, Anıl, Mustafa Ulaş, and Aytuğ Boyacı. 2025. "Multi-Objective Feature Selection for Intrusion Detection Systems: A Comparative Analysis of Bio-Inspired Optimization Algorithms" Sensors 25, no. 19: 6099. https://doi.org/10.3390/s25196099
APA StyleSezgin, A., Ulaş, M., & Boyacı, A. (2025). Multi-Objective Feature Selection for Intrusion Detection Systems: A Comparative Analysis of Bio-Inspired Optimization Algorithms. Sensors, 25(19), 6099. https://doi.org/10.3390/s25196099