×
Home Current Archive Editorial board
Instructions for papers
For Authors Aim & Scope Contact
Original scientific article

BIO-INSPIRED ADAPTIVE ANOMALY DETECTION IN IOT USING ARTIFICIAL IMMUNE SYSTEMS AND DYNAMIC DETECTOR SELECTION

By
Ashraf Thaker Mahmood Orcid logo ,
Ashraf Thaker Mahmood

Northern Technical University , Mosul , Iraq

Qais Rashid Ibrahim Orcid logo
Qais Rashid Ibrahim

Northern Technical University , Mosul , Iraq

Abstract

The rapid growth of the Internet of Things (IoT) brings new options to innovative healthcare, transportation, and industrial systems. However, this expansion also increases cyber threats to these infrastructures. Standard anomaly detection systems use fixed machine learning models. Such models require frequent retraining and are not very sensitive to concept drift which results in many false positives when used in adaptive IoT systems. In order to overcome these issues, this paper will present a bio-inspired, adaptive anomaly detector. It also presents a framework for selecting dynamic detectors via Artificial Immune Systems (AISs). The system architecture combines several immune-inspired concepts. Adverse selection separates normal from abnormal patterns, danger theory classifies anomalies in context, and clonal selection and mutation help detectors evolve. Immune memory supports long-term learning and quick response. The proposed model was tested on three benchmark IoT security datasets: UNSW-NB15, BoT-IoT, and TON_IoT. This allowed assessment against legacy and new attack scenarios. In the experiment, the approach achieved 97.5% accuracy, 96.9% precision, 97.8% recall, and a 97.3 F1-score. Compared to related 2023-2025 works, it performs 2.4-8.4% better across various measures. Detection latency decreased due to immune memory integration, and adaptation to zero-day attacks improved. These results confirm that AIS-based anomaly detection is a scalable and adaptive tool for securing future IoT environments.

References

1.
Myakala PK, Bura C, Jonnalagadda AK. Artificial immune systems: A bio-inspired paradigm for computational intelligence. Journal of Artificial Intelligence and Big Data. 2025;5(1):10-31586.
2.
Selvaraj R, Kuthadi VM, Baskar S, Acevedo R. Tiny ML-enabled energy-efficient intrusion detection system for sustainable IoT security in green cybersecurity ecosystems. Journal of Internet Services and Information Security. 2025;15(3):602–25.
3.
Dharmireddi S, Hameed A, Albdairi M, Samudro EG, Nandy M. Cybersecurity in Digital Finance: Artificial Intelligence-Powered Fraud Detection and Risk Management. In2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES) 2025 Apr 24 (pp. 1-5). IEEE.
4.
Purnama Y, Asdlori A, Ciptaningsih EMSS, Kraugusteeliana K, Triayudi A, Rahim R. Machine learning for cybersecurity: a bibliometric analysis from 2019 to 2023. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2024;15(4):243–58.
5.
Jalal SK, Yousif RZ, Al-Mukhtar FH, Kareem SW. An optimized up to 16-user and 160 Gbps dual cascaded optical modulators PON-based power combined array fiber Bragg grating and pre-distortion device for 5th G system. Photonic Network Communications. 2025 Feb;49(1):1. (1).

Citation

This is an open access article distributed under the  Creative Commons Attribution Non-Commercial License (CC BY-NC) License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Article metrics

Google scholar: See link

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.