×
Home Current Archive Editorial board
Instructions for papers
For Authors Aim & Scope Contact
Original scientific article

BIO-INSPIRED ADAPTIVE ANOMALY DETECTION IN IOT USING ARTIFICIAL IMMUNE SYSTEMS AND DYNAMIC DETECTOR SELECTION

By
Ashraf Thaker Mahmood Orcid logo ,
Ashraf Thaker Mahmood

Northern Technical University , Mosul , Iraq

Qais Rashid Ibrahim Orcid logo
Qais Rashid Ibrahim

Northern Technical University , Mosul , Iraq

Abstract

The rapid growth of the Internet of Things (IoT) brings new options to innovative healthcare, transportation, and industrial systems. However, this expansion also increases cyber threats to these infrastructures. Standard anomaly detection systems use fixed machine learning models. Such models require frequent retraining and are not very sensitive to concept drift which results in many false positives when used in adaptive IoT systems. In order to overcome these issues, this paper will present a bio-inspired, adaptive anomaly detector. It also presents a framework for selecting dynamic detectors via Artificial Immune Systems (AISs). The system architecture combines several immune-inspired concepts. Adverse selection separates normal from abnormal patterns, danger theory classifies anomalies in context, and clonal selection and mutation help detectors evolve. Immune memory supports long-term learning and quick response. The proposed model was tested on three benchmark IoT security datasets: UNSW-NB15, BoT-IoT, and TON_IoT. This allowed assessment against legacy and new attack scenarios. In the experiment, the approach achieved 97.5% accuracy, 96.9% precision, 97.8% recall, and a 97.3 F1-score. Compared to related 2023-2025 works, it performs 2.4-8.4% better across various measures. Detection latency decreased due to immune memory integration, and adaptation to zero-day attacks improved. These results confirm that AIS-based anomaly detection is a scalable and adaptive tool for securing future IoT environments.

References

1.
Myakala PK, Bura C, Jonnalagadda AK. Artificial immune systems: A bio-inspired paradigm for computational intelligence. Journal of Artificial Intelligence and Big Data. 2025;5(1):10-31586.
2.
Selvaraj R, Kuthadi VM, Baskar S, Acevedo R. Tiny ML-enabled energy-efficient intrusion detection system for sustainable IoT security in green cybersecurity ecosystems. Journal of Internet Services and Information Security. 2025;15(3):602–25.
3.
Dharmireddi S, Hameed A, Albdairi M, Samudro EG, Nandy M. Cybersecurity in Digital Finance: Artificial Intelligence-Powered Fraud Detection and Risk Management. In2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES) 2025 Apr 24 (pp. 1-5). IEEE.
4.
Purnama Y, Asdlori A, Ciptaningsih EMSS, Kraugusteeliana K, Triayudi A, Rahim R. Machine learning for cybersecurity: a bibliometric analysis from 2019 to 2023. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2024;15(4):243–58.
5.
Jalal SK, Yousif RZ, Al-Mukhtar FH, Kareem SW. An optimized up to 16-user and 160 Gbps dual cascaded optical modulators PON-based power combined array fiber Bragg grating and pre-distortion device for 5th G system. Photonic Network Communications. 2025 Feb;49(1):1. (1).
6.
Mehra A, Iyer R. Improving cybersecurity using artificial intelligence: overview, modeling, future directions. International Academic Journal of Science and Engineering. 2021;8(2):11–15.
7.
Amin Ali OM, Hamaamin RA, Kareem SW. Deep Learning Techniques for Early Fault Detection in Bearings: An Intelligent Approach. Kurdistan Journal of Applied Research. 2025 Feb 23;10(1):18-34.
8.
Ali OM, Hamaamin RA, Youns BJ, Kareem SW. Innovative Machine Learning Strategies for DDoS Detection: A Review. UHD Journal of Science and Technology. 2024 Oct 2;8(2):38-49.
9.
Aalsaud A, Kareem SW, Yousif RZ, Mohammed AS. Ensemble transfer learning for botnet detection in the Internet of Things. Scalable Computing: Practice and Experience. 2024 Aug 1;25(5):4312-22.
10.
Pinto C, Pinto R, Gonçalves G. Towards bio-inspired anomaly detection using the cursory dendritic cell algorithm. Algorithms. 2021 Dec 21;15(1):1.
11.
Soni V, Bhatt DP, Yadav NS. Bio inspired methods for intrusion detection in Internet of Things: A survey. In2024 IEEE Region 10 Symposium (TENSYMP) 2024 Sep 27 (pp. 1-8). IEEE.
12.
Wlodarczak P. Cyber Immunity: A bio-inspired cyber defense system. InInternational Conference on Bioinformatics and Biomedical Engineering 2017 Apr 1 (pp. 199-208). Cham: Springer International Publishinge system.
13.
Saadouni R, Gherbi C, Aliouat Z, Harbi Y, Khacha A. Intrusion detection systems for IoT based on bioinspired and machine learning techniques: a systematic review of the literature. Cluster Computing. 2024 Oct;27(7):8655-81.
14.
Balasubramaniam S, Kadry S, MK TK, Kumar KS, editors. Bio-inspired Algorithms in Machine Learning and Deep Learning for Disease Detection. CRC Press; 2025 Mar 13.
15.
Tandiya N, Colbert EJ, Marojevic V, Reed JH. Biologically inspired artificial intelligence techniques. InCyber Resilience of Systems and Networks 2018 May 30 (pp. 287-313). Cham: Springer International Publishing.
16.
Soni V, Saxena S, Bhatt DP, Yadav NS. ImmuneGAN: Bio-inspired Artificial Immune System to Secure IoT Ecosystem. InInternational Conference on Cyber Security, Privacy and Networking 2021 Sep 9 (pp. 110- 121). Cham: Springer International Publishing.
17.
Ashwini A, Balasubramaniam S, Sundaravadivazhagan B. Bio-Inspired Intelligence in Early Cancer Detection A Machine Learning Approach. InBio-inspired Algorithms in Machine Learning and Deep Learning for Disease Detection (pp. 122-140). CRC Press.
18.
Sharma P, Chaudhary K. Adaptive Cybersecurity for IoT Networks Using Artificial Immune Systems: A Scalable Approach for Real-Time Threat Detection. InInternational Conference on Artificial Intelligence on Textile and Apparel 2024 Aug 9 (pp. 733-746). Singapore: Springer Nature Singapore.
19.
Pham TH, Raahemi B. Bio-inspired feature selection algorithms with their applications: a systematic literature review. IEEE Access. 2023 May 2;11:43733-58.
20.
Alabdulatif A, Thilakarathne NN. Bio-inspired internet of things: current status, benefits, challenges, and future directions. Biomimetics. 2023 Aug 17;8(4):373.
21.
Efiong JE, Ajayi TO, Akinwale A, Olajubu EA. Towards a Bio-inspired Real-Time. ICT for Intelligent Systems: Proceedings of ICTIS 2024, Volume 1. 2024 Sep 26;403:289.
22.
Efiong JE, Ajayi TO, Akinwale A, Olajubu EA, Aderounmu GA. Towards a Bio-inspired Real-Time Intrusion Detection in the Smart Grid. InInternational Conference on Information and Communication Technology for Intelligent Systems 2024 May 22 (pp. 289-302). Singapore: Springer Nature Singapore.
23.
Usha G, Madhavan P, Kumar MR. A Novel Design Augmentation of Bio-Inspired Artificial Immune Technique in Securing Internet of Things (IOT). InInternet of Things for Industry 4.0: Design, Challenges and Solutions 2019 Dec 29 (pp. 103-114). Cham: Springer International Publishing.
24.
Bouramoul IE, Zertal S, Derdour M, Zenbout I. Enhancing IoT Security Through Deep learning and Evolutionary Bio-Inspired Intrusion Detection in IoT systems. In2024 6th International Conference on Pattern Analysis and Intelligent Systems (PAIS) 2024 Apr 24 (pp. 1-8). IEEE.
25.
Mthunzi S, Benkhelifa E, Bosakowski T, Hariri S. A bio-inspired approach to cyber security. InMachine Learning for Computer and Cyber Security 2019 Feb 5 (pp. 75-104). CRC Press.
26.
Bala A, Bahnasse A, El Bhiri B, Zegrari M, Tardif PM. Immunity-Inspired Approaches to Cybersecurity: A Review. Procedia Computer Science. 2025 Jan 1;257:274-81.
27.
Pourmoafi S. A Solution for Securing the Information Environment Inspired by Living Organisms and Biology.
28.
Rehman A, Alharbi O. Bioinspired blockchain framework for secure and scalable wireless sensor network integration in fog–cloud ecosystems. Computers. 2024 Dec 26;14(1):3.
29.
Ahsan MM, Gupta KD, Nag AK, Poudyal S, Kouzani AZ, Mahmud MP. Applications and evaluations of bio-inspired approaches in cloud security: A review. IEEE Access. 2020 Sep 30;8:180799-814.
30.
RC JS, K P. Investigations on bio-inspired algorithm for network intrusion detection–a review. Evol. Intell. 2022;9(4).
31.
Fatin M, Rahman M. Artificial Intelligence in Healthcare Systems: From Clinical Imaging to Epidemic Forecasting. Asia Pacific Journal of Surgical Advances. 2025 Oct 10;2(3):139-51.
32.
Soni V, Bhatt DP, Yadav NS, Saxena S. DAIS: deep artificial immune system for intrusion detection in IoT ecosystems. International Journal of Bio-Inspired Computation. 2024;23(3):148-56.
33.
Procopiou A, Chen TM. Malicious activity detection in IoT networks: A nature-inspired approach. InAdvances in Nature-Inspired Cyber Security and Resilience 2021 Oct 20 (pp. 55-83). Cham: Springer International Publishing.
34.
Krishna GB, Udayasri G, Devi KR, Gnaneshwar K, Rani DS, Ala R. Biologically-Inspired Artificial Lymphocyte Networks for Adaptive and Scalable Malware Detection Against Zero-Day and Persistent Threats. In2025 12th International Conference on Computing for Sustainable Global Development (INDIACom) 2025 Apr 2 (pp. 1-7). IEEE. 1AD;
35.
Rakhmanovich IU, Hossein RR, Albdairi M, Omonov Q, Kumaraswamy B. Predictive Analytics and Automation: Transforming Logistics with Artificial Intelligence with Blockchain Intelligence. In2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES) 2025 Apr 24 (pp. 1-6). IEEE.
36.
Qadri SS, Albdairi M, Almusawi A, Kabarcik A, Abdulrahman HS. Optimization of Signalized Intersections: Analyzing Autonomous Vehicle Behaviors Through Data-Driven Simulations. InInternational Conference on Optimization and Data Science in Industrial Engineering 2024 Nov 7 (pp. 232-244). Cham: Springer Nature Switzerland.
37.
Hamad DM, Gwad WH, Fadaaq WH, Kareem SW. Dynamic Parameter Optimization for Industrial Internet Security Models Using Neural Networks. International Journal of Intelligent Engineering & Systems. 2025 Jun 1;18(6).

Citation

This is an open access article distributed under the  Creative Commons Attribution Non-Commercial License (CC BY-NC) License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Article metrics

Google scholar: See link

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.