Unbalanced Traffic Intrusion Detection Using Advanced Deep Learning Techniques

Abstract

The work attempts a deep learning-based approach unbalanced network traffic intrusion detection, applying AE, DBN networks, and SNN models. The proposed system will efficiently extract features from raw network traffic data by employing AE. For the better analysis of temporal dependencies in the sequence of traffic data, the work will make use of DBN and SNN models for increasing the accuracy in intrusion detection. Malicious intrusions that disturb normal traffic flow are identified by the model through the analysis of network traffic patterns. Network traffic datasets are used to train the model with many different kinds of traffic behavior patterns. Performance was again checked using accuracy, precision, and recall metrics, which determine how well the model would detect the varying traffic intrusions and classify them aptly. This method provides a critical solution toward network security in real-time applications since it addresses the ever-increasing problem of cyber-attacks on network infrastructures.

Country : India

1 M Srilakshmi Preethi2 Neeraj Kumar Uppu3 K Naveen Kumar

  1. Dept. of Computer Science & Engineering (Cybersecurity), Madanapalle Institute of Technology & Science, Madanapalle, India
  2. Dept. of Computer Science & Engineering (Cybersecurity), Madanapalle Institute of Technology & Science, Madanapalle, India
  3. Dept. of Computer Science & Engineering (Cybersecurity), Madanapalle Institute of Technology & Science, Madanapalle, India

IRJIET, Volume 9, Special Issue of INSPIRE’25 April 2025 pp. 377-382

doi.org/10.47001/IRJIET/2025.INSPIRE61

References

  1. A.H. Nasreen Fathima, S. P. S. Ibrahim and A. Khraisat, "Enhancing Network Traffic Anomaly Detection: Leveraging Temporal Correlation Index in a Hybrid Framework," in IEEE Access, vol. 12, pp. 136805- 136824, 2024, doi: 10.1109/ACCESS.2024.3458903.
  2. Pavithra, S., and K. Venkata Vikas. "Detecting Unbalanced Network Traffic Intrusions with Deep Learning." IEEE Access (2024).
  3. E. -U. -H. Qazi, T. Zia, M. Hamza Faheem, K. Shahzad, M. Imran and Z. Ahmed, "Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning," in IEEE Access, vol. 12, pp. 141625-141638, 2024, doi: 10.1109/ACCESS.2024.3466470.
  4. Z. Ali, W. Tiberti, A. Marotta and D. Cassioli, "Empowering Network Security: BERT Transformer Learning Approach and MLP for Intrusion Detection in Imbalanced Network Traffic," in IEEE Access, vol. 12, pp. 137618-137633, 2024, doi: 10.1109/ACCESS.2024.3465045.
  5. D. Herzalla, W. T. Lunardi and M. Andreoni, "TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection," in IEEE Access, vol. 11, pp. 118577-118594, 2023, doi: 10.1109/ACCESS.2023.3319213.
  6. H. Yu, C. Kang, Y. Xiao and Y. Yang, "Network Intrusion Detection Method Based on Hybrid Improved Residual Network Blocks and Bidirectional Gated Recurrent Units," in IEEE Access, vol. 11, pp. 68961- 68971, 2023, doi: 10.1109/ACCESS.2023.3271866.
  7. K. Miyamoto, M. Iida, C. Han, T. Ban, T. Takahashi and J. Takeuchi, "Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach," in IEEE Access, vol. 11, pp. 132792-132810, 2023, doi: 10.1109/ACCESS.2023.3335600.
  8. C. Park, J. Lee, Y. Kim, J. -G. Park, H. Kim and D. Hong, "An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks," in IEEE Internet of Things Journal, vol. 10, no. 3, pp. 2330-2345, 1 Feb.1, 2023, doi: 10.1109/JIOT.2022.3211346.
  9. P. Barnard, N. Marchetti and L. A. DaSilva, "Robust Network Intrusion Detection Through Explainable Artificial Intelligence (XAI)," in IEEE Networking Letters, vol. 4, no. 3, pp. 167-171, Sept. 2022, doi: 10.1109/LNET.2022.3186589.
  10. T. Zhukabayeva, A. Pervez, Y. Mardenov, M. Othman, N. Karabayev and Z. Ahmad, "A Traffic Analysis and Node Categorization- Aware Machine Learning-Integrated Framework for Cybersecurity Intrusion Detection and Prevention of WSNs in Smart Grids," in IEEE Access, vol. 12, pp. 91715-91733, 2024, doi: 10.1109/ACCESS.2024.3422077.
  11. Y. Kim, J. Kim and D. Kim, "Hi-MLIC: Hierarchical Multilayer Lightweight Intrusion Classification for Various Intrusion Scenarios," in IEEE Access, vol. 12, pp. 120098-120115, 2024, doi: 10.1109/ACCESS.2024.3450671.
  12. M. Seufert et al., "Marina: Realizing ML-Driven Real-Time Network Traffic Monitoring at Terabit Scale," in IEEE Transactions on Network and Service Management, vol. 21, no. 3, pp. 2773-2790, June 2024, doi: 10.1109/TNSM.2024.3382393.
  13. J. Buzzio-García et al., "Exploring Traffic Patterns through Network Programmability: Introducing SDNFLow, a Comprehensive OpenFlow- Based Statistics Dataset for Attack Detection," in IEEE Access, vol. 12, pp. 42163-42180, 2024, doi: 10.1109/ACCESS.2024.3378271.