A Review of the perspective on the implementation of evolutionary algorithms in cyber security on IoT infrastructure
DOI:
https://doi.org/10.61467/2007.1558.2025.v16i4.1023Keywords:
cybersecurity, Internet of Things, IIoT, Optimization, Evolutionary AlgorithmAbstract
The rapid growth of the Internet of Things (IoT) in industrial environments has increased efficiency but also heightened vulnerability to sophisticated cyber-attacks. Traditional cyber security approaches are insufficient to protect critical infrastructure, creating a need for dynamic, adaptive solutions. Evolutionary algorithms (EAs), owing to their ability to explore large search spaces and optimise parameters, offer a promising route to enhancing IoT security. This review highlights the integration of EAs with deep-learning techniques to improve intrusion detection and system resilience. Building on this background, we propose an adaptive cyber-security framework that leverages evolutionary optimisation and continual learning to detect, prevent and mitigate attacks in real time. The study emphasises the importance of validating hybrid models in real-world settings and of optimising computational efficiency. Future work should investigate autonomous response mechanisms and the scalability of solutions for large-scale Industrial IoT (IIoT) deployments, ensuring robust protection against emerging threats and aligning academic advances with industry needs.
Smart citations: https://scite.ai/reports/10.61467/2007.1558.2025.v16i4.1023
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Combinatorial Optimization Problems and Informatics

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.