Main Article Content

Abstract

Intrusion Detection System (IDS) is one of the most significant security elements in today’s information technology-related organizations. For overcoming intrusion detection difficulties, Deep Learning (DL) has shown a significant contribution in recent times.  An innovative IDS that merges the Zebra- Falcon Finch algorithm with a Multi-Layer Perceptron Recurrent Neural Network (ZFFinch-MLPNet) classifier is developed in this research. To assure data compatibility and integrity, the developed work initiates with data preprocessing comprising data inspection, handling missing values, and label encoding. Then, to recognize the structure of data, the Exploratory Data Analysis (EDA) combines correlation and visualization analysis. To enhance the intrusion detection efficacy, a Recursive Feature Elimination (RFE) is utilized to select the appropriate features. Finally, the MLPRNN classification approach with the Zebra-Falcon Finch algorithm offers flexibility, opposing overfitting, and improved accuracy. Also, for detecting network anomalies, this work addresses the developed approach’s outcomes in Python software and compares it with modern approaches. It is confirmed that the developed approach detects distinct types of network intrusions and attains better performance in identification with an accuracy of 96.20%, MCC of 92.33%, and ROC of 0.99.

Keywords

Intrusion detection system Cyber security Exploratory data analysis Recursive feature elimination MLPRNN classification Zebra-Falcon finch algorithm

Article Details

How to Cite
Budagam, D. K. (2025). An innovative ZFFinch-MLPNet architecture for improving cyber intrusion prediction efficiency and accuracy. Future Technology, 4(2), 41–50. Retrieved from https://fupubco.com/futech/article/view/286
Bookmark and Share

References

  1. P. Barnard, N. Marchetti and L. A. DaSilva, “Robust network intrusion detection through explainable artificial intelligence (XAI),” IEEE Networking Letters, vol. 4, no. 3, pp.167-171, 2022. https://doi.org/10.1109/LNET.2022.3186589
  2. S. Mishra, “An optimized gradient boost decision tree using enhanced African buffalo optimization method for cyber security intrusion detection,” Applied Sciences, vol. 12, no. 24, pp. 12591, 2022. https://doi.org/10.3390/app122412591
  3. R. Mohammad, F. Saeed, A. A. Almazroi, F. S. Alsubaei and A. A. Almazroi, “Enhancing Intrusion Detection Systems Using a Deep Learning and Data Augmentation Approach,” Systems, vol. 12, no. 3, pp. 79, 2024. https://doi.org/10.3390/systems12030079
  4. S. A. Bakhsh, M. A. Khan, F. Ahmed, M. S. Alshehri, H. Ali and J. Ahmad, “Enhancing IoT network security through deep learning-powered Intrusion Detection System,” Internet of Things, vol. 24, pp. 100936, 2023. https://doi.org/10.1016/j.iot.2023.100936
  5. S. More, M. Idrissi, H. Mahmoud and A. T. Asyhari, “Enhanced intrusion detection systems performance with UNSW-NB15 data analysis,” Algorithms, vol. 17, no. 2, pp. 64, 2024. https://doi.org/10.3390/a17020064
  6. M. A. Khan, A. Rehman, K. M. Khan, M. A. Al Ghamdi and S. H. Almotiri “Enhance intrusion detection in computer networks based on deep extreme learning machine,” Computers, Materials & Continua, vol. 66, no. 1, 2021. http://dx.doi.org/10.32604/cmc.2020.013121
  7. W. A. Ghanem, S. A. Ghaleb, A. Jantan, A. B. Nasser, S. A. Saleh, A. Ngah, A. C. Alhadi, H. Arshad, A. M. Saad, A. E. Omolara and Y. A. El-Ebiary, “Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural networks,” IEEE Access, vol. 10, pp. 76318-76339, 2022. https://doi.org/10.1109/ACCESS.2022.3192472
  8. M. Sajid, K. R. Malik, A. Almogren, T. S. Malik, A. H. Khan, J. Tanveer and A. U. Rehman, “Enhancing intrusion detection: a hybrid machine and deep learning approach,” Journal of Cloud Computing, vol. 13, no. 1, pp. 123, 2024. https://doi.org/10.1186/s13677-024-00685-x
  9. J. M. Valente and S. Maldonado, “SVR-FFS: A novel forward feature selection approach for high-frequency time series forecasting using support vector regression,” Expert Systems with Applications, vol. 160, pp. 113729, 2020. https://doi.org/10.1016/j.eswa.2020.113729
  10. S. Farahdiba, D. Kartini, R. A. Nugroho, R. Herteno and T. H. Saragih, “Backward elimination for feature selection on breast cancer classification using logistic regression and support vector machine algorithms,” IJCCS (Indonesian Journal of Computing and Cybernetics Systems), vol. 17, no. 4, pp. 429-440, 2023. https://doi.org/10.22146/ijccs.88926
  11. C. Ioannou and V. Vassiliou, “Network attack classification in IoT using support vector machines,” Journal of sensor and actuator networks, vol. 10, no. 3, pp. 58, 2021. https://doi.org/10.3390/jsan10030058
  12. N. Zhu, C. Zhu, L. Zhou, Y. Zhu and X. Zhang, “Optimization of the random forest hyperparameters for power industrial control systems intrusion detection using an improved grid search algorithm,” Applied Sciences, vol. 12, no. 20, pp. 10456, 2022. https://doi.org/10.3390/app122010456
  13. M. Alazab, R. A. Khurma, P. A. Castillo, B. Abu-Salih, A. Martín and D. Camacho, “An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron,” Egyptian Informatics Journal, vol. 25, pp. 100423, 2024. https://doi.org/10.1016/j.eij.2023.100423
  14. S. Ho, S. Al Jufout, K. Dajani and M. Mozumdar, “A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network,” IEEE Open Journal of the Computer Society, vol. 2, pp. 14-25, 2021. https://doi.org/10.1109/OJCS.2021.3050917
  15. S. M. Kasongo, “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework,” Computer Communications, vol. 199, pp. 113-125, 2023. https://doi.org/10.1016/j.comcom.2022.12.010
  16. V. Saravanan, M. Madiajagan, S. M. Rafee, P. Sanju, T. B. Rehman and B. Pattanaik, “IoT-based blockchain intrusion detection using optimized recurrent neural network,” Multimedia Tools and Applications, vol. 83, no. 11, pp. 31505-31526, 2024. https://doi.org/10.1007/s11042-023-16662-6
  17. R. Chaganti, A. Mourade, V. Ravi, N. Vemprala, A. Dua and B. Bhushan, “A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things,” Sustainability, vol. 14, no. 19, pp. 12828, 2022. https://doi.org/10.3390/su141912828
  18. M. Nkongolo, J. P. Van Deventer, S. M. Kasongo, S. R. Zahra and J. Kipongo, “A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning,” Electronics, vol. 11, no. 11, pp. 1749, 2022. https://doi.org/10.3390/electronics11111749
  19. N. kumar Bukka, S. Jagadeesh and K. S. Reddy, “Autoencoder-based Deep Learning Approach for Intrusion Detection System using Firefly Optimization Algorithms,” 2024. https://doi.org/10.21203/rs.3.rs-4076341/v1
  20. C. Ganguli, S. K. Shandilya, M. Gregus and O. Basystiuk, “Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security,” Computer Systems Science & Engineering, vol. 48, no. 3, 2024. http://dx.doi.org/10.32604/csse.2024.042607
  21. M. Alazab, R. A. Khurma, P. A. Castillo, B. Abu-Salih, A. Martín and D. Camacho, “An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron,” Egyptian Informatics Journal, vol. 25, pp. 100423, 2024. https://doi.org/10.1016/j.eij.2023.100423
  22. M. Ahmad, Q. Riaz, M. Zeeshan, H. Tahir, S. A. Haider and M. S. Khan, “Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, pp. 10, 2021. https://doi.org/10.1186/s13638-021-01893-8
  23. H.M. Alshahrani, “Coll-iot: A collaborative intruder detection system for internet of things devices,” Electronics, vol. 10, pp. 848, 2021. https://doi.org/10.3390/electronics10070848
  24. H. A. Ahmed, A. Hameed and N. Z. Bawany, “Network intrusion detection using oversampling technique and machine learning algorithms,” PeerJ Computer Science, vol. 8, pp. e820, 2022. https://doi.org/10.7717/peerj-cs.820
  25. C. Wang, Y. Sun, S. Lv, C. Wang, H. Liu and B. Wang, “Intrusion detection system based on one-class support vector machine and Gaussian mixture model,” Electronics, vol. 12, no. 4, pp. 930, 2023. https://doi.org/10.3390/electronics12040930
  26. Y. S. Almutairi, B. Alhazmi and A. A. Munshi, “Network intrusion detection using machine learning techniques,” Advances in Science and Technology Research Journal, vol. 16, no. 3, pp. 193-206, 2022. https://doi.org/10.12913/22998624/149934
  27. M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi and A. Razaque, “Deep recurrent neural network for IoT intrusion detection system, Simulation Modelling Practice and Theory,” 101, 2020. https://doi.org/10.1016/j.simpat.2019.102031
  28. U. Ahmed, M. Nazir, A. Sarwar, T. Ali, E. H. Aggoune, T. Shahzad and M. A. Khan, “Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering,” Scientific Reports, vol. 15, no. 1 pp. 1726, 2025. https://doi.org/10.1038/s41598-025-85866-7