A Strong Network Security Framework Utilizing a Dual-Layered and Hybrid Model Integrated with Machine Learning

K P ManikandanAssistant Professor, Department of CSE (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle, Andhra Pradesh 517325, IndiaTiruthani GovardhanDepartment of CSE (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle, Andhra Pradesh 517325, IndiaPuram NarasimhuluDepartment of CSE (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle, Andhra Pradesh 517325, India

Vol 9 No 25 (2025): Volume 9, Special Issue of INSPIRE’25 April 2025 | Pages: 233-237

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 24-04-2025

doi Logo doi.org/10.47001/IRJIET/2025.INSPIRE37

Abstract

In an era of escalating cyber threats, having effective network security is vital for preserving sensitive data and digital assets. In order to improve threat identification and mitigation, this study suggests a robust network security framework that uses a dual- layered, hybrid model combined with machine learning. The framework uses machine learning algorithms to continuously adjust to changing attack patterns by combining signature-based and anomaly- based intrusion detection techniques. By combining deep packet inspection and perimeter defense mechanisms, the dual-layered strategy improves security and provides complete defense against known and undiscovered threats. Additionally, the hybrid approach reduces false positives and increases threat classification accuracy by combining sophisticated AI-driven analytics with rule-based heuristics. Results from experiments show how well this framework works to identify cyberthreats with high accuracy Through the presentation of an intelligent, flexible, and robust security architecture, this study advances network security.

Keywords

Random Forest, Linear SVM, KNeighbors Classifier, Gradient Boosting, Multi Layer Perceptron, Logistic Regression


Citation of this Article

K P Manikandan, Tiruthani Govardhan, & Puram Narasimhulu. (2025). A Strong Network Security Framework Utilizing a Dual-Layered and Hybrid Model Integrated with Machine Learning. In proceeding of International Conference on Sustainable Practices and Innovations in Research and Engineering (INSPIRE'25), published by IRJIET, Volume 9, Special Issue of INSPIRE’25, pp 233-237. Article DOI https://doi.org/10.47001/IRJIET/2025.INSPIRE37

References
  1. CHI MAI KIM HO1, KIN-CHOONG YOW ZHONGWEN ZHU “Network Intrusion Detection via Flow-to-Image Conversion and Vision Transformer Classification” in IEEE, 18 August 2022, DOI: 10.1109/ACCESS.2022.3200034.
  2. JUMABEKALIKHANOV, MOHAMMEDABUHAMAD:” Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches”, IEEE Access, 23 December 2021,10.1109/ACCESS.2021.3137318.
  3. Swati Paliwal, Ravindra Gupta, “Denial-of- Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm” , International Journal of Computer Applications (0975 – 8887) Volume 60– No.19, December 2012.
  4. A.Rouari, A. Moussaoui, Y. Chahir, H. T. Rauf, and S. Kadry, Deep CNN-based autonomous system for safety measures in logistics transportation, Soft Comput., vol. 25, pp. 14337479, Jun. 2021.
  5. A.Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, Toward devel oping a systematic approach to generate benchmark datasets for intrusion detection, Comput. Secur., vol. 31, no. 3, pp. 357374, May 2012, doi: 10.1016/j.cose.2011.12.012.
  6. Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, and K. Dai, An ef cient intrusion detection system based on support vector machines and gradually feature removal method, Expert Syst. Appl., vol. 39, no. 1, pp. 424430, 2012.
  7. A.R. Jakhale, G.A. Patil, “Anomaly Detection System by Mining Frequent Pattern using Data Mining Algorithm from Network Flow”, “International Journal of Engineering Research and Technology”, Vol. 3, No.1, January 2014, ISSN. 2278-0181.
  8. C. Science and K. Mangalore, “A Two-tier Network based Intrusion Detection System Architecture using Machine Learning Approach,” “International Journal on Recent and Innovation Trends in Computing and Communication” Vol. 7, No. 6, pp. 42–47, 2016.
  9. M.Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, A detailed analysis of the KDD CUP99data set, in Proc. IEEE Symp. Comput. Intell. Secur. Defense Appl., Jul. 2009, pp. 16.
  10. Y. LeCun, Y. Bengio, and G. Hinton, Deep learning, Nature, vol. 521, no. 7553, pp. 436444, May 2015.
  11. M. D. Natale, H. Zeng, P. Giusto, and A. Ghosal, Understanding and Using the Controller Area Network Communication Protocol: Theory and Practice. Springer, 2012.
  12. C.Miller and C. Valasek, Adventures in automotive networks and control units, in Proc. DEF CON, 2013.
  13. J. R. Quinlan, C4.5: Programs for Machine Learning. San Mateo, CA, USA: Morgan Kaufmann, 1993.
  14. I.Goodfellow, Y. Bengio, and A. Courville, Deep Learning. Cambridge, 723 MA, USA: MIT Press, 2016.
  15. Anahita Golrang, Alale Mohammadi Golrang, Sule Yoldirim Yayilgan, “A Novel Hybrid IDS Based on Modified NSGAII-ANN and Random Forest” in ResearchGate, March 2020, DOI:10.3390/electronics9040577.