Unbalanced Traffic Intrusion Detection Using Advanced Deep Learning Techniques

M Srilakshmi PreethiDept. of Computer Science & Engineering (Cybersecurity), Madanapalle Institute of Technology & Science, Madanapalle, IndiaNeeraj Kumar UppuDept. of Computer Science & Engineering (Cybersecurity), Madanapalle Institute of Technology & Science, Madanapalle, IndiaK Naveen KumarDept. of Computer Science & Engineering (Cybersecurity), Madanapalle Institute of Technology & Science, Madanapalle, India

Vol 9 No 25 (2025): Volume 9, Special Issue of INSPIRE’25 April 2025 | Pages: 377-382

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 24-04-2025

doi Logo doi.org/10.47001/IRJIET/2025.INSPIRE61

Abstract

The work attempts a deep learning-based approach unbalanced network traffic intrusion detection, applying AE, DBN networks, and SNN models. The proposed system will efficiently extract features from raw network traffic data by employing AE. For the better analysis of temporal dependencies in the sequence of traffic data, the work will make use of DBN and SNN models for increasing the accuracy in intrusion detection. Malicious intrusions that disturb normal traffic flow are identified by the model through the analysis of network traffic patterns. Network traffic datasets are used to train the model with many different kinds of traffic behavior patterns. Performance was again checked using accuracy, precision, and recall metrics, which determine how well the model would detect the varying traffic intrusions and classify them aptly. This method provides a critical solution toward network security in real-time applications since it addresses the ever-increasing problem of cyber-attacks on network infrastructures.

Keywords

Network traffic, Intrusion detection, Deep learning, AE, DBN, SNN, Security, Temporal dependencies, Real-time applications


Citation of this Article

M Srilakshmi Preethi, Neeraj Kumar Uppu, & K Naveen Kumar. (2025). Unbalanced Traffic Intrusion Detection Using Advanced Deep Learning Techniques. In proceeding of International Conference on Sustainable Practices and Innovations in Research and Engineering (INSPIRE'25), published by IRJIET, Volume 9, Special Issue of INSPIRE’25, pp 377-382. Article DOI https://doi.org/10.47001/IRJIET/2025.INSPIRE61

References
  1. A.H. Nasreen Fathima, S. P. S. Ibrahim and A. Khraisat, "Enhancing Network Traffic Anomaly Detection: Leveraging Temporal Correlation Index in a Hybrid Framework," in IEEE Access, vol. 12, pp. 136805- 136824, 2024, doi: 10.1109/ACCESS.2024.3458903.
  2. Pavithra, S., and K. Venkata Vikas. "Detecting Unbalanced Network Traffic Intrusions with Deep Learning." IEEE Access (2024).
  3. E. -U. -H. Qazi, T. Zia, M. Hamza Faheem, K. Shahzad, M. Imran and Z. Ahmed, "Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning," in IEEE Access, vol. 12, pp. 141625-141638, 2024, doi: 10.1109/ACCESS.2024.3466470.
  4. Z. Ali, W. Tiberti, A. Marotta and D. Cassioli, "Empowering Network Security: BERT Transformer Learning Approach and MLP for Intrusion Detection in Imbalanced Network Traffic," in IEEE Access, vol. 12, pp. 137618-137633, 2024, doi: 10.1109/ACCESS.2024.3465045.
  5. D. Herzalla, W. T. Lunardi and M. Andreoni, "TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection," in IEEE Access, vol. 11, pp. 118577-118594, 2023, doi: 10.1109/ACCESS.2023.3319213.
  6. H. Yu, C. Kang, Y. Xiao and Y. Yang, "Network Intrusion Detection Method Based on Hybrid Improved Residual Network Blocks and Bidirectional Gated Recurrent Units," in IEEE Access, vol. 11, pp. 68961- 68971, 2023, doi: 10.1109/ACCESS.2023.3271866.
  7. K. Miyamoto, M. Iida, C. Han, T. Ban, T. Takahashi and J. Takeuchi, "Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach," in IEEE Access, vol. 11, pp. 132792-132810, 2023, doi: 10.1109/ACCESS.2023.3335600.
  8. C. Park, J. Lee, Y. Kim, J. -G. Park, H. Kim and D. Hong, "An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks," in IEEE Internet of Things Journal, vol. 10, no. 3, pp. 2330-2345, 1 Feb.1, 2023, doi: 10.1109/JIOT.2022.3211346.
  9. P. Barnard, N. Marchetti and L. A. DaSilva, "Robust Network Intrusion Detection Through Explainable Artificial Intelligence (XAI)," in IEEE Networking Letters, vol. 4, no. 3, pp. 167-171, Sept. 2022, doi: 10.1109/LNET.2022.3186589.
  10. T. Zhukabayeva, A. Pervez, Y. Mardenov, M. Othman, N. Karabayev and Z. Ahmad, "A Traffic Analysis and Node Categorization- Aware Machine Learning-Integrated Framework for Cybersecurity Intrusion Detection and Prevention of WSNs in Smart Grids," in IEEE Access, vol. 12, pp. 91715-91733, 2024, doi: 10.1109/ACCESS.2024.3422077.
  11. Y. Kim, J. Kim and D. Kim, "Hi-MLIC: Hierarchical Multilayer Lightweight Intrusion Classification for Various Intrusion Scenarios," in IEEE Access, vol. 12, pp. 120098-120115, 2024, doi: 10.1109/ACCESS.2024.3450671.
  12. M. Seufert et al., "Marina: Realizing ML-Driven Real-Time Network Traffic Monitoring at Terabit Scale," in IEEE Transactions on Network and Service Management, vol. 21, no. 3, pp. 2773-2790, June 2024, doi: 10.1109/TNSM.2024.3382393.
  13. J. Buzzio-García et al., "Exploring Traffic Patterns through Network Programmability: Introducing SDNFLow, a Comprehensive OpenFlow- Based Statistics Dataset for Attack Detection," in IEEE Access, vol. 12, pp. 42163-42180, 2024, doi: 10.1109/ACCESS.2024.3378271.