﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle>
      <ISSN>2322-1437</ISSN>
      <Volume>13</Volume>
      <Issue>51</Issue>
      <PubDate PubStatus="epublish">
        <Year>2025</Year>
        <Month>11</Month>
        <Day>2</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>Enhancing IoT Security: A Hybrid Deep Learning-Based Intrusion Detection System Utilizing LSTM, GRU, and Attention Mechanisms with Optimized Hyperparameter Tuning</ArticleTitle>
    <VernacularTitle>Enhancing IoT Security: A Hybrid Deep Learning-Based Intrusion Detection System Utilizing LSTM, GRU, and Attention Mechanisms with Optimized Hyperparameter Tuning</VernacularTitle>
    <FirstPage>189</FirstPage>
    <LastPage>209</LastPage>
    <ELocationID EIdType="doi">10.61882/jist.49180.13.51.189</ELocationID>
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Heshamt</FirstName>
        <LastName>Asadi</LastName>
        <Affiliation>دانشگاه آزاد علوم و تحقیقات</Affiliation>
      </Author>
      <Author>
        <FirstName>Mahmood </FirstName>
        <LastName>Alborzi</LastName>
        <Affiliation>Science and Research branch, Islamic Azad University</Affiliation>
      </Author>
      <Author>
        <FirstName>Hessam </FirstName>
        <LastName>Zandhessami</LastName>
        <Affiliation>Science and Research branch, Islamic Azad University</Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2025</Year>
      <Month>1</Month>
      <Day>11</Day>
    </History>
    <Abstract>&lt;p&gt;Increasing complexity and volume of threats being created and targeted at cybersecurity for the IoTs necessitate the deployment of powerful IDSs. This paper offers an innovative intrusion detection system for IoTs networks based on deep learning. The new IDS employs the Long Short-Term Memory and Gated Recurrent Unit models&amp;rsquo; strengths and an Attention Mechanism. First, the new IDS seeks to enhance the model&amp;rsquo;s ability to determine critical features in a vast amount of data streams and hence improve the ability to find potential cyber threats with high accuracy. The methodological framework used in a simulation and practical experiment setting was intended to recognize the unique nature of IoTs situations. therefore, used a hybrid algorithm optimization strategy, namely Differential Evolution and Harmony Search, to optimize the model due to the extensive hyperparameter space to get the best performance results. The results obtained superior accuracy, precision, recall, and F1 measures reaching 99.87 percent, 99.84 percent, 99.85 percent, and 99.85 percent is better than the performance measures achieved by existing models. Therefore, a deep learning-based hybrid IDS confirmed the research hypothesis that this could provide the necessary and effective cybersecurity for the IoTs. It is vital to note that this paper has contributed to the research topic by showing the potential of advanced neural architectures and strategic optimization tools to address the massive and sophisticated IoTs cybersecurity issues. Future research will be addressing whether these models can be applied in more IoTs settings and whether their real-time efficiency can be improved.&amp;nbsp;&amp;nbsp;&lt;/p&gt;</Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">Intrusion Detection System in Internet of Things</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Attention Mechanism in Deep Learning algorithm</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Differential Evolution</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Harmony Search</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/49180</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>