<doi_batch xmlns="http://www.crossref.org/schema/4.4.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="4.4.0"><head><doi_batch_id>8268a686-dd7e-497c-8e70-08e9d4599be8</doi_batch_id><timestamp>20250625063528362</timestamp><depositor><depositor_name>wseas:wseas</depositor_name><email_address>mdt@crossref.org</email_address></depositor><registrant>MDT Deposit</registrant></head><body><journal><journal_metadata language="en"><full_title>WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS</full_title><issn media_type="electronic">2224-3402</issn><issn media_type="print">1790-0832</issn><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.37394/23209</doi><resource>http://wseas.org/wseas/cms.action?id=4046</resource></doi_data></journal_metadata><journal_issue><publication_date media_type="online"><month>1</month><day>7</day><year>2025</year></publication_date><publication_date media_type="print"><month>1</month><day>7</day><year>2025</year></publication_date><journal_volume><volume>22</volume><doi_data><doi>10.37394/23209.2025.22</doi><resource>https://wseas.com/journals/isa/2025.php</resource></doi_data></journal_volume></journal_issue><journal_article language="en"><titles><title>IoT Network Security based on Intrusion Detection System using Stacked Ensemble</title></titles><contributors><person_name sequence="first" contributor_role="author"><given_name>Hassan</given_name><surname>Khazane</surname><affiliation>RITM Laboratory, CED Engineering Sciences, ENSEM Hassan 2 University Casablanca MOROCCO</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mohammed</given_name><surname>Ridouani</surname><affiliation>RITM Laboratory, CED Engineering Sciences, ENSEM Hassan 2 University Casablanca MOROCCO</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Fatima</given_name><surname>Salahdine</surname><affiliation>Dept. of Electrical and Computer Engineering University of North Carolina Charlotte, North Carolina USA</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Naima</given_name><surname>Kaabouch</surname><affiliation>Artificial Intelligence Research Center University of North Dakota Grand Forks, North Dakota USA</affiliation></person_name></contributors><jats:abstract xmlns:jats="http://www.ncbi.nlm.nih.gov/JATS1"><jats:p>The rapid evolution of IoT networks has led to an increasing number of devices connecting to the internet, exposing them to various cyber threats. Detecting intrusions in IoT environments is essential but challenging. Network Intrusion Detection Systems are vital in analyzing network traffic to differentiate normal and malicious activities without compromising security. However, the abundance of benign traffic complicates accurate detection. To overcome this challenge, we propose an Ensemble-based Network Intrusion Detection Systems framework, where five Machine Learning classifiers are combined through a Stacking approach and with nature-inspired feature selection techniques to enhance the detection effectiveness. The performance of the proposed model was compared to four base models - Random Forest, Extra Trees, AdaBoost, and Gradient Boosting - in terms of several metrics. The experimental results on the CICIoT2023 dataset reveal that the proposed stacking model consistently outperforms the base classifiers across all evaluation metrics.</jats:p></jats:abstract><publication_date media_type="online"><month>6</month><day>25</day><year>2025</year></publication_date><publication_date media_type="print"><month>6</month><day>25</day><year>2025</year></publication_date><pages><first_page>466</first_page><last_page>473</last_page></pages><publisher_item><item_number item_number_type="article_number">38</item_number></publisher_item><ai:program xmlns:ai="http://www.crossref.org/AccessIndicators.xsd" name="AccessIndicators"><ai:free_to_read start_date="2025-06-25"/><ai:license_ref applies_to="am" start_date="2025-06-25">https://wseas.com/journals/isa/2025/a745109-017(2025).pdf</ai:license_ref></ai:program><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.37394/23209.2025.22.38</doi><resource>https://wseas.com/journals/isa/2025/a745109-017(2025).pdf</resource></doi_data><citation_list><citation key="ref0"><doi>10.3390/fi16010032</doi><unstructured_citation>H. Khazane, M. Ridouani, F. Salahdine, and N. Kaabouch, “A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks,” Future Internet, vol. 16, no. 1, p. 32, Jan. 2024, doi: 10.3390/fi16010032. </unstructured_citation></citation><citation key="ref1"><doi>10.37394/232018.2024.12.27</doi><unstructured_citation>N. R. Al-Milli and Y. A. Al-Khassawneh, “Intrusion Detection System using CNNs and GANs,” WSEAS Transactions on Computer Research, vol. 12, pp. 281–290, Apr. 2024, https://doi.org/10.37394/232018.2024.12.27. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>T. J. Lucas, I. S. de Figueiredo, C. A. C. Tojeiro, A. M. G. de Almeida, R. Scherer, J. R. F. Brega, J. P. Papa, K. . P. da Costa, “A Comprehensive Survey on Ensemble Learning-Based Intrusion Detection Approaches in Computer Networks,” IEEE Access, vol. 11, pp. 122638–122676, 2023, doi: 10.1109/ACCESS.2023.3328535. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>D. H. Wolpert, “Stacked generalization,” Neural Networks, vol. 5, no. 2, pp. 241–259, Jan. 1992, doi: 10.1016/S0893- 6080(05)80023-1. </unstructured_citation></citation><citation key="ref4"><doi>10.1155/2020/4586875</doi><unstructured_citation>S. Rajagopal, P. P. Kundapur, and K. S. Hareesha, “A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets,” Security and Communication Networks, vol. 2020, pp. 1–9, Jan. 2020, doi: 10.1155/2020/4586875. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>S. Roy, J. Li, B.-J. Choi, and Y. Bai, “A lightweight supervised intrusion detection mechanism for IoT networks,” Future Generation Computer Systems, vol. 127, pp. 276–285, Feb. 2022, doi: 10.1016/j.future.2021.09.027. </unstructured_citation></citation><citation key="ref6"><doi>10.1016/j.compeleceng.2021.107039</doi><unstructured_citation>S. I. Popoola, B. Adebisi, M. Hammoudeh, H. Gacanin, and G. Gui, “Stacked recurrent neural network for botnet detection in smart homes,” Computers &amp; Electrical Engineering, vol. 92, p. 107039, Jun. 2021, doi: 10.1016/j.compeleceng.2021.107039. </unstructured_citation></citation><citation key="ref7"><doi>10.1186/s13635-019-0098-y</doi><unstructured_citation>J. Sharma, C. Giri, O.-C. Granmo, and M. Goodwin, “Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation,” EURASIP J. on Info. Security, vol. 2019, no. 1, Dec. 2019, doi: 10.1186/s13635-019-0098-y. </unstructured_citation></citation><citation key="ref8"><doi>10.1007/s12652-020-02696-3</doi><unstructured_citation>P. Kumar, G. P. Gupta, and R. Tripathi, “A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks,” J Ambient Intell Human Comput, vol. 12, no. 10, pp. 9555–9572, Oct. 2021, doi: 10.1007/s12652-020-02696-3. </unstructured_citation></citation><citation key="ref9"><doi>10.1016/j.knosys.2023.110941</doi><unstructured_citation>R. Lazzarini, H. Tianfield, and V. Charissis, “A stacking ensemble of deep learning models for IoT intrusion detection,” Knowledge-Based Systems, vol. 279, p. 110941, Nov. 2023, doi: 10.1016/j.knosys.2023.110941. </unstructured_citation></citation><citation key="ref10"><doi>10.3390/s23135941</doi><unstructured_citation>E. C. P. Neto, S. Dadkhah, R. Ferreira, A. Zohourian, R. Lu, and A. A. Ghorbani, “CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment,” Sensors, vol. 23, no. 13, p. 5941, Jun. 2023, doi: 10.3390/s23135941.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>