Advances In Adaptive Machine Learning Algorithms for Enhanced Security In IoT Networks

A Comprehensive Review

Authors

  • Jayashri Jayesh Patil Department of Computer Science and Engineering, Sandip University, Nashik, Maharashtra, India 422213
  • Ramkumar Solanki Department of Computer Science and Engineering, Sandip University, Nashik, Maharashtra, India 422213

DOI:

https://doi.org/10.57159/jcmm.5.1.25206

Keywords:

IoT Security, Adaptive Machine Learning, Intrusion Detection System, Federated Learning, Adversarial Machine Learning, Real-Time IoT Security

Abstract

The accelerated growth and diversification of Internet of Things (IoT) environments have compounded security issues that are caused by non-stationary traffic, dynamic attacker tactics, and extreme resource constraints. In this case, the failure of the existing process for preventing intrusion through conventional, manually configured intrusion detection systems is becoming less sustainable, while adaptive machine learning (ML)-based security systems are becoming more popular. Nonetheless, the survey literature is generally more biased toward algorithmic enumeration or single-detection accuracy and provides very little critical evaluation of adaptation mechanisms, dataset realism, real-time capability, and implementation constraints. This paper provides a systematic, deployment-conscious review of adaptive machine learning methods for IoT security, conducted through a PRISMA-directed, systematic literature review. An integrative taxonomy of learning paradigms and adaptation methods is presented, a critical review of popular datasets on IoT security is conducted, and a discussion of performance metrics beyond accuracy, such as false positives, robustness, latency, and energy overhead, is provided. The review also examines real-time deployment issues related to edge-cloud, resource constraints, retraining costs, and orchestration complexity, as well as the security of adaptive models against adversarial manipulation and privacy leakage. The literature review, by reconceptualizing the problem of IoT intrusion detection as an adversarially exposed, adaptive learning task with deployment constraints, identifies gaps in the field and provides directions for future work to build a scalable, reliable, and dependable IoT security system.

References

M. Gelgi and M. Çelik, “A systematic literature review of IoT botnet DDoS attacks,” Sensors, vol. 24, no. 3, pp. 1–29, 2024.

F. Alwahedi, A. Aldhaheri, M. A. Ferrag, A. Battah, and N. Tihanyi, “Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models,” Internet of Things and Cyber-Physical Systems, vol. 4, pp. 167–185, 2024.

R. Liu, J. Shi, X. Chen, and C. Lu, “Network anomaly detection and security defense technology based on machine learning: A review,” Computers & Electrical Engineering, vol. 119, p. 109581, 2024.

M. M. Rahman, M. S. Hossain, and M. M. Hassan, “Intrusion detection systems for IoT networks: Recent advances and challenges,” Journal of Network and Computer Applications, vol. 226, p. 103927, 2024.

C. Ni and S. Li, “Machine learning-enabled industrial IoT security: Challenges, trends, and solutions,” Journal of Industrial Information Integration, vol. 38, p. 100549, 2024.

E. C. Pinto Neto, S. Dadkhah, S. Sadeghi, H. Molyneaux, and A. A. Ghorbani, “A review of machine learning–based IoT security in healthcare: A dataset perspective,” Computer Communications, vol. 213, pp. 61–77, 2024.

F. Hinder, A. Artelt, B. Hammer, and M. Biehl, “One or two things we know about concept drift,” Frontiers in Artificial Intelligence, vol. 7, p. 1296484, 2024.

A. L. Suárez-Cetrulo, A. Bifet, and J. Calvo-Zaragoza, “A survey on machine learning for recurring concept drifting data streams,” Applied Soft Computing, vol. 132, p. 109890, 2023.

Z. Mahdi, N. Abdalhussien, N. Mahmood, and R. Zaki, “Detection of real-time distributed denial-of-service (DDoS) attacks on internet of things (IoT) networks using machine learning algorithms,” Computers, Materials & Continua, vol. 80, no. 2, pp. 2139–2159, 2024.

I. Ioannou et al., “GEMLIDS-MIOT: A green effective machine learning intrusion detection system based on federated learning for medical IoT network security hardening,” Computer Communications, vol. 218, pp. 209–239, 2024.

I. Khamassi, M. Sayed-Mouchaweh, M. Hammami, and K. Ghédira, “Concept drift detection and adaptation with incremental learning: A survey,” IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 4, pp. 1739–1756, 2022.

J. Lu et al., “Learning under concept drift: A review,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 2, pp. 1242–1260, 2023.

J. Gama, I. Žliobaitė, A. Bifet, M. Pechenizkiy, and A. Bouchachia, “A survey on concept drift adaptation,” ACM Computing Surveys, vol. 46, no. 4, p. 44, 2014.

Y. Ren, Interactive Causality Enabled Adaptive Machine Learning, Ph.D. dissertation, Univ. California Irvine, 2023.

A. Bifet, R. Gavalda, and G. Holmes, “Machine learning for evolving data streams,” ACM Computing Surveys, vol. 54, no. 8, pp. 1–36, 2022.

P. Kairouz et al., “Advances and open problems in federated learning,” Foundations and Trends in Machine Learning, vol. 14, nos. 1–2, pp. 1–210, 2023.

J. Zhang, B. Chen, and Y. Wang, “Adaptive federated learning for edge-enabled IoT systems,” IEEE Transactions on Mobile Computing, 2024.

L. Jing and Y. Tian, “Self-supervised learning for representation learning,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 4, pp. 4143–4166, 2023.

Z. Zhang and M. R. Sabuncu, “Generalized cross entropy loss for training deep neural networks with noisy labels,” IEEE Transactions on Neural Networks and Learning Systems, 2023.

V. Losing, B. Hammer, and H. Wersing, “Choosing the best algorithm for an evolving problem,” IEEE Transactions on Neural Networks and Learning Systems, vol. 33, no. 1, pp. 1–15, 2022.

V. Mothukuri et al., “A survey on security and privacy of federated learning,” Future Generation Computer Systems, vol. 115, pp. 619–640, 2022.

T. T. Nguyen, V. J. Reddi, and K. R. Chowdhury, “Graph neural networks for network intrusion detection: A survey,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 1241–1267, 2022.

T. Li, S. Hu, A. Beirami, and V. Smith, “Fair resource allocation in federated learning,” Proceedings of the IEEE, vol. 111, no. 3, pp. 352–370, 2023.

I. Ullah, Q. H. Mahmoud, and W. Alasmary, “A comparative analysis of machine learning and deep learning approaches for intrusion detection in internet of things networks,” IEEE Access, vol. 10, pp. 100456–100474, 2022.

M. A. Ferrag, L. Shu, H. Djallel, and L. Maglaras, “Deep learning-based intrusion detection for internet of things: A comprehensive survey,” Computer Networks, vol. 230, p. 109806, 2023.

J. Bhayo, I. A. Hameed, and A. Ahmed, “Hybrid machine learning models for intrusion detection in internet of things networks,” Future Generation Computer Systems, vol. 129, pp. 63–78, 2022.

A. Verma and V. Ranga, “Ensemble learning based intrusion detection systems for internet of things,” Journal of Network and Computer Applications, vol. 209, p. 103531, 2023.

S. M. Alqahtani, A. Alzahrani, and H. Aljuaid, “Lightweight intrusion detection for resource-constrained internet of things devices,” IEEE Internet of Things Journal, vol. 10, no. 9, pp. 7862–7875, 2023.

N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A lightweight deep learning approach for intrusion detection in internet of things environments,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 6, no. 3, pp. 552–565, 2022.

S. Raza, L. Wallgren, and T. Voigt, Security and Privacy in Low-Power Internet of Things Systems. Cambridge: Cambridge Univ. Press, 2023.

Y. Zhou, G. Cheng, and X. Xu, “Graph-based intrusion detection for internet of things networks using graph neural networks,” IEEE Internet of Things Journal, vol. 10, no. 15, pp. 13489–13502, 2023.

Y. Chen, Graph-based Traffic Modeling for Intrusion Detection in Internet of Things Networks, Ph.D. dissertation, Tsinghua Univ., 2024.

M. Abdallah, H. Hijazi, and A. Awad, “Hybrid machine learning models for DDoS detection in internet of things networks,” IEEE Systems Journal, vol. 16, no. 4, pp. 6432–6443, 2022.

A. S. Alqahtani and M. A. Babar, “Ensemble-based intrusion detection for DDoS attacks in IoT environments,” Computers & Security, vol. 123, p. 102951, 2023.

M. Hassan, Hybrid and Ensemble Learning Techniques for Distributed Denial-of-Service Detection in IoT Networks, Ph.D. dissertation, Univ. Manchester, 2023.

Y. Kim, J. Park, and M. Bennis, “Federated intrusion detection in IoT networks under non-IID data,” IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 3194–3208, 2022.

M. Nasr, R. Shokri, and A. Houmansadr, “Comprehensive privacy analysis of federated learning,” in Proc. IEEE Symp. Security and Privacy (SP), 2022.

M. Alazab, Privacy-Preserving Federated Intrusion Detection for Large-Scale IoT Systems, Ph.D. dissertation, Deakin Univ., Australia, 2024.

W. Elmasry, A. Akbulut, and A. H. Zaim, “Feature selection for intrusion detection systems using metaheuristic optimization,” Expert Systems with Applications, vol. 195, p. 116567, 2022.

G. Kaur and P. Singh, “Energy-efficient intrusion detection in internet of things using feature optimization techniques,” Sustainable Computing: Informatics and Systems, vol. 39, p. 100855, 2023.

A. E. Hassanien, M. Kilany, M. Abd Elaziz, and A. A. Ewees, “Arithmetic optimization algorithm for feature selection in cybersecurity applications,” Applied Soft Computing, vol. 148, p. 110863, 2024.

X.-S. Yang, Nature-Inspired Optimization Algorithms, 2nd ed. Elsevier, 2023.

S. S. Roy, A. Mallik, and S. Das, “Deep learning-based intrusion detection in internet of things networks: A temporal analysis,” IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp. 4098–4107, 2022.

C. Arisdakessian, O. A. Wahab, and A. Mourad, “Overfitting-aware deep intrusion detection for IoT networks,” Computer Networks, vol. 242, p. 110181, 2024.

Y. Zhang, X. Chen, and J. Li, “Explainable deep learning for intrusion detection in internet of things systems,” IEEE Internet of Things Journal, vol. 10, no. 11, pp. 9634–9646, 2023.

R. Kumar, Deep Learning Architectures for Scalable and Explainable Internet of Things Intrusion Detection, Ph.D. dissertation, IIT Delhi, India, 2023.

S. García, M. Grill, J. Stiborek, and A. Zunino, “An empirical comparison of botnet detection methods,” Computers & Security, vol. 45, pp. 100–123, 2020.

A. H. Lashkari et al., “CIC-IoT-2023: A realistic dataset for IoT intrusion detection,” IEEE Access, vol. 11, pp. 341–356, 2023.

F. Ullah, F. Al-Turjman, and L. Mostarda, “Security datasets and evaluation challenges in healthcare internet of things systems,” IEEE Journal of Biomedical and Health Informatics, vol. 27, no. 9, pp. 4521–4535, 2023.

B. Krawczyk, “Learning from imbalanced data: Open challenges and future directions,” Progress in Artificial Intelligence, vol. 11, pp. 221–232, 2022.

M. Ring et al., “Flow-based benchmark datasets for intrusion detection,” Computers & Security, vol. 114, p. 102597, 2022.

F. Pacheco and R. Fernandes, “Realistic traffic generation and dataset aging effects in network intrusion detection,” Computer Networks, vol. 228, p. 109790, 2023.

D. Chicco and G. Jurman, “The advantages of the Matthews correlation coefficient over F1 score and accuracy in binary classification evaluation,” BMC Genomics, vol. 24, p. 173, 2023.

S. Wang et al., “Energy-efficient machine learning inference at the edge for internet of things applications,” IEEE Transactions on Green Communications and Networking, vol. 7, no. 2, pp. 873–885, 2023.

A. Alshamrani, Evaluation Frameworks for Real-Time Intrusion Detection in Internet of Things Systems, Ph.D. dissertation, King Saud Univ., Saudi Arabia, 2024.

M. Satyanarayanan, “The emergence of edge computing,” Computer, vol. 55, no. 1, pp. 30–39, 2022.

W. Shi et al., “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 9, no. 2, pp. 1353–1370, 2022.

J. Hong, Y. Diao, and Z. Zhang, “Fog computing for real-time IoT analytics: Architecture and challenges,” Future Generation Computer Systems, vol. 139, pp. 1–14, 2023.

X. Xu et al., “A taxonomy of resource management in edge computing,” ACM Computing Surveys, vol. 55, no. 3, p. 63, 2022.

C. Zhang et al., “A survey on federated learning,” Knowledge and Information Systems, vol. 63, no. 1, pp. 1–47, 2022.

B. Varghese and R. Buyya, “Next-generation cloud computing: New trends and research directions,” Future Generation Computer Systems, vol. 134, pp. 289–301, 2023.

S. Alkadi, N. Moustafa, B. Turnbull, and K.-K. R. Choo, “Better safe than never: A survey on adversarial machine learning,” Applied Sciences, vol. 13, no. 2, pp. 1–36, 2023.

Downloads

Published

28-02-2026

How to Cite

Patil, J. J., & Solanki, R. (2026). Advances In Adaptive Machine Learning Algorithms for Enhanced Security In IoT Networks: A Comprehensive Review. Journal of Computers, Mechanical and Management, 5(1), 50–75. https://doi.org/10.57159/jcmm.5.1.25206