10.25673/122118">


Proceedings of International Conference on Applied Innovation in IT
2025/08/29, Volume 13, Issue 4, pp.237-241

An Intelligent Network Traffic Analysis Module for Intrusion Detection Systems Using an Ensemble of Neural Networks


Mukhamadieva Kibriyo and Mukhamadieva Zarina


Abstract: This paper presents a module for the intelligent analysis of network traffic for Intrusion Detection Systems (IDS), implemented as an ensemble of three artificial neural networks (ANNs): a Multi-Layer Perceptron (MLP), a Radial Basis Function (RBF) network, and a Self-Organizing Map (SOM). The problem is formalized as an optimization of two criteria: attack detection accuracy (Accuracy) and False Alarm Rate (FAR). An algorithm is proposed that allows for a flexible adjustment of the balance between these metrics depending on security policy priorities. Experiments on the UNSW-NB15 dataset demonstrated that the module achieves an accuracy of 97.2% with a FAR of 2.2% in a balanced mode, and an accuracy of 98.0% with a FAR of 3.6% in a maximum sensitivity mode. The results show the feasibility of adapting an IDS to specific operational conditions, which is particularly important for Security Operations Centers (SOCs), cloud service providers, and operators of critical infrastructure.

Keywords: Neural Network, Network Traffic, Data Analysis, False Positive, Attack, Intrusion, Detection Accuracy, IDS, MLP, RBF, SOM.

DOI: 10.25673/122118

Download: PDF

References:

  1. H. Holm, “Signature-based intrusion detection for zero-day attacks: (Not) a closed chapter?” in Proc. 47th Hawaii Int. Conf. System Sciences (HICSS), Jan. 2014, pp. 4895–4904.
  2. V. Jyothsna, V. V. Rama Prasad, and K. Munivara Prasad, “A review of anomaly-based intrusion detection systems,” Int. J. Comput. Appl., vol. 28, pp. 26–35, Aug. 2011.
  3. R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using NOX/OpenFlow,” in Proc. IEEE Conf., Oct. 2010, pp. 408–415.
  4. C. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, “NICE: Network intrusion detection and countermeasure selection in virtual network systems,” IEEE Trans. Dependable Secure Comput., vol. 10, no. 4, pp. 198–211, Jul. 2013.
  5. N. Z. Bawany, J. A. Shamsi, and K. Salah, “DDoS attack detection and mitigation using SDN: Methods, practices, and solutions,” Arabian J. Sci. Eng., vol. 42, no. 2, pp. 425–441, Feb. 2017, doi: 10.1007/s13369-017-2414-5.
  6. S. Dotcenko, A. Vladyko, and I. Letenko, “A fuzzy logic-based information security management for software-defined networks,” in Proc. 16th Int. Conf. Advanced Communication Technology (ICACT), Feb. 2014, pp. 167–171.
  7. J. Wang, R. C. Phan, J. N. Whitley, and D. J. Parish, “Augmented attack tree modeling of distributed denial of service and tree-based attack detection method,” in Proc. 10th IEEE Int. Conf. Computer and Information Technology, Jun. 2010, pp. 1009–1014.
  8. E. Markakis, Y. Nikoloudakis, G. Mastorakis, C. X. Mavromoustakis, E. Pallis, A. Sideris, N. Zotos, J. Antic, A. Cernivec, D. Fejzic, J. Kulovic, A. Jara, A. Drosou, K. Giannoutakis, and D. Tzovaras, “Acceleration at the edge for supporting SMEs security: The Fortika paradigm,” IEEE Commun. Mag., vol. 57, no. 2, pp. 41–47, Feb. 2019.
  9. J. Jiang, Q. Yu, M. Yu, G. Li, J. Chen, K. Liu, C. Liu, and W. Huang, “ALDD: A hybrid traffic-user behavior detection method for application-layer DDoS,” in Proc. IEEE Conf., Aug. 2018, pp. 1565–1569.
  10. D. Aksu, S. Ustebay, M. Aydin, and T. Atmaca, “Intrusion detection with comparative analysis of supervised learning techniques and Fisher score feature selection algorithm,” in Proc. Int. Conf., Sep. 2018, pp. 141–149.
  11. K. Mukhamadieva, “Fuzzy artificial neural network for prediction and management tasks,” pp. 118–124, 2021.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.