A Strong Network Security Framework Utilizing a Dual-Layered and Hybrid Model Integrated with Machine Learning

Abstract

In an era of escalating cyber threats, having effective network security is vital for preserving sensitive data and digital assets. In order to improve threat identification and mitigation, this study suggests a robust network security framework that uses a dual- layered, hybrid model combined with machine learning. The framework uses machine learning algorithms to continuously adjust to changing attack patterns by combining signature-based and anomaly- based intrusion detection techniques. By combining deep packet inspection and perimeter defense mechanisms, the dual-layered strategy improves security and provides complete defense against known and undiscovered threats. Additionally, the hybrid approach reduces false positives and increases threat classification accuracy by combining sophisticated AI-driven analytics with rule-based heuristics. Results from experiments show how well this framework works to identify cyberthreats with high accuracy Through the presentation of an intelligent, flexible, and robust security architecture, this study advances network security.

Country : India

1 K P Manikandan2 Tiruthani Govardhan3 Puram Narasimhulu

  1. Assistant Professor, Department of CSE (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle, Andhra Pradesh 517325, India
  2. Department of CSE (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle, Andhra Pradesh 517325, India
  3. Department of CSE (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle, Andhra Pradesh 517325, India

IRJIET, Volume 9, Special Issue of INSPIRE’25 April 2025 pp. 233-237

doi.org/10.47001/IRJIET/2025.INSPIRE37

References

  1. CHI MAI KIM HO1, KIN-CHOONG YOW ZHONGWEN ZHU “Network Intrusion Detection via Flow-to-Image Conversion and Vision Transformer Classification” in IEEE, 18 August 2022, DOI: 10.1109/ACCESS.2022.3200034.
  2. JUMABEKALIKHANOV, MOHAMMEDABUHAMAD:” Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches”, IEEE Access, 23 December 2021,10.1109/ACCESS.2021.3137318.
  3. Swati Paliwal, Ravindra Gupta, “Denial-of- Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm” , International Journal of Computer Applications (0975 – 8887) Volume 60– No.19, December 2012.
  4. A.Rouari, A. Moussaoui, Y. Chahir, H. T. Rauf, and S. Kadry, Deep CNN-based autonomous system for safety measures in logistics transportation, Soft Comput., vol. 25, pp. 14337479, Jun. 2021.
  5. A.Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, Toward devel oping a systematic approach to generate benchmark datasets for intrusion detection, Comput. Secur., vol. 31, no. 3, pp. 357374, May 2012, doi: 10.1016/j.cose.2011.12.012.
  6. Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, and K. Dai, An ef cient intrusion detection system based on support vector machines and gradually feature removal method, Expert Syst. Appl., vol. 39, no. 1, pp. 424430, 2012.
  7. A.R. Jakhale, G.A. Patil, “Anomaly Detection System by Mining Frequent Pattern using Data Mining Algorithm from Network Flow”, “International Journal of Engineering Research and Technology”, Vol. 3, No.1, January 2014, ISSN. 2278-0181.
  8. C. Science and K. Mangalore, “A Two-tier Network based Intrusion Detection System Architecture using Machine Learning Approach,” “International Journal on Recent and Innovation Trends in Computing and Communication” Vol. 7, No. 6, pp. 42–47, 2016.
  9. M.Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, A detailed analysis of the KDD CUP99data set, in Proc. IEEE Symp. Comput. Intell. Secur. Defense Appl., Jul. 2009, pp. 16.
  10. Y. LeCun, Y. Bengio, and G. Hinton, Deep learning, Nature, vol. 521, no. 7553, pp. 436444, May 2015.
  11. M. D. Natale, H. Zeng, P. Giusto, and A. Ghosal, Understanding and Using the Controller Area Network Communication Protocol: Theory and Practice. Springer, 2012.
  12. C.Miller and C. Valasek, Adventures in automotive networks and control units, in Proc. DEF CON, 2013.
  13. J. R. Quinlan, C4.5: Programs for Machine Learning. San Mateo, CA, USA: Morgan Kaufmann, 1993.
  14. I.Goodfellow, Y. Bengio, and A. Courville, Deep Learning. Cambridge, 723 MA, USA: MIT Press, 2016.
  15. Anahita Golrang, Alale Mohammadi Golrang, Sule Yoldirim Yayilgan, “A Novel Hybrid IDS Based on Modified NSGAII-ANN and Random Forest” in ResearchGate, March 2020, DOI:10.3390/electronics9040577.