Main Article Content
Abstract
Intrusion Detection System (IDS) is one of the most significant security elements in today’s information technology-related organizations. For overcoming intrusion detection difficulties, Deep Learning (DL) has shown a significant contribution in recent times. An innovative IDS that merges the Zebra- Falcon Finch algorithm with a Multi-Layer Perceptron Recurrent Neural Network (ZFFinch-MLPNet) classifier is developed in this research. To assure data compatibility and integrity, the developed work initiates with data preprocessing comprising data inspection, handling missing values, and label encoding. Then, to recognize the structure of data, the Exploratory Data Analysis (EDA) combines correlation and visualization analysis. To enhance the intrusion detection efficacy, a Recursive Feature Elimination (RFE) is utilized to select the appropriate features. Finally, the MLPRNN classification approach with the Zebra-Falcon Finch algorithm offers flexibility, opposing overfitting, and improved accuracy. Also, for detecting network anomalies, this work addresses the developed approach’s outcomes in Python software and compares it with modern approaches. It is confirmed that the developed approach detects distinct types of network intrusions and attains better performance in identification with an accuracy of 96.20%, MCC of 92.33%, and ROC of 0.99.
Keywords
Article Details
References
- P. Barnard, N. Marchetti and L. A. DaSilva, “Robust network intrusion detection through explainable artificial intelligence (XAI),” IEEE Networking Letters, vol. 4, no. 3, pp.167-171, 2022. https://doi.org/10.1109/LNET.2022.3186589
- S. Mishra, “An optimized gradient boost decision tree using enhanced African buffalo optimization method for cyber security intrusion detection,” Applied Sciences, vol. 12, no. 24, pp. 12591, 2022. https://doi.org/10.3390/app122412591
- R. Mohammad, F. Saeed, A. A. Almazroi, F. S. Alsubaei and A. A. Almazroi, “Enhancing Intrusion Detection Systems Using a Deep Learning and Data Augmentation Approach,” Systems, vol. 12, no. 3, pp. 79, 2024. https://doi.org/10.3390/systems12030079
- S. A. Bakhsh, M. A. Khan, F. Ahmed, M. S. Alshehri, H. Ali and J. Ahmad, “Enhancing IoT network security through deep learning-powered Intrusion Detection System,” Internet of Things, vol. 24, pp. 100936, 2023. https://doi.org/10.1016/j.iot.2023.100936
- S. More, M. Idrissi, H. Mahmoud and A. T. Asyhari, “Enhanced intrusion detection systems performance with UNSW-NB15 data analysis,” Algorithms, vol. 17, no. 2, pp. 64, 2024. https://doi.org/10.3390/a17020064
- M. A. Khan, A. Rehman, K. M. Khan, M. A. Al Ghamdi and S. H. Almotiri “Enhance intrusion detection in computer networks based on deep extreme learning machine,” Computers, Materials & Continua, vol. 66, no. 1, 2021. http://dx.doi.org/10.32604/cmc.2020.013121
- W. A. Ghanem, S. A. Ghaleb, A. Jantan, A. B. Nasser, S. A. Saleh, A. Ngah, A. C. Alhadi, H. Arshad, A. M. Saad, A. E. Omolara and Y. A. El-Ebiary, “Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural networks,” IEEE Access, vol. 10, pp. 76318-76339, 2022. https://doi.org/10.1109/ACCESS.2022.3192472
- M. Sajid, K. R. Malik, A. Almogren, T. S. Malik, A. H. Khan, J. Tanveer and A. U. Rehman, “Enhancing intrusion detection: a hybrid machine and deep learning approach,” Journal of Cloud Computing, vol. 13, no. 1, pp. 123, 2024. https://doi.org/10.1186/s13677-024-00685-x
- J. M. Valente and S. Maldonado, “SVR-FFS: A novel forward feature selection approach for high-frequency time series forecasting using support vector regression,” Expert Systems with Applications, vol. 160, pp. 113729, 2020. https://doi.org/10.1016/j.eswa.2020.113729
- S. Farahdiba, D. Kartini, R. A. Nugroho, R. Herteno and T. H. Saragih, “Backward elimination for feature selection on breast cancer classification using logistic regression and support vector machine algorithms,” IJCCS (Indonesian Journal of Computing and Cybernetics Systems), vol. 17, no. 4, pp. 429-440, 2023. https://doi.org/10.22146/ijccs.88926
- C. Ioannou and V. Vassiliou, “Network attack classification in IoT using support vector machines,” Journal of sensor and actuator networks, vol. 10, no. 3, pp. 58, 2021. https://doi.org/10.3390/jsan10030058
- N. Zhu, C. Zhu, L. Zhou, Y. Zhu and X. Zhang, “Optimization of the random forest hyperparameters for power industrial control systems intrusion detection using an improved grid search algorithm,” Applied Sciences, vol. 12, no. 20, pp. 10456, 2022. https://doi.org/10.3390/app122010456
- M. Alazab, R. A. Khurma, P. A. Castillo, B. Abu-Salih, A. Martín and D. Camacho, “An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron,” Egyptian Informatics Journal, vol. 25, pp. 100423, 2024. https://doi.org/10.1016/j.eij.2023.100423
- S. Ho, S. Al Jufout, K. Dajani and M. Mozumdar, “A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network,” IEEE Open Journal of the Computer Society, vol. 2, pp. 14-25, 2021. https://doi.org/10.1109/OJCS.2021.3050917
- S. M. Kasongo, “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework,” Computer Communications, vol. 199, pp. 113-125, 2023. https://doi.org/10.1016/j.comcom.2022.12.010
- V. Saravanan, M. Madiajagan, S. M. Rafee, P. Sanju, T. B. Rehman and B. Pattanaik, “IoT-based blockchain intrusion detection using optimized recurrent neural network,” Multimedia Tools and Applications, vol. 83, no. 11, pp. 31505-31526, 2024. https://doi.org/10.1007/s11042-023-16662-6
- R. Chaganti, A. Mourade, V. Ravi, N. Vemprala, A. Dua and B. Bhushan, “A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things,” Sustainability, vol. 14, no. 19, pp. 12828, 2022. https://doi.org/10.3390/su141912828
- M. Nkongolo, J. P. Van Deventer, S. M. Kasongo, S. R. Zahra and J. Kipongo, “A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning,” Electronics, vol. 11, no. 11, pp. 1749, 2022. https://doi.org/10.3390/electronics11111749
- N. kumar Bukka, S. Jagadeesh and K. S. Reddy, “Autoencoder-based Deep Learning Approach for Intrusion Detection System using Firefly Optimization Algorithms,” 2024. https://doi.org/10.21203/rs.3.rs-4076341/v1
- C. Ganguli, S. K. Shandilya, M. Gregus and O. Basystiuk, “Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security,” Computer Systems Science & Engineering, vol. 48, no. 3, 2024. http://dx.doi.org/10.32604/csse.2024.042607
- M. Alazab, R. A. Khurma, P. A. Castillo, B. Abu-Salih, A. Martín and D. Camacho, “An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron,” Egyptian Informatics Journal, vol. 25, pp. 100423, 2024. https://doi.org/10.1016/j.eij.2023.100423
- M. Ahmad, Q. Riaz, M. Zeeshan, H. Tahir, S. A. Haider and M. S. Khan, “Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, pp. 10, 2021. https://doi.org/10.1186/s13638-021-01893-8
- H.M. Alshahrani, “Coll-iot: A collaborative intruder detection system for internet of things devices,” Electronics, vol. 10, pp. 848, 2021. https://doi.org/10.3390/electronics10070848
- H. A. Ahmed, A. Hameed and N. Z. Bawany, “Network intrusion detection using oversampling technique and machine learning algorithms,” PeerJ Computer Science, vol. 8, pp. e820, 2022. https://doi.org/10.7717/peerj-cs.820
- C. Wang, Y. Sun, S. Lv, C. Wang, H. Liu and B. Wang, “Intrusion detection system based on one-class support vector machine and Gaussian mixture model,” Electronics, vol. 12, no. 4, pp. 930, 2023. https://doi.org/10.3390/electronics12040930
- Y. S. Almutairi, B. Alhazmi and A. A. Munshi, “Network intrusion detection using machine learning techniques,” Advances in Science and Technology Research Journal, vol. 16, no. 3, pp. 193-206, 2022. https://doi.org/10.12913/22998624/149934
- M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi and A. Razaque, “Deep recurrent neural network for IoT intrusion detection system, Simulation Modelling Practice and Theory,” 101, 2020. https://doi.org/10.1016/j.simpat.2019.102031
- U. Ahmed, M. Nazir, A. Sarwar, T. Ali, E. H. Aggoune, T. Shahzad and M. A. Khan, “Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering,” Scientific Reports, vol. 15, no. 1 pp. 1726, 2025. https://doi.org/10.1038/s41598-025-85866-7
References
P. Barnard, N. Marchetti and L. A. DaSilva, “Robust network intrusion detection through explainable artificial intelligence (XAI),” IEEE Networking Letters, vol. 4, no. 3, pp.167-171, 2022. https://doi.org/10.1109/LNET.2022.3186589
S. Mishra, “An optimized gradient boost decision tree using enhanced African buffalo optimization method for cyber security intrusion detection,” Applied Sciences, vol. 12, no. 24, pp. 12591, 2022. https://doi.org/10.3390/app122412591
R. Mohammad, F. Saeed, A. A. Almazroi, F. S. Alsubaei and A. A. Almazroi, “Enhancing Intrusion Detection Systems Using a Deep Learning and Data Augmentation Approach,” Systems, vol. 12, no. 3, pp. 79, 2024. https://doi.org/10.3390/systems12030079
S. A. Bakhsh, M. A. Khan, F. Ahmed, M. S. Alshehri, H. Ali and J. Ahmad, “Enhancing IoT network security through deep learning-powered Intrusion Detection System,” Internet of Things, vol. 24, pp. 100936, 2023. https://doi.org/10.1016/j.iot.2023.100936
S. More, M. Idrissi, H. Mahmoud and A. T. Asyhari, “Enhanced intrusion detection systems performance with UNSW-NB15 data analysis,” Algorithms, vol. 17, no. 2, pp. 64, 2024. https://doi.org/10.3390/a17020064
M. A. Khan, A. Rehman, K. M. Khan, M. A. Al Ghamdi and S. H. Almotiri “Enhance intrusion detection in computer networks based on deep extreme learning machine,” Computers, Materials & Continua, vol. 66, no. 1, 2021. http://dx.doi.org/10.32604/cmc.2020.013121
W. A. Ghanem, S. A. Ghaleb, A. Jantan, A. B. Nasser, S. A. Saleh, A. Ngah, A. C. Alhadi, H. Arshad, A. M. Saad, A. E. Omolara and Y. A. El-Ebiary, “Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural networks,” IEEE Access, vol. 10, pp. 76318-76339, 2022. https://doi.org/10.1109/ACCESS.2022.3192472
M. Sajid, K. R. Malik, A. Almogren, T. S. Malik, A. H. Khan, J. Tanveer and A. U. Rehman, “Enhancing intrusion detection: a hybrid machine and deep learning approach,” Journal of Cloud Computing, vol. 13, no. 1, pp. 123, 2024. https://doi.org/10.1186/s13677-024-00685-x
J. M. Valente and S. Maldonado, “SVR-FFS: A novel forward feature selection approach for high-frequency time series forecasting using support vector regression,” Expert Systems with Applications, vol. 160, pp. 113729, 2020. https://doi.org/10.1016/j.eswa.2020.113729
S. Farahdiba, D. Kartini, R. A. Nugroho, R. Herteno and T. H. Saragih, “Backward elimination for feature selection on breast cancer classification using logistic regression and support vector machine algorithms,” IJCCS (Indonesian Journal of Computing and Cybernetics Systems), vol. 17, no. 4, pp. 429-440, 2023. https://doi.org/10.22146/ijccs.88926
C. Ioannou and V. Vassiliou, “Network attack classification in IoT using support vector machines,” Journal of sensor and actuator networks, vol. 10, no. 3, pp. 58, 2021. https://doi.org/10.3390/jsan10030058
N. Zhu, C. Zhu, L. Zhou, Y. Zhu and X. Zhang, “Optimization of the random forest hyperparameters for power industrial control systems intrusion detection using an improved grid search algorithm,” Applied Sciences, vol. 12, no. 20, pp. 10456, 2022. https://doi.org/10.3390/app122010456
M. Alazab, R. A. Khurma, P. A. Castillo, B. Abu-Salih, A. Martín and D. Camacho, “An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron,” Egyptian Informatics Journal, vol. 25, pp. 100423, 2024. https://doi.org/10.1016/j.eij.2023.100423
S. Ho, S. Al Jufout, K. Dajani and M. Mozumdar, “A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network,” IEEE Open Journal of the Computer Society, vol. 2, pp. 14-25, 2021. https://doi.org/10.1109/OJCS.2021.3050917
S. M. Kasongo, “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework,” Computer Communications, vol. 199, pp. 113-125, 2023. https://doi.org/10.1016/j.comcom.2022.12.010
V. Saravanan, M. Madiajagan, S. M. Rafee, P. Sanju, T. B. Rehman and B. Pattanaik, “IoT-based blockchain intrusion detection using optimized recurrent neural network,” Multimedia Tools and Applications, vol. 83, no. 11, pp. 31505-31526, 2024. https://doi.org/10.1007/s11042-023-16662-6
R. Chaganti, A. Mourade, V. Ravi, N. Vemprala, A. Dua and B. Bhushan, “A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things,” Sustainability, vol. 14, no. 19, pp. 12828, 2022. https://doi.org/10.3390/su141912828
M. Nkongolo, J. P. Van Deventer, S. M. Kasongo, S. R. Zahra and J. Kipongo, “A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning,” Electronics, vol. 11, no. 11, pp. 1749, 2022. https://doi.org/10.3390/electronics11111749
N. kumar Bukka, S. Jagadeesh and K. S. Reddy, “Autoencoder-based Deep Learning Approach for Intrusion Detection System using Firefly Optimization Algorithms,” 2024. https://doi.org/10.21203/rs.3.rs-4076341/v1
C. Ganguli, S. K. Shandilya, M. Gregus and O. Basystiuk, “Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security,” Computer Systems Science & Engineering, vol. 48, no. 3, 2024. http://dx.doi.org/10.32604/csse.2024.042607
M. Alazab, R. A. Khurma, P. A. Castillo, B. Abu-Salih, A. Martín and D. Camacho, “An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron,” Egyptian Informatics Journal, vol. 25, pp. 100423, 2024. https://doi.org/10.1016/j.eij.2023.100423
M. Ahmad, Q. Riaz, M. Zeeshan, H. Tahir, S. A. Haider and M. S. Khan, “Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, pp. 10, 2021. https://doi.org/10.1186/s13638-021-01893-8
H.M. Alshahrani, “Coll-iot: A collaborative intruder detection system for internet of things devices,” Electronics, vol. 10, pp. 848, 2021. https://doi.org/10.3390/electronics10070848
H. A. Ahmed, A. Hameed and N. Z. Bawany, “Network intrusion detection using oversampling technique and machine learning algorithms,” PeerJ Computer Science, vol. 8, pp. e820, 2022. https://doi.org/10.7717/peerj-cs.820
C. Wang, Y. Sun, S. Lv, C. Wang, H. Liu and B. Wang, “Intrusion detection system based on one-class support vector machine and Gaussian mixture model,” Electronics, vol. 12, no. 4, pp. 930, 2023. https://doi.org/10.3390/electronics12040930
Y. S. Almutairi, B. Alhazmi and A. A. Munshi, “Network intrusion detection using machine learning techniques,” Advances in Science and Technology Research Journal, vol. 16, no. 3, pp. 193-206, 2022. https://doi.org/10.12913/22998624/149934
M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi and A. Razaque, “Deep recurrent neural network for IoT intrusion detection system, Simulation Modelling Practice and Theory,” 101, 2020. https://doi.org/10.1016/j.simpat.2019.102031
U. Ahmed, M. Nazir, A. Sarwar, T. Ali, E. H. Aggoune, T. Shahzad and M. A. Khan, “Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering,” Scientific Reports, vol. 15, no. 1 pp. 1726, 2025. https://doi.org/10.1038/s41598-025-85866-7