OHNN: An Optimized Hybrid Neural Network for Intrusion Detection Systems Using TLBO and CTO

International Journal of Electronics and Communication Engineering
© 2025 by SSRG - IJECE Journal
Volume 12 Issue 9
Year of Publication : 2025
Authors : Shourya Shukla, Ajay Singh Raghuvanshi, Saikat Majumder
pdf
How to Cite?

Shourya Shukla, Ajay Singh Raghuvanshi, Saikat Majumder, "OHNN: An Optimized Hybrid Neural Network for Intrusion Detection Systems Using TLBO and CTO," SSRG International Journal of Electronics and Communication Engineering, vol. 12,  no. 9, pp. 162-177, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I9P114

Abstract:

In recent years, cybersecurity has become a hot topic for exploration among researchers. The anomaly-based Detection methods have been widely used for early detection and mitigation of Intrusions. As the hardware is evolving, there is a need for exploration of new features. This is made possible through novel deep learning models. In this paper, an automated construction of various hybrid deep learning models is performed through a twin optimization algorithm. The Teaching Learning Based Optimization and Class Topper Optimization are used to generate new deep learning structures. The model parameters, like the Number of Hidden layers, the Optimizer and the Learning Rate, are controlled by TLBO. CTO was used to select different internal parameters such as Types of layers, Number of nodes per layer, the activation function and initializers. The proposed model was used to explore several deep learning models to train and test on the NSL-KDD dataset. Binary and Multiclass classifiers were explored for different neural network architectures based on TLBO and CTO parameters. The explored models showed comparable accuracy with respect to existing detection models.

Keywords:

Teaching Learning Based Optimization, Class Topper Optimization, Hybrid Neural Network, Intrusion Detection System, Optimization.

References:

[1] Salman Muneer et al., “A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis,” Journal of Engineering, vol. 2024, no. 1, pp. 1-16, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Abdul Qaddos et al., “A Novel Intrusion Detection Framework for Optimizing IoT Security,” Scientific Reports, vol. 14, pp. 1-22, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Albara Awajan, “A Novel Deep Learning-Based Intrusion Detection System for IoT Networks,” Computers, vol. 12, no. 2, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Emad Ul Haq Qazi, Muhammad Hamza Faheem, and Tanveer Zia, “HDLNIDS : Hybrid Deep-Learning-Based Network Intrusion Detection System,” Applied Sciences, vol. 13, no. 8, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Md. Alamgir Hossain, and Md. Saiful Islam, “Ensuring Network Security with a Robust Intrusion Detection System using Ensemble-Based Machine Learning,” Array, vol. 19, pp. 1-14, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Mansi Bhavsar et al., “Anomaly-based Intrusion Detection System for IoT Application,” Discover Internet of Things, vol. 3, pp. 1-23, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Zihan Wu et al., “RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System,” IEEE Access, vol. 10, pp. 64375-64387, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Sydney Mambwe Kasongo, “A Deep Learning Technique for Intrusion Detection System Using a Recurrent Neural Networks based Framework,” Computer Communications, vol. 199, pp. 113-125, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Mohamed Selim Korium et al., “Intrusion Detection System for Cyberattacks in the Internet of Vehicles Environment,” Ad Hoc Networks, vol. 153, pp. 1-16, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Dhiaa Musleh et al., “Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT,” Journal of Sensor and Actuator Networks, vol. 12, no. 2, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Hakan Can Altunay, and Zafer Albayrak, “A Hybrid CNN+LSTM based Intrusion Detection System for Industrial IoT Networks,” Engineering Science and Technology, an International Journal, vol. 38, pp. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] G. Logeswari, S. Bose, and T. Anitha, “An Intrusion Detection System for SDN Using Machine Learning,” Intelligent Automation & Soft Computing, vol. 35, no. 1, pp. 867-880, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Ajay Kaushik, and Hamed Al-Raweshidy, “A Novel Intrusion Detection System for Internet of Things Devices and Data,” Wireless Networks, vol. 30, pp. 258-294, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Salam Fraihat et al., “Intrusion Detection System for Large-Scale IoT NetFlow Networks Using Machine Learning with Modified Arithmetic Optimization Algorithm,” Internet of Things, vol. 22, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Abdullah Alzaqebah et al., “A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System,” Mathematics, vol. 10, no. 6, pp. 1-16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Dusmurod Kilichev, and Wooseong Kim, “Hyper-Parameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO,” Mathematics, vol. 11, no. 17, pp. 1-31, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Yesi Novaria Kunang et al., “Attack Classification of an Intrusion Detection System using Deep Learning and Hyper-Parameter Optimization,” Journal of Information Security and Applications, vol. 58, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Muhammad Imran et al., “Intrusion Detection in Networks using Cuckoo Search Optimization,” Soft Computing, vol. 26, pp. 10651-10663, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Shahid Latif et al., “DTL-IDS: An Optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm,” Journal of Network and Computer Applications, vol. 221, pp. 1-10, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Subham Kumar Gupta, Meenakshi Tripathi, and Jyoti Grover, “Hybrid Optimization and Deep Learning Based Intrusion Detection System,” Computers and Electrical Engineering, vol. 100, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Doaa Sami Khafaga et al., “Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection,” Computers, Materials & Continua, vol. 74, no. 2, pp. 3183-3198, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] R.V. Rao, V.J. Savsani, and D.P. Vakharia, “Teaching–Learning-Based Optimization: A Novel Method for Constrained Mechanical Design Optimization Problems,” Computer-Aided Design, vol. 43, no. 3, pp. 303-315, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Pranesh Das, Dushmanta Kumar Das, and Shouvik Dey, “A New Class Topper Optimization Algorithm with an Application to Data Clustering,” IEEE Transactions on Emerging Topics in Computing, vol. 8, no. 4, pp. 948-959, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Jonathan T. Barron, “Continuously Differentiable Exponential Linear Units,” arXiv Preprint, pp. 1-2, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Mahbod Tavallaee et al., “A Detailed Analysis of the KDD CUP 99 Data Set,” 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, pp. 1-6, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[26] R. Vinayakumar et al., “Deep Learning Approach for Intelligent Intrusion Detection System,” IEEE Access, vol. 7, pp. 41525-41550, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Mohammad Almseidin et al., “Evaluation of Machine Learning Algorithms for Intrusion Detection System,” 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia, pp. 277-282, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Bhupendra Ingre, Anamika Yadav, and Atul Kumar Soni, “Decision Tree Based Intrusion Detection System for NSL-KDD Dataset,” Information and Communication Technology for Intelligent Systems, vol. 2, pp. 207-218, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Dongzi Jin et al., “SwiftIDS: Real-Time Intrusion Detection System based on LightGBM and Parallel Intrusion Detection Mechanism,” Computers & Security, vol. 97, 2020.
[CrossRef] [Google Scholar] [Publisher Link]