Volume 19 , Issue 2 , PP: 45-63, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Vasanth Nayak 1 , Sumathi Pawar 2 * , Sunil Kumar B. L. 3
Doi: https://doi.org/10.54216/FPA.190204
Network intrusions are becoming more common, resulting in significant privacy violations, financial losses, and the illegal transfer of sensitive information. Numerous intrusion strategies pose a threat to data, computer resources, and networks. While hackers may focus on obtaining trade secrets, private information, or confidential data that can then be disclosed for illegal purposes, each type of intrusion aims to achieve a distinct objective. False attack detection by security systems and changing threat environments create challenges such as delayed identification of true attacks and long-term financial harm. This paper presents a novel hybrid optimization algorithm-assisted deep learning model for accurately identifying intrusion types and enhancing network security. Initially, input information is composed from openly obtainable datasets. The input data is cleaned, normalized, and standardized to produce accurate results. An improved synthetic minority oversampling technique (ISMOTE) for data balance reduces the method's overfitting problem. Then, the Chaotic Bat Artificial Bee Colony optimization algorithm (CBABCOA) is used to identify critical features and reduce feature dimensionality issues. HSVM-XGBoost (Hybrid Kernel Support Vector Machine-Extreme Gradient Boosting) is used for intrusion detection and classification. The Chaotic Binary Horse Optimization Algorithm (CBHOA) is used for hyper parameter tuning. This method makes use of the CIC UNSW-NB15 Augmented dataset, the CICIDS 2019 data set, and the NSL-KDD information set. The proposed method achieves better than the other method.
Intrusion , DL , Hybrid optimization , Efficient , Dynamic , Cyber threats , Network security   ,
[1] B. Dappuri and T. G. Venkatesh, "Design and Performance Analysis of Multichannel MAC Protocol for Cognitive WLAN," IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5317-5330, June 2018, doi: 10.1109/TVT.2018.2812823.
[2] R. Kashyap, "Artificial Intelligence Systems in Aviation," in Cases on Modern Computer Systems in Aviation, T. Shmelova et al., Eds., IGI Global, 2019, pp. 1–26, doi: 10.4018/978-1-5225-7588-7.ch001.
[3] M. R. Shaik and A. S. Reddy, "Optimal placement and sizing of FACTS device to overcome contingencies in power systems," Proc. 2016 Int. Conf. Signal Process., Commun., Power, Embedded Syst. (SCOPES), Paralakhemundi, India, 2016, pp. 838-842, doi: 10.1109/SCOPES.2016.7955559.
[4] V. Roy, H. Amhia, S. Shukla, and A. K. Wadhwani, "An IoT-Based Moving Vehicle Healthcare Service," in IoT in Healthcare Systems: Applications, Benefits, Challenges, and Case Studies, 2023, pp. 177-190, doi: 10.1201/9781003145035-10.
[5] S. Tiwari, C. M. Babu, P. Shanker, K. V. Shahnaz, V. Roy, and R. Kashyap, "Cross-Lingual Transfer Learning in RNNs for Enhancing Linguistic Diversity in Natural Language Processing," in Proc. 2024 Int. Conf. Advances Comput. Res. Sci. Eng. Technol. (ACROSET), 2024, doi: 10.1109/ACROSET62108.2024.10743896.
[6] S. K. Suman et al., "Sign Language Interpreter," in Advances in Cognitive Science and Communications, Springer, ICCCE 2022, pp. 1021-1031, doi: 10.1007/978-981-19-8086-2.
[7] K. Ramu et al., "Deep Learning‑Infused Hybrid Security Model for Energy Optimization and Enhanced Security in Wireless Sensor Networks," SN Comput. Sci., vol. 5, no. 848, 2024, doi: 10.1007/s42979-024-03193-6.
[8] R. Kashyap, "Big Data and High-Performance Analyses and Processes," in Spatial Planning in the Big Data Revolution, A. Voghera and L. La Riccia, Eds., IGI Global, 2019, pp. 45–83, doi: 10.4018/978-1-5225-7927-4.ch003.
[9] S. R. Sankranti et al., "Effective IoT-Based Analysis of Photoplethysmography Waveforms for Investigating Arterial Stiffness and Pulse Rate Variability," SN Comput. Sci., vol. 5, no. 5, 2024, doi: 10.1007/s42979-024-02777-6.
[10] K. Ramu et al., "Augmenting Cervical Cancer Analysis with Deep Learning Classification and Topography Selection Using Artificial Bee Colony Optimization," SN Comput. Sci., vol. 5, no. 6, 2024, doi: 10.1007/s42979-024-03040-8.
[11] M. Tamilselvi et al., "WPT: A Smart Magnetic Resonance Technology-Based Wireless Power Transfer System Design for Charging Mobile Phones," in Proc. 2nd Int. Conf. Intell. Innovative Technol. Comput., Electr., Electron. (ICIITCEE), 2024, doi: 10.1109/IITCEE59897.2024.10467828.
[12] M. Tamilselvi et al., "IoT-Based Smart Robotic Design for Identifying Human Presence in Disaster Environments Using Intelligent Sensors," in Proc. 2024 Int. Conf. Autom. Comput. (AUTOCOM), pp. 399-403, 2024, doi: 10.1109/AUTOCOM60220.2024.10486106.
[13] M. J. Basha et al., "Advancements in Natural Language Processing for Text Understanding," E3S Web Conf., vol. 399, 2023, doi: 10.1051/e3sconf/202339904031.
[14] M. Pandey et al., "Blockchain Technology: Applications and Challenges in Computer Science," E3S Web Conf., vol. 399, 2023, doi: 10.1051/e3sconf/202339904035.
[15] R. Pushpakumar et al., "Human-Computer Interaction: Enhancing User Experience in Interactive Systems," E3S Web Conf., vol. 399, 2023, doi: 10.1051/e3sconf/202339904037.
[16] F. R. Willett et al., "High-Performance Brain-to-Text Communication via Handwriting," Nature, vol. 593, no. 7858, pp. 249–254, May 2021, doi: 10.1038/s41586-021-03506-2.
[17] A. Halbouni et al., "CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System," IEEE Access, vol. 10, pp. 99837-99849, 2022, doi: 10.1109/ACCESS.2022.3207312.
[18] B. Latha et al., "Hand Gesture and Voice Assistants," E3S Web Conf., vol. 399, 2023, doi: 10.1051/e3sconf/202339904050.
[19] R. Gorli et al., "Towards Optic Enlightenment: Future Free Space Optics Architecture & Dynamic Modeling," in Proc. 2nd Int. Conf. Intell. Data Commun. Technol. Internet Things (IDCIoT), pp. 785-791, 2024, doi: 10.1109/IDCIoT59759.2024.10467547.
[20] P. Kavitha et al., "Detection for Melanoma Skin Cancer through ACCF, BPPF, and CLF Techniques with Machine Learning Approach," BMC Bioinformatics, vol. 24, no. 1, 2023, doi: 10.1186/s12859-023-05584-7.
[21] H. Anandaram et al., "Applications of Quantum Cascade Lasers in Spectroscopy and Trace Gas Analysis," in Proc. 4th Int. Conf. Adv. Electr., Comput., Commun., Sustain. Technol. (ICAECT), 2024, doi: 10.1109/ICAECT60202.2024.10469348.
[22] J. Sumithra et al., "A Smart and Systematic Vehicle Headlight Operations Controlling System Based on Light Dependent Resistor," in Proc. 2nd Int. Conf. Intell. Innovative Technol. Comput., Electr., Electron. (ICIITCEE), 2024, doi: 10.1109/IITCEE59897.2024.10467948.
[23] A. Tam et al., "Identification of Brain Tumor on MRI Images with and Without Segmentation Using DL Techniques," E3S Web Conf., vol. 399, 2023, doi: 10.1051/e3sconf/202339904049.
[24] M. Gandhi et al., "An Innovative Method for Paddy Yield Prediction Based on DCNN-ELM Approach," in Proc. 2nd Int. Conf. Intell. Data Commun. Technol. Internet Things (IDCIoT), pp. 762-767, 2024, doi: 10.1109/IDCIoT59759.2024.10467772.
[25] T. Sathya et al., "Bitcoin Heist Ransomware Attack Prediction Using Data Science Process," E3S Web Conf., vol. 399, 2023, doi: 10.1051/e3sconf/202339904056.
[26] R. Sasirekha et al., "Smart Poultry House Monitoring System Using IoT," E3S Web Conf., vol. 399, 2023, doi: 10.1051/e3sconf/202339904055.