Proceedings of International Conference on Applied Innovation in IT
2025/08/29, Volume 13, Issue 4, pp.237-241
An Intelligent Network Traffic Analysis Module for Intrusion Detection Systems Using an Ensemble of Neural Networks
Mukhamadieva Kibriyo and Mukhamadieva Zarina Abstract: This paper presents a module for the intelligent analysis of network traffic for Intrusion Detection Systems (IDS), implemented as an ensemble of three artificial neural networks (ANNs): a Multi-Layer Perceptron (MLP), a Radial Basis Function (RBF) network, and a Self-Organizing Map (SOM). The problem is formalized as an optimization of two criteria: attack detection accuracy (Accuracy) and False Alarm Rate (FAR). An algorithm is proposed that allows for a flexible adjustment of the balance between these metrics depending on security policy priorities. Experiments on the UNSW-NB15 dataset demonstrated that the module achieves an accuracy of 97.2% with a FAR of 2.2% in a balanced mode, and an accuracy of 98.0% with a FAR of 3.6% in a maximum sensitivity mode. The results show the feasibility of adapting an IDS to specific operational conditions, which is particularly important for Security Operations Centers (SOCs), cloud service providers, and operators of critical infrastructure.
Keywords: Neural Network, Network Traffic, Data Analysis, False Positive, Attack, Intrusion, Detection Accuracy, IDS, MLP, RBF, SOM.
DOI: 10.25673/122118
Download: PDF
References:
- H. Holm, “Signature-based intrusion detection for zero-day attacks: (Not) a closed chapter?” in Proc. 47th Hawaii Int. Conf. System Sciences (HICSS), Jan. 2014, pp. 4895–4904.
- V. Jyothsna, V. V. Rama Prasad, and K. Munivara Prasad, “A review of anomaly-based intrusion detection systems,” Int. J. Comput. Appl., vol. 28, pp. 26–35, Aug. 2011.
- R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using NOX/OpenFlow,” in Proc. IEEE Conf., Oct. 2010, pp. 408–415.
- C. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, “NICE: Network intrusion detection and countermeasure selection in virtual network systems,” IEEE Trans. Dependable Secure Comput., vol. 10, no. 4, pp. 198–211, Jul. 2013.
- N. Z. Bawany, J. A. Shamsi, and K. Salah, “DDoS attack detection and mitigation using SDN: Methods, practices, and solutions,” Arabian J. Sci. Eng., vol. 42, no. 2, pp. 425–441, Feb. 2017, doi: 10.1007/s13369-017-2414-5.
- S. Dotcenko, A. Vladyko, and I. Letenko, “A fuzzy logic-based information security management for software-defined networks,” in Proc. 16th Int. Conf. Advanced Communication Technology (ICACT), Feb. 2014, pp. 167–171.
- J. Wang, R. C. Phan, J. N. Whitley, and D. J. Parish, “Augmented attack tree modeling of distributed denial of service and tree-based attack detection method,” in Proc. 10th IEEE Int. Conf. Computer and Information Technology, Jun. 2010, pp. 1009–1014.
- E. Markakis, Y. Nikoloudakis, G. Mastorakis, C. X. Mavromoustakis, E. Pallis, A. Sideris, N. Zotos, J. Antic, A. Cernivec, D. Fejzic, J. Kulovic, A. Jara, A. Drosou, K. Giannoutakis, and D. Tzovaras, “Acceleration at the edge for supporting SMEs security: The Fortika paradigm,” IEEE Commun. Mag., vol. 57, no. 2, pp. 41–47, Feb. 2019.
- J. Jiang, Q. Yu, M. Yu, G. Li, J. Chen, K. Liu, C. Liu, and W. Huang, “ALDD: A hybrid traffic-user behavior detection method for application-layer DDoS,” in Proc. IEEE Conf., Aug. 2018, pp. 1565–1569.
- D. Aksu, S. Ustebay, M. Aydin, and T. Atmaca, “Intrusion detection with comparative analysis of supervised learning techniques and Fisher score feature selection algorithm,” in Proc. Int. Conf., Sep. 2018, pp. 141–149.
- K. Mukhamadieva, “Fuzzy artificial neural network for prediction and management tasks,” pp. 118–124, 2021.
|

HOME

- Conference
- Journal
- Paper Submission to Journal
- Paper Submission to Conference
- For Authors
- For Reviewers
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceedings

PROCEEDINGS
-
Volume 13, Issue 4 (ICAIIT 2025)
-
Volume 13, Issue 3 (ICAIIT 2025)
-
Volume 13, Issue 2 (ICAIIT 2025)
-
Volume 13, Issue 1 (ICAIIT 2025)
-
Volume 12, Issue 2 (ICAIIT 2024)
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)

PAST CONFERENCES
ICAIIT 2025
-
Photos
-
Reports
ICAIIT 2024
-
Photos
-
Reports
ICAIIT 2023
-
Photos
-
Reports
ICAIIT 2021
-
Photos
-
Reports
ICAIIT 2020
-
Photos
-
Reports
ICAIIT 2019
-
Photos
-
Reports
ICAIIT 2018
-
Photos
-
Reports
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|