Hybrid Ensemble Deep Neural Network for Intrusion Detection (HEDNN ID)

International Journal of Electronics and Communication Engineering |
© 2025 by SSRG - IJECE Journal |
Volume 12 Issue 7 |
Year of Publication : 2025 |
Authors : Aluri Brahmareddy, S Meghana, S. Vishwa Kiran, K Sowjanya Bharathi, Bura Vijay Kumar |
How to Cite?
Aluri Brahmareddy, S Meghana, S. Vishwa Kiran, K Sowjanya Bharathi, Bura Vijay Kumar, "Hybrid Ensemble Deep Neural Network for Intrusion Detection (HEDNN ID)," SSRG International Journal of Electronics and Communication Engineering, vol. 12, no. 7, pp. 184-200, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I7P114
Abstract:
As network traffic becomes increasingly complex today, the variety of cyber attacks is also increasing, and the need to prevent these attacks in real time is emerging; network intrusion detection systems (NIDSs ) are essential. In contrast, traditional IDS methodologies , incl uding rule based and statistical approaches, often face challenges in maintaining their effectiveness as they struggle to keep pace with the rapid development of Large Scale , dynamic t raffic and the evolving behavior of attackers . Although CNN LSTM and tra nsformer based frameworks improve detection accuracy using state of the art deep learning models, the challenges of addressing spatial temporal dependencies, class imbalance, and scalability remain to be addressed . Such challenges necessitate a robust, fas t, and scalable framework for network level intrusion detection . This research proposes a Hybrid Ensemble Deep Neural Network model termed HEDNN ID to address these limitations. This model explicitly integrates attention mechanisms to focus on significant data, Long Short Term Memory (LSTM) to learn temporal dependencies, Convolutional Neural Networks (CNN) to extract spatial features, and ensemble learning to enhance generalization and resilience. HEDNN ID compared favorably with leading models, achieving 98.68% accuracy, 97.80% precision, 97.50% recall , and 97.65% F1 score on the UNSW NB15 dataset. T he proposed framework effectively addresses the limitations of existing approaches and supports scalability for practical use cases in safe intrusion detection. HEDNN ID can adapt to various attack scenarios and enhance detection reliability, which represe nts a significant step forward in modern cybersecurity. The research provides a foundation for developing impenetrable, scalable IDS frameworks.
Keywords:
Network Intrusion Detection, Deep Learning, Hybrid Ensemble Model, UNSW NB15, Cybersecurity
References:
[1] Khushnaseeb Roshan, Aasim Zafar, and Shiekh Burhan Ul Haque, “Untargeted White-Box Adversarial Attack with Heuristic Defence Methods in Real-Time Deep Learning Based Network Intrusion Detection System,” Computer Communications, vol. 218, pp. 97-113, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Nojood O. Aljehane et al., “Golden Jackal Optimization Algorithm with Deep Learning Assisted Intrusion Detection System for Network Security,” Alexandria Engineering Journal, vol. 86, pp. 415-424, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mamatha Maddu, and Yamarthi Narasimha Rao, “Network Intrusion Detection and Mitigation in SDN Using Deep Learning Models,” International Journal of Information Security, vol. 23, pp. 849-862, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Soumyadeep Hore et al., “A Sequential Deep Learning Framework for a Robust and Resilient Network Intrusion Detection System,” Computers & Security, vol. 144, pp. 1-15, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Ahmed Abdelkhalek, and Maggie Mashaly, “Addressing the Class Imbalance Problem in Network Intrusion Detection Systems Using Data Resampling and Deep Learning,” The Journal of Supercomputing, vol. 79, pp. 10611-10644, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Sydney Mambwe Kasongo, “A Deep Learning Technique for Intrusion Detection System Using a Recurrent Neural Networks Based Framework,” Computer Communications, vol. 199, pp. 113-125, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Tao Yi et al., “Review on the Application of Deep Learning in Network Attack Detection,” Journal of Network and Computer Applications, vol. 212, pp. 1-15, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Jiawei Du et al., “NIDS-CNNLSTM: Network Intrusion Detection Classification Model Based on Deep Learning,” IEEE Access, vol. 11, pp. 24808-24821, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Vanlalruata Hnamte et al., “A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE,” IEEE Access, vol. 11, pp. 37131-37148, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Martin Manuel Lopez et al., “Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT,” Proceedings of the Great Lakes Symposium on VLSI 2023, Knoxville TN USA, pp. 691-696, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Mohamed S. Abdalzaher et al., “Toward Secured IoT-Based Smart Systems Using Machine Learning,” IEEE Access, vol. 11, pp. 20827-20841, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Minh-Quang Tran et al., “Reliable Deep Learning and IoT-Based Monitoring System for Secure Computer Numerical Control Machines Against Cyber-Attacks With Experimental Verification,” IEEE Access, vol. 10, pp. 23186-23197, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Stefanos Tsimenidis, Thomas Lagkas, and Konstantinos Rantos, “Deep Learning in IoT Intrusion Detection,” Journal of Network and Systems Management, vol. 30, pp. 1-40, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Thanasis Kotsiopoulos et al., “Machine Learning and Deep Learning in Smart Manufacturing: The Smart Grid Paradigm,” Computer Science Review, vol. 40, pp. 1-36, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] T. Aditya Sai Srinivas, and S.S. Manivannan, “Prevention of Hello Flood Attack in IoT Using Combination of Deep Learning with Improved Rider Optimization Algorithm,” Computer Communications, vol. 163, pp. 162-175, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Bo Yin et al., “FDC: A Secure Federated Deep Learning Mechanism for Data Collaborations in the Internet of Things,” IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6348-6359, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Shreshth Tuli et al., “HealthFog: An Ensemble Deep Learning Based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in Integrated IoT and fog Computing Environments,” Future Generation Computer Systems, vol. 104, pp. 187-200, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Yongxin Liu et al., “Zero-Bias Deep Learning for Accurate Identification of Internet-of-Things (IoT) Devices,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2627-2634, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Gonzalo De La Torre Parra et al., “Detecting Internet of Things Attacks Using Distributed Deep Learning,” Journal of Network and Computer Applications, vol. 163, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Serkan Ayvaz, and Koray Alpay, “Predictive Maintenance System for Production Lines in Manufacturing: A Machine Learning Approach Using IoT Data in Real-Time,” Expert Systems with Applications, vol. 173, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Jasneet Kaur et al., “Machine Learning Techniques for 5G and Beyond,” IEEE Access, vol. 9, pp. 23472-23488, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Aashma Uprety, and Danda B. Rawat, “Reinforcement Learning for IoT Security: A Comprehensive Survey,” IEEE Internet of Things Journal, vol. 8, no. 11, pp. 8693-8706, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Zaib Ullah et al., “Applications of Artificial Intelligence and Machine Learning in Smart Cities,” Computer Communications, vol. 154, pp. 313-323, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Iqbal H. Sarker, “Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions,” SN Computer Science, vol. 2, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Rasheed Ahmad, and Izzat Alsmadi, “Machine Learning Approaches to IoT Security: A Systematic Literature Review,” Internet of Things, vol. 14, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Lakshmi Sudha Kondaka et al., “An Intensive Healthcare Monitoring Paradigm by Using IoT Based Machine Learning Strategies,” Multimedia Tools and Applications, vol. 81, pp. 36891-36905, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Segun I. Popoola et al., “Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4944-4956, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Priyanka Dixit, and Sanjay Silakari, “Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review,” Computer Science Review, vol. 39, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Abdur Rahman et al., “Adversarial Examples—Security Threats to COVID-19 Deep Learning Systems in Medical IoT Devices,” IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9603-9610, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Mahmoud Abbasi, Amin Shahraki, and Amir Taherkordi, “Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey,” Computer Communications, vol. 170, pp. 19-41, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Nickolaos Koroniotis, Nour Moustafa, and Elena Sitnikova, “A New Network Forensic Framework Based on Deep Learning for Internet of Things Networks: A Particle Deep Framework,” Future Generation Computer Systems, vol. 110, pp. 91-106, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Iqbal H. Sarker, “Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective,” SN Computer Science, vol. 2, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Ruhul Amin Khalil et al., “Deep Learning in the Industrial Internet of Things: Potentials, Challenges, and Emerging Applications,” IEEE Internet of Things Journal, vol. 8, no. 14, pp. 11016-11040, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Safa Ben Atitallah et al., “Leveraging Deep Learning and IoT Big Data Analytics to Support the Smart Cities Development: Review and Future Directions,” Computer Science Review, vol. 38, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Shailendra Rathore, and Jong Hyuk Park, “A Blockchain-Based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems,” IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp. 5522-5532, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Abdulrahman Al-Abassi et al., “An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System,” IEEE Access, vol. 8, pp. 83965-83973, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Dilara Gümüşbaş et al., “A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems,” IEEE Systems Journal, vol. 15, no. 2, pp. 1717-1731, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Lerina Aversano et al., “A Systematic Review on Deep Learning Approaches for IoT Security,” Computer Science Review, vol. 40, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Mohamed Amine Ferrag et al., “Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis,” IEEE Access, vol. 9, pp.138509-138542, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Mohamed Ahzam Amanullah et al., “Deep Learning and Big Data Technologies for IoT Security,” Computer Communications, vol. 151, pp. 495-517, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Nour Moustafa, and Jill Slay, “UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set),” 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, pp. 1-6, 2015.
[CrossRef] [Google Scholar] [Publisher Link]