Energy-Efficient Bio-Inspired Hybrid Deep Learning Model for Network Intrusion Detection Based on Intelligent Decision Making
Keywords:
Network Security, Bio-Inspired Algorithms, Hybrid Deep Learning, Energy Efficiency, Intelligent Decision Making, Resource Optimization, Computational Efficiency, Anomaly Detection, Deep LearningAbstract
This study presents an energy-efficient, hybrid deep learning model for network intrusion detection that takes its cues from biology. As a result, intelligent decision-making is included into the improvement of security infrastructures. The model's high accuracy is shown by the fact that it performs well across a variety of metrics, including TPR, precision, and F-Measure, thanks to the use of deep learning and techniques inspired by biology. Despite the fact that there is some unpredictability in FPR and FNR, the data demonstrate that the model is capable of providing a long-term and intelligent response to the ever-changing cybersecurity threats
Downloads
References
A.almaiah and O. Almomani, “An investigator digital forensics frequencies particle swarm optimization for detection and classification of apt attack in fog computing environment (IDF-FPSO),” Journal of Theoretical and Applied Information Technology, vol. 98, no. 7, pp. 937–952, 2020.
J. Khan and N. Jain, “A survey on intrusion detection systems and classification techniques,” International Journal of Scientific Research in Science, Engineering and Technology, vol. 2, no. 5, pp. 202–208, 2016.
T. F. Ghanem, W. S. Elkilani and H. M. Abdul-Kader, “A hybrid approach for efficient anomaly detection using metaheuristic methods,” Journal of Advanced Research, vol. 6, no. 4, pp. 609–619, 2015.
L. Li, Y. Yu, S. Bai, J. Cheng and X. Chen, “Towards effective network intrusion detection: A hybrid model integrating Gini index and GBDT with PSO,” Journal of Sensors, vol. 2018, no. 6, pp. 1–9, 2018.
M. Madi, F. Jarghon, Y. Fazea, O. Almomani and A. Saaidah, “Comparative analysis of classification techniques for network fault management,” Turkish Journal of Electrical Engineering and Computer Sciences, vol. 28, no. 3, pp. 1442–1457, 2020.
M. Nasir, A. Javed, M. Tariq, M. Asim and T. Baker, “Feature engineering and deep learning-based intrusion detection framework for securing edge IoT,” The Journal of Supercomputing, vol. 78, no. 6, pp. 8852–8866, 2022.
P. Mrutyunjaya and M. R. Patra, “Network intrusion detection using Naïve Bayes,” International Journal of Computer Science and Network Security, vol. 7, no. 12, pp. 258–263, 2007.
T. Vidal, T. Crainic, M. Gendreau and C. Prins, “A hybrid genetic algorithm with adaptive diversity management for a large class of vehicle routing problems with time-windows,” Journal of Computers & Operations Research, vol. 40, no. 1, pp. 475–489, 2013.
K. Aurangzeb, B. Baharum, L. H. Lee and K. Khairullah, “A Review of machine learning algorithms for textdocuments classification,” Journal of Advances in Information Technology, vol. 1, no. 1, pp. 4–20, 2010.
S. Sunita, B. J. Chandrakanta and R. Chinmayee, “A hybrid Approach of intrusion detection using ANN and FCM,” European Journal of Advances in Engineering and Technology, vol. 3, no. 2, pp. 6–14, 2016.
Neha Sharma, P. William, Kushagra Kulshreshtha, Gunjan Sharma, Bhadrappa Haralayya, Yogesh Chauhan, Anurag Shrivastava, “Human Resource Management Model with ICT Architecture: Solution of Management & Understanding of Psychology of Human Resources and Corporate Social Responsibility”, JRTDD, vol. 6, no. 9s(2), pp. 219–230, Aug. 2023.
William, P., Shrivastava, A., Chauhan, P.S., Raja, M., Ojha, S.B., Kumar, K. (2023). Natural Language Processing Implementation for Sentiment Analysis on Tweets. In: Marriwala, N., Tripathi, C., Jain, S., Kumar, D. (eds) Mobile Radio Communications and 5G Networks. Lecture Notes in Networks and Systems, vol 588. Springer, Singapore. https://doi.org/10.1007/978-981-19-7982-8_26
K. Maheswari, P. William, Gunjan Sharma, Firas Tayseer Mohammad Ayasrah, Ahmad Y. A. Bani Ahmad, Gowtham Ramkumar, Anurag Shrivastava, “Enterprise Human Resource Management Model by Artificial Intelligence to Get Befitted in Psychology of Consumers Towards Digital Technology”, JRTDD, vol. 6, no. 10s(2), pp. 209–220, Sep. 2023.
Anurag Shrivastava, S. J. Suji Prasad, Ajay Reddy Yeruva, P. Mani, Pooja Nagpal & Abhay Chaturvedi (2023): IoT Based RFID Attendance Monitoring System of Students using Arduino ESP8266 & Adafruit.io on Defined Area, Cybernetics and Systems.
William, G. R. Lanke, D. Bordoloi, A. Shrivastava, A. P. Srivastavaa and S. V. Deshmukh, "Assessment of Human Activity Recognition based on Impact of Feature Extraction Prediction Accuracy," 2023 4th International Conference on Intelligent Engineering and Management (ICIEM), London, United Kingdom, 2023, pp. 1-6, doi: 10.1109/ICIEM59379.2023.10166247
Mariani, M., & Fosso Wamba, S. (2020). Exploring how consumer goods companies innovate in the digital age: The role of big data analytics companies. Journal of Business Research, 121, 338–352. Mayring, P. (2008). Qualitative Inhalts analyse (p. 6). Beltz Deutscher Studien Verlag.
Nguyen, B., & Simkin, L. (2017). The Internet of Things (IoT) and marketing: The state of play, future trends and the implications for marketing. Journal of Marketing Management, 33(1–2), 1–6.
Shrivastava, A., Chakkaravarthy, M., Shah, M.A., A new machine learning method for predicting systolic and diastolic blood pressure using clinical characteristics. In Healthcare Analytics, 2023, 4, 10021
Shrivastava, A., Chakkaravarthy, M., Shah, M.A.,Health Monitoring based Cognitive IoT using Fast Machine Learning Technique. In International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(6s), pp. 720–72
Shrivastava, A., Rajput, N., Rajesh, P., Swarnalatha, S.R., IoT-Based Label Distribution Learning Mechanism for Autism Spectrum Disorder for Healthcare Application. In Practical Artificial Intelligence for Internet of Medical Things: Emerging Trends, Issues, and Challenges, 2023, pp. 305–321
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.