Department of Electronics and Communication Engineering, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, Avadi, Chennai, Tamil Nadu, India.
In cybersecurity, network security systems (NSS) are technologies used to protect sensitive data against increasing cyber-attacks. This paper has carried out the process of integrating advanced Machine Learning (ML) techniques such as the Long Short-Term Memory (LSTM) networks along with the Convolutional Neural Networks (CNN) for the task of enhancing the Intrusion Detection Systems (IDS) in the NSS. Usually, the traditional models have faced many challenges, such as high false positive rates (FPR) and the need for real-time processing of extensive data streams, which make these systems insufficient to handle such scenarios. So, to handle these complications, ML has evolved to propose improvements in IDS implementation by adapting to new attacks and detecting complex patterns with greater accuracy. The study introduced a novel deep learning (DL), “GC-SLSTM,” that combined models such as Gated CNN with Stacked LSTM to address these challenges. This model includes CNN robust spatial pattern recognition and the LSTM that effectively handles the temporal data analysis. The proposed model was experimented with using the CICIDS2018 dataset, and the results demonstrate that the proposed Gated CNN + Stacked LSTM (GC-SLSTM) had achieved an accuracy of up to 99.59%, precision of 99.58% and a recall of 99.47%, culminating in an F1-score of 99.59%.
S. P. Thirimanne, L. Jayawardana, L. Yasakethu, P. Liyanaarachchi, and C. Hewage, “Deep Neural Network Based Real-Time Intrusion Detection System,” SN Computer Science, vol. 3, no. 2, Jan. 2022, doi: 10.1007/s42979-022-01031-1.
L. Yang, J. Li, L. Yin, Z. Sun, Y. Zhao, and Z. Li, “Real-Time Intrusion Detection in Wireless Network: A Deep Learning-Based Intelligent Mechanism,” IEEE Access, vol. 8, pp. 170128–170139, 2020, doi: 10.1109/access.2020.3019973.
J. Liu et al., “Toward security monitoring of industrial Cyber-Physical systems via hierarchically distributed intrusion detection,” Expert Systems with Applications, vol. 158, p. 113578, Nov. 2020, doi: 10.1016/j.eswa.2020.113578.
I. Dutt, S. Borah, and I. K. Maitra, “Immune System Based Intrusion Detection System (IS-IDS): A Proposed Model,” IEEE Access, vol. 8, pp. 34929–34941, 2020, doi: 10.1109/access.2020.2973608.
N. Krishnadoss and L. Kumar Ramasamy, “A study on high dimensional big data using predictive data analytics model,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 1, p. 174, Apr. 2023, doi: 10.11591/ijeecs. v30.i1. pp174-182.
N. Krishnadoss and L. K. Ramasamy, “Crop yield prediction with environmental and chemical variables using optimized ensemble predictive model in machine learning,” Environmental Research Communications, vol. 6, no. 10, p. 101001, Oct. 2024, doi: 10.1088/2515-7620/ad7e81.
“An E-Commerce Based Personalized Health Product Recommendation System Using CNN-Bi-LSTM Model,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 6, pp. 398–410, Dec. 2023, doi: 10.22266/ijies2023.1231.33.
A. Alferaidi et al., “Distributed Deep CNN-LSTM Model for Intrusion Detection Method in IoT-Based Vehicles,” Mathematical Problems in Engineering, vol. 2022, pp. 1–8, Mar. 2022, doi: 10.1155/2022/3424819.
B. Padmavathi and B. Muthukumar, “A deep recursively learning LSTM model to improve cyber security botnet attack intrusion detection,” International Journal of Modeling, Simulation, and Scientific Computing, vol. 14, no. 02, May 2022, doi: 10.1142/s1793962323410180.
P. Krishnamoorthy et al., “Effective Scheduling of Multi-Load Automated Guided Vehicle in Spinning Mill: A Case Study,” IEEE Access, vol. 11, pp. 9389–9402, 2023, doi: 10.1109/access.2023.3236843.
S. Sengupta et al., “A review of deep learning with special emphasis on architectures, applications and recent trends,” Knowledge-Based Systems, vol. 194, p. 105596, Apr. 2020, doi: 10.1016/j.knosys.2020.105596.
Mahalakshmi, R. L. Kumar, K. S. Ranjini, S. Sindhu, and R. Udhayakumar, “Efficient authenticated key establishment protocol for telecare medicine information systems,” Industrial, Mechanical And Electrical Engineering, vol. 2676, p. 020006, 2022, doi: 10.1063/5.0117522.
U. Chadha et al., “Powder Bed Fusion via Machine Learning-Enabled Approaches,” Complexity, vol. 2023, pp. 1–25, Apr. 2023, doi: 10.1155/2023/9481790.
S. Kunjiappan, L. K. Ramasamy, S. Kannan, P. Pavadai, P. Theivendren, and P. Palanisamy, “Optimization of ultrasound-aided extraction of bioactive ingredients from Vitis vinifera seeds using RSM and ANFIS modeling with machine learning algorithm,” Scientific Reports, vol. 14, no. 1, Jan. 2024, doi: 10.1038/s41598-023-49839-y.
S. Ranshous, S. Shen, D. Koutra, S. Harenberg, C. Faloutsos, and N. F. Samatova, “Anomaly detection in dynamic networks: a survey,” WIREs Computational Statistics, vol. 7, no. 3, pp. 223–247, Mar. 2015, doi: 10.1002/wics.1347.
R. K. Poluru and R. Lokeshkumar, “Meta-Heuristic MOALO Algorithm for Energy-Aware Clustering in the Internet of Things,” International Journal of Swarm Intelligence Research, vol. 12, no. 2, pp. 74–93, Apr. 2021, doi: 10.4018/ijsir.2021040105.
B. R. R. Reddy and R. L. Kumar, “A Fusion Model for Personalized Adaptive Multi-Product Recommendation System Using Transfer
S. Sengan, S. Vairavasundaram, L. Ravi, A. Q. M. AlHamad, H. A. Alkhazaleh, and M. Alharbi, “Fake News Detection Using Stance Extracted Multimodal Fusion-Based Hybrid Neural Network,” IEEE Transactions on Computational Social Systems, vol. 11, no. 4, pp. 5146–5157, Aug. 2024, doi: 10.1109/tcss.2023.3269087.
S. Panneerselvam, S. K. Thangavel, V. S. Ponnam, and S. Sengan, “Federated learning-based fire detection method using local MobileNet,” Scientific Reports, vol. 14, no. 1, Dec. 2024, doi: 10.1038/s41598-024-82001-w.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Rukmani Devi S, Manju A, Lakshmi T K, Venkataramanaiah B, Sureshkumar Chandrasekaran and Lakshmi Prasanna P;
Methodology: Rukmani Devi S, Manju A, Lakshmi T K and Venkataramanaiah B;
Software: Sureshkumar Chandrasekaran and Lakshmi Prasanna P;
Data Curation: Rukmani Devi S, Manju A, Lakshmi T K and Venkataramanaiah B;
Writing- Original Draft Preparation: Rukmani Devi S, Manju A, Lakshmi T K, Venkataramanaiah B, Sureshkumar Chandrasekaran and Lakshmi Prasanna P;
Supervision: Rukmani Devi S, Manju A and Lakshmi T K;
Validation: Sureshkumar Chandrasekaran and Lakshmi Prasanna P;
Writing- Reviewing and Editing: Rukmani Devi S, Manju A, Lakshmi T K, Venkataramanaiah B, Sureshkumar Chandrasekaran and Lakshmi Prasanna P;
All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
We would like to thank Reviewers for taking the time and effort necessary to review the manuscript. We sincerely appreciate all valuable comments and suggestions, which helped us to improve the quality of the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Rukmani Devi S
Department of Computer Science, Saveetha College of Liberal Arts and Sciences, SIMATS Deemed to be University, Chennai, Tamil Nadu, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Rukmani Devi S, Manju A, Lakshmi T K, Venkataramanaiah B, Sureshkumar Chandrasekaran and Lakshmi Prasanna P, “Enhancing Network Security Intrusion Detection and Real-Time Response with Long Short-Term Memory Networks”, Journal of Machine and Computing, pp. 994-1006, April 2025, doi: 10.53759/7669/jmc202505079.