Intelligent Security Algorithm to Avoid Any Intrusions

Authors

  • Ayad Osama Jalal Assistant Lecturer, Al-Iraqia University, Faculty of Administration and Economics

Keywords:

Intrusion Detection System (IDS), Robust Intelligent Security Algorithm (RISA), Hybrid Deep Learning, Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), Anomaly Detection, Cybersecurity, Internet of Things (IoT), UNSW-NB15

Abstract

Modern cybersecurity ecosystems have been impacted significantly by sophisticated cyberattack strategies; including polymorphic malware, zero-day exploits and insider attacks, all of which are complicated even more so by the widespread proliferation of  Internet of Things (IoT) technology. Many traditional IDS platforms have difficulty keeping pace with the dynamic evolution of threats, primarily due to two major shortcomings: their inability to recognize new attack patterns and the unreasonably high false positive rate at which they alert security teams. To address those shortcomings, this study introduces a Robust Intelligent Security Algorithm (RISA). By integrating Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks this hybrid deep learning architecture extracts spatial features and captures temporal patterns from data traffic to detect multi-step attacks. Results from experimental testing using the UNSW-NB15 dataset demonstrate that the proposed RISA has an accuracy of 98.5%; a precision of 98.1% and a recall of 98.6%, resulting in an F1 Score of 98.35%. Furthermore, the proposed model exhibits a very low false positive rate (1.7%) and an average inference time of 0.04 milliseconds. Therefore, the results clearly illustrate the ability of the proposed algorithm to accurately detect threats in real-time, while being operationally efficient; making it suitable for deployment in modern fast-paced network environments.

References

[1] R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, “Deep Learning Approach for Intelligent Intrusion Detection System,” IEEE Access, vol. 7, pp. 41525–41550, 2019, https://doi.or/10.1109/ACCESS.2019.2895334 .

[2] M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, and M. Guizani, “A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1646–1685, Apr. 2020, https://doi.org/10.1109/COMST.2020.2988293 .

[3] M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, “Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study,” Journal of Information Security and Applications, vol. 50, p. 102419, Feb. 2020, https://doi.org/10.1016/j.jisa.2019.102419 .

[4] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444, May 2015, https://doi.org/10.1038/nature14539 .

[5] A. Graves, “Long Short-Term Memory,” 2012, pp. 37–45. https://doi.org/10.1007/978-3-642-24797-2_4 .

[6] N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, Nov. 2015, pp. 1–6. https://doi.org/10.1109/MilCIS.2015.7348942 .

[7] I. H. Sarker, “Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions,” SN Comput. Sci., vol. 2, no. 6, p. 420, Nov. 2021, https://doi.org/10.1007/s42979-021-00815-1 .

[8] M. Roesch, “Snort - Lightweight intrusion detection for networks,” in Proceedings of the 13th Systems Administration Conference (LISA ’99), Seattle, WA, USA: USENIX Association, 1999, pp. 229–238. [Online]. Available: https://www.usenix.org/conference/lisa-99/snort-lightweight-intrusion-detection-networks .

[9] A. K. Jain, “Comparative Analysis of Signature-Based and Anomaly-Based IDS,” International Journal of Advanced Research in Computer Science and Engineering (IJARCSE), vol. 1, no. 3, pp. 25–31, Aug. 2025. https://ijarcse.org/index.php/ijarcse/article/view/70 .

[10] R. Ahmad, I. Alsmadi, W. Alhamdani, and L. Tawalbeh, “Zero-day attack detection: a systematic literature review,” Artif. Intell. Rev., vol. 56, no. 10, pp. 10733–10811, Oct. 2023, https://doi.org/10.1007/s10462-023-10437-z .

[11] H. Hindy et al., “A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems,” IEEE Access, vol. 8, pp. 104650–104675, 2020, https://doi.org/10.1109/ACCESS.2020.3000179 .

[12] V. Jyothsna, V. V. Rama Prasad, and K. Munivara Prasad, “A Review of Anomaly based Intrusion Detection Systems,” Int. J. Comput. Appl., vol. 28, no. 7, pp. 26–35, Aug. 2011, https://doi.org/10.5120/3399-4730 .

[13] C. Wang, Y. Sun, W. Wang, H. Liu, and B. Wang, “Hybrid Intrusion Detection System Based on Combination of Random Forest and Autoencoder,” Symmetry (Basel)., vol. 15, no. 3, p. 568, Feb. 2023, https://doi.org/10.3390/sym15030568 .

[14] A. S. Khanfar, F. A. Lone, and M. D. Moizuddin, “A Comprehensive Survey on Support Vector Machines for Intrusion Detection System,” International Journal of Knowledge Based Computer Systems, vol. 10, no. 1, pp. 33–39, 2022. https://www.academia.edu/download/103153483/A_Comprehensive_Survey_on_Support_Vector_Machines_for_Intrusion_Detection_System.pdf

[15] X. Yu, X. Yang, Q. Tan, C. Shan, and Z. Lv, “An edge computing based anomaly detection method in IoT industrial sustainability,” Appl. Soft Comput., vol. 128, p. 109486, Oct. 2022, https://doi.org/10.1016/j.asoc.2022.109486 .

[16] Z. K. Maseer, R. Yusof, N. Bahaman, S. A. Mostafa, and C. F. M. Foozy, “Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset,” IEEE Access, vol. 9, pp. 22351–22370, 2021, https://doi.org/10.1109/ACCESS.2021.3056614 .

[17] S. K. Wanjau, G. M. Wambugu, A. M. Oirere, and G. M. Muketha, “Discriminative spatial-temporal feature learning for modeling network intrusion detection systems,” J. Comput. Secur., vol. 32, no. 1, pp. 1–30, Feb. 2024, https://doi.org/10.3233/JCS-220031 .

[18] A. Nurain, V. Satria M, and Navalino, “ENHANCING INTRUSION DETECTION SYSTEM PERFORMANCE WITH 1D-CNN AND BI -LSTM COMBINATION,” International Journal of Application on Sciences, Technology and Engineering, vol. 1, no. 3, pp. 921–930, Aug. 2023, https://doi.org/10.24912/ijaste.v1.i3.921-930 .

[19] E. U. H. Qazi, A. Almorjan, and T. Zia, “A One-Dimensional Convolutional Neural Network (1D-CNN) Based Deep Learning System for Network Intrusion Detection,” Applied Sciences, vol. 12, no. 16, p. 7986, Aug. 2022, https://doi.org/10.3390/app12167986 .

[20] F. Sherratt, A. Plummer, and P. Iravani, “Understanding LSTM Network Behaviour of IMU-Based Locomotion Mode Recognition for Applications in Prostheses and Wearables,” Sensors, vol. 21, no. 4, p. 1264, Feb. 2021, https://doi.org/10.3390/s21041264 .

[21] M. Ashfaq Khan and Y. Kim, “Deep Learning-Based Hybrid Intelligent Intrusion Detection System,” Computers, Materials & Continua, vol. 68, no. 1, pp. 671–687, 2021, https://doi.org/10.32604/cmc.2021.015647 .

[22] I. Sharafaldin, A. Habibi Lashkari, and A. A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization,” in Proceedings of the 4th International Conference on Information Systems Security and Privacy, SCITEPRESS - Science and Technology Publications, 2018, pp. 108–116. https://doi.org/10.5220/0006639801080116 .

[23] A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi, and R. Ahmad, “CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System,” IEEE Access, vol. 10, pp. 99837–99849, 2022, https://doi.org/10.1109/ACCESS.2022.3206425 .

[24] S. R. Devi, H. Vallem, S. Chokkarapu, J. Hazel, and A. Badrapu, “*MTH-IDS—A Multi-tiered Hybrid Intrusion Detection System for Internet of Vehicle,” 2026, pp. 381–392. https://doi.org/10.1007/978-981-95-0140-3_38 .

[25] K. Bella et al., “An efficient intrusion detection system for IoT security using CNN decision forest,” PeerJ Comput. Sci., vol. 10, p. e2290, Sep. 2024, https://doi.org/10.7717/peerj-cs.2290 .

[26] S. Sadhwani, M. A. H. Khan, R. Muthalagu, P. M. Pawar, and K. Suresh, “A hybrid BiLSTM-CNN approach for intrusion detection for IoT applications,” Sci. Rep., vol. 16, no. 1, p. 155, Dec. 2025, https://doi.org/10.1038/s41598-025-29079-y .

[27] Md. A. Akif, M. Karnyn, and S. S. Anwar, “A Hybrid Deep Learning Model for Intrusion Detection in IoT Networks,” in 2024 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), IEEE, Dec. 2024, pp. 041–046. https://doi.org/10.1109/WIECON-ECE64149.2024.10915033 .

[28] D. P. Kingma and J. Ba, “Adam: A Method for Stochastic Optimization,” in Proceedings of the 3rd International Conference on Learning Representations (ICLR), San Diego, CA, USA, 2015. https://arxiv.org/abs/1412.6980 .

Downloads

Published

2026-02-04

How to Cite

Ayad Osama Jalal. (2026). Intelligent Security Algorithm to Avoid Any Intrusions. Web of Scholars : Multidimensional Research Journal, 5(1), 15–29. Retrieved from https://journals.innoscie.com/index.php/wos/article/view/148

Similar Articles

<< < 1 2 3 > >> 

You may also start an advanced similarity search for this article.