Optimized Machine Learning-Based ANN Framework for Secure Network Intrusion Detection
DOI:
https://doi.org/10.32628/CSEIT26121323Keywords:
Artificial Neural Network (ANN), Network Intrusion Detection, Cybersecurity, Intrusion Detection System (IDS), Machine Learning, Network Security, Anomaly Detection, Cyber Attack Detection, Intelligent Security Systems, Deep Learning in SecurityAbstract
The rapid expansion of internet-based services, cloud computing, and interconnected digital infrastructures has significantly increased the vulnerability of modern networks to cyberattacks. Conventional intrusion detection systems (IDS) primarily rely on signature-based detection methods, which often fail to identify emerging or previously unseen attack patterns. To address these limitations, this study proposes an intelligent Artificial Neural Network (ANN)-based network intrusion detection system designed to enhance cybersecurity monitoring and improve detection accuracy. The proposed framework utilizes the pattern learning capability of neural networks to analyze network traffic and classify activities as normal or malicious. The system incorporates several stages including dataset acquisition, data preprocessing, feature encoding, normalization, and feature selection to improve data quality and reduce redundancy. A multilayer feedforward neural network architecture is implemented and trained using benchmark intrusion detection datasets containing multiple attack categories such as Denial-of-Service (DoS), Probe, Remote-to-Local (R2L), and User-to-Root (U2R) attacks. Experimental evaluation demonstrates that the proposed ANN model achieves 97.6% detection accuracy, with high precision and recall while maintaining a low false positive rate. Comparative analysis further shows that the ANN-based approach outperforms traditional machine learning algorithms such as Decision Trees, Support Vector Machines, and Random Forest classifiers. The results highlight the effectiveness of neural network-based approaches for detecting complex intrusion patterns and improving real-time network security in modern computing environments including cloud systems and Internet of Things (IoT) networks.
Downloads
References
D. E. Denning, “An intrusion-detection model,” IEEE Trans. Software Engineering, vol. SE-13, no. 2, pp. 222–232, Feb. 1987, doi: 10.1109/TSE.1987.232894. DOI: https://doi.org/10.1109/TSE.1987.232894
S. Axelsson, “Intrusion detection systems: A survey and taxonomy,” Chalmers Univ. Technology, Technical Report 99-15, 2000. (No DOI available).
W. Lee and S. J. Stolfo, “A framework for constructing features and models for intrusion detection systems,” ACM Trans. Information and System Security, vol. 3, no. 4, pp. 227–261, 2000, doi: 10.1145/382912.382914. DOI: https://doi.org/10.1145/382912.382914
R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” in Proc. IEEE Symp. Security and Privacy, 2010, pp. 305–316, doi: 10.1109/SP.2010.25. DOI: https://doi.org/10.1109/SP.2010.25
S. S. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016, doi: 10.1109/COMST.2015.2494502. DOI: https://doi.org/10.1109/COMST.2015.2494502
I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning. Cambridge, MA, USA: MIT Press, 2016. (No DOI available).
Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, pp. 436–444, 2015, doi: 10.1038/nature14539. DOI: https://doi.org/10.1038/nature14539
C. M. Bishop, Pattern Recognition and Machine Learning. New York, NY, USA: Springer, 2006. (No DOI available).
T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning, 2nd ed. New York, NY, USA: Springer, 2009, doi: 10.1007/978-0-387-84858-7. DOI: https://doi.org/10.1007/978-0-387-84858-7
A. Alharbi et al., “Selection of data analytic techniques by using fuzzy AHP–TOPSIS from a healthcare perspective,” BMC Medical Informatics and Decision Making, vol. 24, no. 1, 2024, doi: 10.1186/s12911-024-02438-4. DOI: https://doi.org/10.1186/s12911-024-02651-8
A. Alharbi et al., “Novel 59-layer dense inception network for robust deepfake identification,” Scientific Reports, vol. 15, no. 1, 2025, doi: 10.1038/s41598-025-XXXXX. DOI: https://doi.org/10.1038/s41598-025-03889-6
O. Samuel, N. Javaid, T. A. Alghamdi, and N. Kumar, “Towards sustainable smart cities: A secure and scalable trading system for residential homes using blockchain and artificial intelligence,” Sustainable Cities and Society, vol. 76, 2022, doi: 10.1016/j.scs.2021.103431. DOI: https://doi.org/10.1016/j.scs.2021.103371
F. Kirmani, B. J. Lane, and J. R. Rose, “Exploring machine learning techniques to improve peptide identification,” in Proc. IEEE Int. Conf. Bioinformatics and Bioengineering, 2019, doi: 10.1109/BIBE.2019.00123. DOI: https://doi.org/10.1109/BIBE.2019.00021
F. Kirmani, B. Lane, and J. Rose, “Identifying proteotypic peptides via deep learning,” in Proc. Int. Conf. Bioinformatics Research and Applications, 2025. (DOI pending). DOI: https://doi.org/10.1145/3700666.3700691
F. Kirmani et al., “Detecting polar ring galaxies via deep learning,” RAS Techniques and Instruments, 2025, doi: 10.1093/rasti/rzaeXXX. DOI: https://doi.org/10.1093/rasti/rzaf043
S. Kirmani and P. Raghavan, “Scalable parallel graph partitioning,” in Proc. SC ’13: Int. Conf. High Performance Computing, Networking, Storage and Analysis, 2013, pp. 1–10, doi: 10.1145/2503210.2503280. DOI: https://doi.org/10.1145/2503210.2503280
S. Kirmani, J. Park, and P. Raghavan, “An embedded sectioning scheme for multiprocessor topology-aware mapping of irregular applications,” International Journal of High Performance Computing Applications, vol. 31, no. 5, pp. 436–449, 2017, doi: 10.1177/1094342015624890. DOI: https://doi.org/10.1177/1094342015597082
S. Kirmani, H. Sun, and P. Raghavan, “A scalability and sensitivity study of parallel geometric algorithms for graph partitioning,” in Proc. IEEE Int. Symp. Computer Architecture and High Performance Computing (SBAC-PAD), 2018, doi: 10.1109/CAHPC.2018.8645901. DOI: https://doi.org/10.1109/CAHPC.2018.8645916
S. Kirmani and K. Madduri, “Spectral graph drawing: Building blocks and performance analysis,” in Proc. IEEE Int. Parallel and Distributed Processing Symposium Workshops (IPDPSW), 2018, doi: 10.1109/IPDPSW.2018.00120. DOI: https://doi.org/10.1109/IPDPSW.2018.00053
A. Mishra, S. Kirmani, and K. Madduri, “Fast spectral graph layout on multicore platforms,” 2020.. DOI: https://doi.org/10.1145/3404397.3404471
J. Tyler, J. Pastor, M. N. Huhns, S. Kirmani, and H. Du, “Exposing, formalizing and reasoning over the latent semantics of tags in multimodal data sources,” Applied Ontology, vol. 8, no. 2, pp. 111–132, 2013, doi: 10.3233/AO-130130. DOI: https://doi.org/10.3233/AO-130124
S. Kirmani and M. Shankar, “Generating keywords by associative context with input words,” Google Patents, 2022. (Patent – No DOI).
Kataria, B., & Jethva, H. B. (2024). Decentralized security mechanisms for AI-driven wireless networks: Integrating blockchain and federated learning. International Journal of Scientific Research in Science, Engineering and Technology, 11(5), 342–352. https://doi.org/10.32628/IJSRSET24105474 DOI: https://doi.org/10.32628/IJSRSET24105474
A. Attaallah et al., “Prediction of COVID-19 pandemic spread in Kingdom of Saudi Arabia,” Computer Systems Science and Engineering, vol. 38, no. 2, pp. 253–264, 2021, doi: 10.32604/csse.2021.016022.
A. Hakami et al., “Clinical characteristics and early outcomes of hospitalized COVID-19 patients with end-stage kidney disease in Saudi Arabia,” International Journal of General Medicine, vol. 14, pp. 2061–2070, 2021, doi: 10.2147/IJGM.S309172. DOI: https://doi.org/10.2147/IJGM.S327186
F. Alassery et al., “Quantitative evaluation of mental-health in type-2 diabetes patients through computational model,” Intelligent Automation & Soft Computing, vol. 32, no. 3, pp. 1867–1880, 2022, doi: 10.32604/iasc.2022.021311. DOI: https://doi.org/10.32604/iasc.2022.023314
H. Hodo, X. Bellekens, A. Hamilton, P. Dubouilh, and E. Iorkyase, “Threat analysis of IoT networks using artificial neural networks,” arXiv preprint arXiv:1704.02286, 2017, doi: 10.48550/arXiv.1704.02286. DOI: https://doi.org/10.1109/ISNCC.2016.7746067
J. Kim, J. Kim, H. L. T. Thu, and H. Kim, “Long short term memory recurrent neural network classifier for intrusion detection,” in Proc. Int. Conf. Platform Technology and Service (PlatCon), 2016, doi: 10.1109/PlatCon.2016.7456805. DOI: https://doi.org/10.1109/PlatCon.2016.7456805
N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A deep learning approach to network intrusion detection,” IEEE Trans. Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41–50, 2018, doi: 10.1109/TETCI.2017.2772792. DOI: https://doi.org/10.1109/TETCI.2017.2772792
A. Javaid, Q. Niyaz, W. Sun, and M. Alam, “A deep learning approach for network intrusion detection system,” in Proc. 9th EAI Int. Conf. Bio-inspired Information and Communications Technologies, 2016, doi: 10.4108/eai.3-12-2015.2262516. DOI: https://doi.org/10.4108/eai.3-12-2015.2262516
N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems,” in Military Communications and Information Systems Conference (MilCIS), 2015, doi: 10.1109/MilCIS.2015.7348942. DOI: https://doi.org/10.1109/MilCIS.2015.7348942
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 dataset,” in IEEE Symp. Computational Intelligence for Security and Defense Applications, 2009, doi: 10.1109/CISDA.2009.5356528. DOI: https://doi.org/10.1109/CISDA.2009.5356528
K. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (IDPS),” NIST Special Publication 800-94, 2007, doi: 10.6028/NIST.SP.800-94. DOI: https://doi.org/10.6028/NIST.SP.800-94
M. Roesch, “Snort: Lightweight intrusion detection for networks,” in Proc. USENIX Conf. System Administration (LISA), 1999.
Kusuma, Kranthi Kiran. (2025). Advanced Benchmarking and Certification Strategies For 5G And LTE Networks. International Research Journal on Advanced Engineering Hub (IRJAEH). 3. 3340-3347. 10.47392/IRJAEH.2025.0491. DOI: https://doi.org/10.47392/IRJAEH.2025.0491
FNU Pawan Kumar. Agile methodology and test-driven development for large-scale cloud software projects. World Journal of Advanced Engineering Technology and Sciences, 2025, 15(01), 2525–2533. Article DOI: https://doi.org/10.30574/wjaets.2025.15.1.0316. DOI: https://doi.org/10.30574/wjaets.2025.15.1.0316
Mishra, Chandan. (2025). Enhancing ERP Efficiency: Optimizing Peoplesoft Financial Workflows with Robotic Process Automation (RPA). International Research Journal on Advanced Engineering Hub (IRJAEH). 3. 3348-3354. 10.47392/IRJAEH.2025.0492. DOI: https://doi.org/10.47392/IRJAEH.2025.0492
Downloads
Published
Issue
Section
License
Copyright (c) 2026 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.