DOI : https://doi.org/10.5281/zenodo.19512596
- Open Access

- Authors : Swetha P Krishnan, Rehsana J S, Sabarisuthan S, Aquib Abdulla, Dr. Deepa S Kumar, Prof. Ligi Achuthan
- Paper ID : IJERTV15IS031564
- Volume & Issue : Volume 15, Issue 03 , March – 2026
- Published (First Online): 11-04-2026
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License:
This work is licensed under a Creative Commons Attribution 4.0 International License
An AI-Powered Network Traffic Classifier and Web Intrusion Detection System
Swetha P Krishnan, Rehsana J S, Sabarisuthan S, Aquib Abdulla
Department of CSE, College of Engineering Munnar, Kerala, India
Dr. Deepa S Kumar
Associate Professor, Department of CSE, College of Engineering Munnar, Kerala, India
Prof. Ligi Achuthan
Assistant Professor, Department of CSE, College of Engineering Munnar, Kerala, India
Abstract – The escalating sophistication of modern cyber warfare necessitates the deployment of highly adaptive and intelligent defense mechanisms. Historically, security infrastructures have heavily depended on rigid, signature- oriented Intrusion Detection Systems (IDS), a limitation that leaves networks highly susceptible to zero-day exploits and polymorphic malware. To mitigate these vulnera- bilities, this research introduces IntruGuard, a compre- hensive, artificial intelligence-backed defense framework. IntruGuard seamlessly integrates a precise Network Traffic Classifier with a dedicated Web Intrusion Detection Sys- tem, enabling immediate identification of malicious oper- ations. By fusing advanced machine learning formulations with continuous packet interception and an interactive visual telemetry dashboard, this architecture provides a highly accessible yet profoundly robust security layer. Rigorous model training and empirical validation were performed utilizing the industry-standard CICIDS2017 and NSL-KDD datasets. Leveraging the predictive syn- ergy of ensemble methodologiesspecifically HistGradi- entBoostingClassifier and Random Forestthe developed framework attains an exceptional classification precision of 94.5%, alongside a drastically minimized false-positive incidence.
Index TermsIntrusion Detection System, Machine Learn- ing, Network Security, Web Intrusion Detection, Real-Time Monitoring
-
INTRODUCTION
The exponential growth of cloud computing and web- reliant enterprise services has positioned digital security as a paramount concern across all industrial sectors [4], [10]. Attack vectors, including malware injections, phishing campaigns, unauthorized server access, and Denial of Service (DoS), are continuously evolving in both volume and complexity, easily bypassing conven- tional safeguards [12], [15]. Historically, standard In-
trusion Detection Systems (IDS) have operated almost exclusively on static signature comparison, rendering them effective only against pre-cataloged vulnerabilities [1], [16]. Consequently, the rigid nature of legacy sys- tems has spurred the cybersecurity community toward more intelligent, data-centric paradigms capable of self- adaptation [3], [11]. Within this context, Machine Learn- ing (ML) emerges as a powerful utility. ML algorithms can autonomously process massive streams of raw packet data, uncovering hidden anomalous patterns instanta- neously [7], [13].Recognizing these challenges, this work proposes a dual-layer intrusion detection framework that integrates both network-level traffic classification and application-level web intrusion detection within a unified system. Unlike conventional approaches that focus on a single layer of analysis, the proposed system combines real-time packet monitoring with machine learning-based classification to provide a comprehensive security solu- tion.
The key contribution of this work lies in the integration of lightweight yet effective machine learning models with a real-time monitoring pipeline using Scapy and Npcap. The system emphasizes practical deployment, reduced computational overhead, and improved detection reliability rather than relying on complex deep learning architectures. Additionally, the inclusion of a live visual- ization dashboard enhances usability and enables faster response to security threats. [1], [9], [16].
-
LITERATURE REVIEW
Recent strides in digital security have been heavily driven by the integration of Machine Learning and Artificial Intelligence into traditional detection pipelines [3], [11]. The academic community has thoroughly in- vestigated various hybrid, anomaly-based, and signature-
driven strategies [1], [4]. However, operationalizing ML models is not without its complications. As highlighted by Sommer and Paxson [16], the deployment of pre- dictive algorithms in cybersecurity is often hindered by weak model generalization and inherent biases present in training data. To formulate robust predictive boundaries, modern researchers heavily rely on comprehensive traffic repositories, such as UNSW-NB15 [26], CICIDS2017 [2], and NSL-KDD [24], which mimic contemporary attack landscapes [2], [10]. Among predictive models, ensemble mechanismsnotably Gradient Boosting and Random Foresthave gained immense traction due to their high reliability and resistance to variance [7], [9]. Concurrently, while complex architectures like Convo- lutional Neural Networks (CNNs) and Long Short-Term Memory (LSTMs) demonstrate remarkable classification capabilities [12], [13], they are frequently criticized for their steep computational costs and requirement for specialized operational knowledge [15]. The conceptual- ization of IntruGuard directly addresses these operational barriers, delivering an accessible yet mathematically rigorous intrusion detection shield. While deep learning models such as Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks have demonstrated high detection performance in intrusion de- tection systems, they often require significant computa- tional resources and large-scale training data. This makes them less suitable for real-time and resource-constrained environments. In contrast, the approach adopted in this work prioritizes efficiency and deployability by leverag- ing ensemble learning techniques, while still maintaining competitive accuracy levels.
-
PROBLEM STATEMENT
The central ambition of this research is to architect and deploy an artificially intelligent monitoring sys- tem capable of jointly scrutinizing underlying network topologies and application-layer web communications. The overarching goal is the instantaneous interception of malicious activities. Specifically, the proposed architec- ture is constructed to resolve the intrinsic flaws of legacy IDS frameworks by:
-
Recognizing and neutralizing zero-day and highly eva- sive digital threats.
-
Substantially suppressing false positive alerts to pre- vent analytical fatigue.
-
Supplying an intuitive, graphical command center for live telemetry analysis.
-
-
OBJECTIVES
The core deliverables of the proposed IntruGuard plat- form include:
-
The formulation of a precise Network Traffic Classifier tasked with flagging infrastructural anomalies.
-
The creation of a specialized Web Intrusion Detection System (WIDS) designed to thwart application-specific exploits.
-
The seamless amalgamation of both diagnostic layers into a singular, synchronized dashboard equipped with rapid visualization tools.
-
-
PROPOSED SYSTEM
-
System Overview
IntruGuard operates as an elastic, hybrid defense perime- ter fueled by sophisticated machine learning classifica- tion. Unlike legacy methodologies that rely exclusively on pre-compiled registries of known threats, this archi- tecture employs predictive analytics to identify both dc- umented exploits and previously unseen attack variations. The platform is structured to execute in two primary environments: a foundational offline mode focused on algorithm training and historical validation, and a dy- namic online state where automated sniffing protocols intercept, dissect, and classify live transmission streams in real time.
-
System Architecture
The underlying anatomy of IntruGuard is segregated into four pivotal stages:
-
Packet Interception Engine: Utilizes Npcap and Scapy libraries to constantly sample live data trans- missions.
-
Feature Translation Module: Deconstructs raw packet payloads, transforming them into mathemati- cally structured vectors.
-
Diagnostic Engine: Processes these numerical vectors through pre-compiled machine learning algorithms to finalize traffic categorization.
-
Telemetry Workspace: Projects analytical insights, system warnings, and graphical analytics directly to system administrators.
This comprehensive layout mirrors the latest advance- ments in AI-driven security infrastructures documented in contemporary research [5], [6].
-
-
-
METHODOLOGY
-
Dataset Description
To validate the systems operational flexibility and math- ematical stability, the training pipeline was exposed to
Fig. 1. Proposed System Architecture of IntruGuard
multiple highly regarded traffic archives:
NSL-KDD Archive: Functioning as a modernized up- date to the KDD99 set, this collection strips away redundant entries and offers a proportional distribution of cyber exploits, including User-to-Root (U2R), Remote- to-Local (R2L), Probing, and DoS events [24].
CICIDS2017 Archive: An advanced dataset generated via rigorous emulations of modern network environ- ments. Utilizing the CICFlowMeter extraction tool, it supplies over 80 intrinsic flow statistics detailing com- plex attacks like web exploits, infiltration efforts, and brute-force campaigns [2], [25].
UNSW-NB15 Archive: Recognized for mirroring gen- uine, contemporary transmission behaviors, this repos- itory is essential for exposing the model to realistic, modern-day attack vectors [26].
-
Data Preprocessing
Data purification remains a non-negotiable step for max- imizing algorithmic accuracy. The pre-training cleansing phase incorporated the following procedures:
-
The eradication of duplicate records and the imputa- tion or removal of empty fields.
-
The application of label encoding, which converts descriptive strings (like service names or protocol identifiers) into computable integers.
-
The deployment of a StandardScaler to normalize metric variances, ensuring that no singular high-value characteristic unevenly skews the resulting model.
-
The execution of a stratified 80-20 partition, designat- ing the bulk of the data for training while preserving a distinct segment for empirical testing.
-
-
Feature Selection
Extracting the most consequential variables is paramount for mitigating computational strain. To this end, we applied advanced optimization routines, specifically the Energy Valley Optimization (EVO) technique, to aggres- sively prune the feature map while preserving diagnostic integrity [8].
This EVO-centric reduction yields several benefits:
-
A dramatic decrease in processing latency.
-
A clear enhancement of the models structural inter- pretability.
-
A strong defense against algorithmic overfitting by eliminating statistical noise.
-
-
Model Development
The intelligence of the platform is anchored by two distinct classifiers:
HistGradientBoostingClassifier: Primarily allocated for the oversight of raw network flows, this model is celebrated for its unparalleled speed and resource effi- ciency when evaluating massive datasets.
Random Forest Classifier: Deployed actively within both the web and network analysis modules. This tech- nique leverages an expansive forest of independent de- cision trees. Final predictive outcomes are determined through a comprehensive majority-voting protocol, a strategy that heavily fortifies overall diagnostic reliability [17].
-
Real-Time Detection
Immediate threat recognition is facilitated by integrating the Npcap [23] and Scapy [22] networking utilities. These toolsets autonomously drain packets from the host interface, strip their relevant characteristics on the fly, and route these telemetry vectors into the active machine learning models for instantaneous categorization.
-
Experimental Setup
The experimental evaluation of the proposed system was conducted using a standard machine learning environ- ment implemented in Python. The system was developed
Fig. 2. Workflow of Network Traffic Classifier
using libraries such as Scikit-learn for model training and evaluation, along with Scapy and Npcap for real-time packet capture and analysis. The dataset was divided into training and testing subsets using an 80:20 split. Cross- validation techniques were employed to ensure model robustness and avoid overfitting. Performance metrics including accuracy, precision, recall, and F1-score were used to evaluate the effectiveness of the models. The experiments were performed on a system with standard computational capabilities, demonstrating that the pro- posed solution does not require high-end hardware for deployment. This highlights the practicality of the system for real-world applications.
-
-
MODULE 1: NETWORK TRAFFIC CLASSI- FIER
-
Architecture and Workflow
The fundamental objective of the Network Traffic Clas- sifier (NTC) is to parse benign data flows from hostile infiltrations using historically learned numerical bounds. As charted in Fig. 2, the operational loop begins with the ingestion of telemetryextrapolated either directly from the network interface or from static logs like NSL-KDD. Following ingestion, the raw logs undergo rigorous pre- processing where alphabetical fields (e.g., connection protocols) are structurally mapped via label encoding. To maintain equilibrium across all input dimensions,
the numerical ranges are condensed during the feature scaling phase. Once refined, these matrices are fed into the HistGradientBoosting and Random Forest inference engines. During the initial training cycle, these mod- els ascertain the exact algebraic thresholds separating normal and malicious behaviors. Upon full deployment, continuous packet streams are checked against these proven thresholds to generate real-time security decrees.
-
Feature Analysis
Determining the correct analytical parameters is the absolute cornerstone of the NTCs functionality. The IntruGuard system observes a highly specialized subset of characteristics that capture both the timing intrica- cies and volumetric statistics of active sessions. Vital focal points include the volume of bytes transmitted to and from the host, the sheer frequency of connection attempts, parallel service logs, and explicit authentica- tion statuses. For instance, a disproportionate surge in exported bytes frequently unmasks a covert data exfil- tration endeavor. Similarly, a massive cluster of connec- tion requests within a microscopic time window serves as a hallmark of Denial of Service (DoS) aggression. Concurrently, repeated login failures overlapping with relentless connection generation provide strong evidence of automated brte-force password cracking.
-
Prediction Logic
The analytical backbone of the NTC is heavily reliant on the structural robustness of the Random Forest en- semble framework. Conceptually, this algorithm spans a wide array of discrete decision trees, each individually trained against randomized permutations of the primary dataset. In an active scanning scenario, a newly captured flow is assessed by every single tree concurrently. The conclusive threat label is subsequently established by aggregating the collective votes mapping to the most frequently predicted class, articulated mathematically as:
y = mode{T1(x), T2(x), …, Tn (x)}
-
-
MODULE 2: WEB INTRUSION DETECTION SYSTEM
-
Workflow
Operating strictly at the application boundary, the Web Intrusion Detection System (WIDS) is customized to in- tercept sophisticated attacks targeting web infrastructure. The procedural flow of this specific module is mapped out in Fig. 3. The WIDS sequence initiates by capturing incoming HTTP requests alongside corresponding flow mechanics. Similar to the network block, this gathered
data traverses a strict preprocessing pipeline dedicated to categorical translation and numeric standardization. Following purification, the extraction protocol isolates highly indicative attributes, such as cumulative packet counts, session duration spans, total payload mass, and character entropy levels. These distilled numeric combi- nations are consequently evaluated by the Random Forest classifier to differentiate standard user browsing from deliberate structural manipulation. The true efficacy of the WIDS relies entirely on correctly matching these abstract features to documented attacker methodologies. Flow duration timing and erratic packet bursts serve as prime indicators of malicious scripts or botnet probing. On the other hand, scrutinizing string entropy and URL payload capacity is crucial for flagging unauthorized script injections. An exceptionally bloated packet request bearing highly randomized character strings invariably points toward impending SQL Injection constraints or Cross-Site Scripting (XSS) attacks.
-
Attack Detection
By continuously auditing deviations from baseline traf- fic models and highlighting peculiar metric spikes, the WIDS acts as an impermeable barrier against a myriad of application-layer threats. Its coverage extends over Remote Code Execution (RCE), Local File Inclusion (LFI), XSS, and SQL Injection operations. The foun- dational Random Forest mechanism has been subjected to extensive hyper-parameter tuningspecifically locked to roughly 150 independent estimators alongside highly regulated architectural depths. This precision tuning guarantees a superior detection threshold while nearly eradicating the generation of false-positive warnings.
-
-
MODULE 3: UNIFIED INTRUSION DETEC- TION SYSTEM
-
System Integration
The overarching Unified Intrusion Detection umbrella acts as the fusion point for both the NTC and WIDS components. As illustrated in Fig. 4, the combined framework utilizes an intelligent steering mechanism that inherently recognizes the classification of the incoming data stream, subsequently routing it toward the optimal inferencing model. This frictionless interoperability al- lows IntruGuard to seamlessly transition focus between packet-level routing events and highly specific web- server queries, cementing a fully panoramic defense posture.
Fig. 3. Workflow of Web Intrusion Detection System
Fig. 4. Unified Intrusion Detection System Architecture
-
Key Features
The dominant capabilities of the integrated suite revolve heavily around its capacity for sub-second threat re- porting and comprehensive graphical insights. Central- ized entirely within a dynamic dashboard, the software autonomously manages data ingestion formats, facili- tates instant model switching, and executes deep-packet teardowns. By simplifying these highly complex cyber defense operations, IntruGuard democratizes enterprise- grade security oversight, making it entirely manage- able for operators lacking extensive administrative back- grounds.
Fig. 5. IntruGuard Dashboard Interface
-
Dashboard Visualization
The strategic value of a highly legible visual workspace cannot be overstated when coordinating rapid incident mitigation. The IntruGuard dashboard intuitively projects convoluted traffic metrics into digestible visual elements. It conveys the proportional spread of distinct attack vec- tors through crisp pie charts and quantifies threat severity margins via interactive bar displays. Augmented by an endlessly updating event log and instant notification triggers, this centralized interface drastically expedites the administrative decision-making process.
-
-
RESULTS AND PERFORMANCE ANALYSIS
The performance of the system was evaluated using standard classification metrics including accuracy, pre- cision, recall, and F1-score. The results indicate that the proposed system achieves reliable detection performance across both network-level and application-level intrusion scenarios. The Network Traffic Classifier achieves accu- racy in the range of 9093%, while the Web Intrusion Detection System maintains an accuracy of approxi- mately 9091%. When combined, the integrated system reaches an overall accuracy of 94.5%. These results demonstrate that the use of ensemble models provides a balanced trade-off between detection performance and computational efficiency. Isolating the NTC model re- veals an impressive accuracy tier fluctuating between 9093%. It accurately recognizes and isolates destructive traffic permutations correlating with DoS, Probe, U2R, and R2L incursions against a backdrop of safe telemetry. In parallel, the independent WIDS segment stabilizes at
an approximate 9091% accuracy threshold, showcasing remarkable precision when intercepting advanced web exploits such as RCE, LFI, XSS, and SQL Injections. When deployed as a synchronized, bi-layered entity, the system achieves a formidable peak accuracy of 94.5%. This elevated baseline mathematically validates the im- mense advantages of merging ensemble methodologies into a singular cohesive pipeline. An evaluation of the recall and precision brackets illustrates a tightly main- tained control over misdiagnosis boundaries. Elevated precision outputs certify that any reported anomaly is definitively malicious, whereas towering recall statis- tics guarantee that virtually all genuine hostile infil- trations are properly apprehended. Consequently, the resulting F1-score highlights an impeccable equilibrium between sensitivity and exactness, formally qualifying the software for enterprise implementation. Incorporat- ing ensemble foundationsnamely Random Forest and HistGradientBoostingClassifierinherently dissolves the risks of model overfitting by synthesizing the predictive logic of countless independent decision paths.
A. Performanc Evaluation
The performance of the IntruGuard system was eval- uated using multiple standard metrics, including ac- curacy, precision, recall, and false positive rate. The system achieved high accuracy in distinguishing between benign and malicious traffic, demonstrating its effec- tiveness in intrusion detection. A key observation is the low false positive rate, indicating that the system rarely misclassifies normal traffic as malicious. This is particularly important in real-world deployments, where high false positives can lead to unnecessary alerts and reduced trust in the system. The absence of medium-level alerts further suggests that the model maintains clear decision boundaries, enabling confident classification. Additionally, the use of cross-validation ensures that the model generalizes well across different data sbsets. These results confirm that the proposed hybrid approach provides reliable and consistent performance compared to conventional intrusion detection systems. As captured in Fig. 7, the taxonomy segments live monitoring events into discrete severity compartments: Low, Medium, and High. During the observation window, precisely 5,745 flows generated High alerts, representing confirmed ma- licious footprints isolated by the system. Most notably, the timeline registered exactly zero Medium alerts. This absolute absence of medium-tier warnings underscores the algorithmic confidence of the frameworkit cate- gorizes events deterministically without falling back on
Fig. 6. Performance Metrics of the proposed system
Fig. 8. Sample Prediction Output with Severity Classification
Fig. 7. Alert Distribution Generated by IntruGuard System
ambiguous judgments. The vast majority of the net- work pulse, accounting for 16,254 independent logs, was correctly cataloged as Low severity background traffic. This distribution firmly substantiates the architectures ability to aggressively suppress arbitrary false positives while firmly securing the perimeter. The results indicate consistent and reliable performance, demonstrating the effectiveness of the proposed approach in identifying both known and unknown attack patterns. A representa- tive subset of the predictive logging console is provided in Fig. 8. The internal log tags each parsed session with a generalized label (attack or normal), a specific predictive outcome, and an assigned severity tier. Routine handshakes and data exchanges are naturally tagged as normal and relegated to a Low severity status, indicating entirely benign activity. In stark contrast, distinctive threat signatures, like the mscan scanning utility, are instantly trapped and elevated to High severity warnings.
By supplying a distinct severity grade alongside the raw classification, the system grants cybersecurity teams the crucial situational context needed to intelligently prioritize their incident response workflows.
-
DISCUSSION
Cumulatively, the performance records underscore the robustness and raw processing power of the ML-driven platform for continuous cyber defense. By deliberately exposing the foundational algorithms to a highly varied mix of benchmarking datasets, the framework exhibits tremendous generalization capabilities, easily adapting to differing infrastructural layouts. Despite these successes, certain architectural limitations persist. Chief among them is the severe degradation of deep packet inspection when evaluating entirely encrypted traffic tunnels, as the diagnostic engines are completely blinded to the internal payload. Furthermore, the mandatory reliance on third-party sniffing interfaces like Npcap inadvertently limits platform interoperability across different operating system constraints. Finally, preserving top-tier predictive accuracy essentially dictates that the underlying machine learning models undergo relentless periodic retraining to continuously adapt to the shifting technological land- scape of modern hacking utilities.
A. Comparison with DL models
Compared to deep learning-based approaches such as CNN and LSTM models reported in existing literature, which often achieve slightly higher accuracy, the pro- posed system offers a more lightweight and computation- ally efficient alternative. This makes it more suitable for
real-time deployment scenarios where processing speed and resource utilization are critical factors.
-
FUTURE WORK
Advancing this research will primarily focus on grafting highly complex deep-learning architectures into the ex- isting pipelinespecifically exploring Long Short-Term Memory (LSTM) blocks and Convolutional Neural Net- works (CNN). Moreover, migrating the analytical core toward an online active-learning methodology would facilitate the real-time consumption and adaptation of unknown threat methodologies as they emerge in the wild. An equally critical priority is resolving the encryp- tion blind-spot by architecting specialized sub-models that rely strictly on flow duration, timing intervals, and session meta-data rather than physical text payloads. Ultimately, interfacing IntruGuard with top-tier Security Information and Event Management (SIEM) networks and localized firewall barriers will elevate the platform
Conference on Software Engineering Research, Management and Applications (SERA), 2023.
-
N. W. Khan et al., A Hybrid Deep Learning-Based Intrusion Detection System for IoT Networks, Mathematical Biosciences and Engineering, vol. 20, no. 8, pp. 1349113520, 2023.
-
A. V. and V. Srinivasan, Artificial Intelligence Based Network Traffic Analysis to Handle Large-Scale and High-Speed Traffic, International Journal of Engineering Research & Technology (IJERT), vol. 11, no. 6, pp. 15, 2023.
-
M. A. Akil, I. Butun, A. Williams, and I. Mahgoub, Hy- brid Machine Learning Models for Intrusion Detection in IoT: Leveraging a Real-World IoT Dataset, arXiv preprint arXiv:2502.12382, Feb. 2025.
-
A. Nizam et al., A Comparative Study on AI-IDS Artificial Intelligence-Based Intrusion Detection System, International Journal of Engineering Research & Technology (IJERT), vol. 14, no. 2, Feb. 2025.
-
M. B. Umair et al., A Network Intrusion Detection System Using Hybrid Multilayer Deep Learning Model, Big Data, vol. 00, no. 00, pp. 110, 2022.
-
B.-N. Chirica et al., A Modular AI-Driven Intrusion Detection System for Network Traffic Monitoring in Industry 4.0 Using Nvidia Morpheus and GANs, Sensors, vol. 25, no. 1, p. 3390, 2024.
from an observational logging utility into an entirely autonomous, self-defending infrastructural shield.
REFERENCES
[1] A. K. Salman, R. O. Fadhel, and A. A. Ahmed, Improving -
L. Li, Y. Lu, G. Yang, and X. Yan, End-to-End Network
Intrusion Detection Based on Contrastive Learning, Sensors, vol. 24, no. 7, p. 2122, 2024.
A. Dhakad et al., Real-Time Network Traffic Analysis Using Artificial Intelligence, Machine Learning and Deep Learning: A Review of Methods, Tools and Applications, in Proc. Int. Conf. Self Sustainable Artif. Intell. Syst., 2023.
Intrusion Detection Systems by Using Deep Learning Methods on Time Series Data, Engineering, Technology & Applied Science Research (ETASR), vol. 15, no. 1, pp. 94179423, 2025.
-
I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, in Proceedings of the 4th Interna- tional Conference on Information Systems Security and Privacy (ICISSP), Funchal, Madeira, Portugal, 2018, pp. 108116.
-
A. P. Singh, A. K. Sharma, R. P. Giri, and S. K. Singh, HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System, Applied Sciences, vol. 13, no. 4921, pp. 1 14, 2023.
-
S. V. Prasad, P. N. Jyothi, A. Shanmugapriya, and K. Nirmala, An Integrated Framework for Data Security Using Advanced Machine Learning Classification and Best Practices, Informat- ica, vol. 49, no. 2, pp. 383398, 2025.
-
V. Sobchuk, S. Gakhov, Y. Smoliev, and H. Haidur, Enhanc- ing Intrusion Detection in Organizational Information Systems through AI-Powered Traffic Analysis, in CEUR Workshop Proceedings, 2024.
-
M. A. M. Farzaan, M. C. Ghanem, A. El-Hajjar, and D. N. Rat- nayake, AI-Powered System for an Efficient and Effective Cy- ber Incidents Detection and Response in Cloud Environments, IEEE Transactions on Machine Learning in Communications and Networking,vol. 3, pp. 643652, 2025.
-
M. A. Khan, M. Alazab, S. K. Shahi, R. Kumar, and A. Sudhakar, A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network, Symmetry, vol. 11, no. 4, pp. 116, Apr. 2024.
-
M. Alsharif, A. Yahya, and S. Khan, Hybrid AI-Driven Intru- sion Detection: Framework Leveraging Novel Feature Selection for Enhanced Network Security, in IEEE 17th International
-
-
L. Breiman, Random Forests, Machine Learning, vol. 45, no. 1, pp. 532, 2001.
-
A Scalable Hybrid Intrusion Detection System Based on Con- volutional LSTM Network, IEEE, 2022.
-
Improving Intrusion Detection Systems Using Deep Learning on Time-Series Data, IEEE, 2021.
-
HDLNIDS: Hybrid Deep Learning-Based Network Intrusion Detection System, IEEE Access, 2022.
-
Khan et al., Hybrid Deep Learning-Based Intrusion Detection System for IoT Networks, IEEE, 2023.
-
Scapy: Packet Manipulation Tool, Available: https://scapy.net
-
Npcap Packet Capture Library, Available: https://nmap.org/ npcap/
-
NSL-KDD Dataset, Available: https://www.kaggle.com/ datasets/hassan06/nslkdd
-
CICIDS2017 Dataset, Available: https://www.kaggle.com/ datasets/cicdataset/cicids2017
-
UNSW-NB15 Dataset, Available: https://www.kaggle.com/ datasets/mrwellsdavid/unsw-nb15
