Home > Published Issues > 2025 > Volume 20, No. 6, 2025 >
JCM 2025 Vol.20(6): 731-746
Doi: 10.12720/jcm.20.6.731-746

Tracing of Cyber Intrusion Detection and Identification Approach Using Fine-Tuned SVMRF Model in Wireless IoT-23 Networks

Milan Samantaray1,2, Ram Chandra Barik1, Yu-Chen Hu3,*, and Anil Kumar Biswal4
1Department of Computer Science and Engineering, C.V. Raman Global University, Bhubaneswar City, Odisha, India
2Department of Computer Science and Engineering, Silicon University, Bhubaneswar City, Odisha, India
3Department of Computer Science, Tunghai University, Taichung City, Taiwan
4Department of Computer Science, Udayanath (Auto) College of Science and Technology, Cuttack City, Odisha, India
Email: milansamantaray190@gmail.com (M.S.); ram.chandra@cgu-odisha.ac.in (R.C.B.); ychu@thu.edu.tw (Y-C.H.); anil.biswal123@gmail.com (A.K.B.)
*Corresponding author

Manuscript received July 17, 2025; revised August 12, 2025; accepted August 20, 2025; published December 4, 2025.

Abstract—Many crucial domains have already begun integrating the Internet of Things (IoT) to serve people better and make their lives easier. The Internet of Things revolution has reshaped digital services across industries by increasing efficacy, productivity, and cost-effectiveness. The security of IoT devices is still a matter of concern despite many service providers having incorporated or adapted them into core portions of their systems’ operation. Machine learning-based anomaly detection has the potential to design an efficient protection system against various IoT cyberattacks, hence reducing the risk to IoT networks. Many detection methods have been developed, current methods only deal with a subset of cyberattacks and evaluate their efficacy using increasingly antiquated datasets. This paper proposes a smart, efficient, and lightweight model for detecting multiple IoT threats. It is called fine-tuned Random Forest- Support Vector Machine (SVM-RF). To construct a powerful and efficient detection model, our proposed framework uses a shared approach for selecting features to choose the most informative and relevant features. Moreover, we suggested a fine-tuned hybrid learning algorithm to enhance classification for predicting multiple types of IoT assaults during the detection phase. Our testing results demonstrate that our proposed method has a good level of accuracy (97%), precision (97%), recall (96%), and F1−Score (97%) in predicting a variety of IoT threats.

Keywords—cyberattacks, Internet of Things (IoT), fine-tuned Random Forest-Support Vector Machine (SVM-RF), anomaly detection, tracing, Intrusion Detection System (IDS)

Cite: Milan Samantaray, Ram Chandra Barik, Yu-Chen Hu, and Anil Kumar Biswal, “Tracing of Cyber Intrusion Detection and Identification Approach Using Fine-Tuned SVMRF Model in Wireless IoT-23 Networks," Journal of Communications, vol. 20, no. 6, pp. 731-746, 2025.


Copyright © 2025 by the authors. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Article Metrics in Dimensions