In the fast-changing world of cybersecurity, cyber threats have been challenging the traditional defence mechanisms in the signature-based Intrusion Detection Systems (IDS). Although these systems are effective for detecting known threats and cannot handle advanced, unknown and evasion-based attacks. The proposed work presents an enhanced signature-based IDS framework to bridge the gap of conventional approaches toward detecting advanced persistent threats and provide timely responses to security incidents. The proposed methodology uses hyper-scaler feature engineering with a Long Short-Term Memory Gated Recurrent Neural Network (LSTM-GRNN) improves the efficacy and accuracy in intrusion detection. The approach pre-processes to start with the min-max normalization by ensuring uniform scaling of feature values. A new technique named Intrusion Behavior Feature Pattern Impact Rate (IBFPIR) is proposed to determine the relevance of feature patterns that are more related to intrusion behavior in malicious activities. For optimization of feature selection, a new advanced optimization approach such as Simplified Whale Optimization Algorithm (SWOA) is used for information gain while minimizing redundancy and reducing the dimensionality along with superior model performance. Finally, the LSTM-GRNN architecture is applied to classify intrusion behaviors based on the refined features. The long-term dependencies in time-series data captured by the LSTM combined with gated recurrent units is used to learn patterns during intrusion detection. The proposed system gives a better performance interms of accuracy (97%), precision (98%), recall (97%), F1 score (98%), with reduced false positive rate (FPR of 4%) and false negative rate (FNR of 5%) compared with existing models. The proposed work gives a significant development in intrusion detection systems in safeguarding sensitive data against cyber threats.
Y. Otoum and A. Nayak, “AS-IDS: Anomaly and Signature Based IDS for the Internet of Things,” Journal of Network and Systems Management, vol. 29, no. 3, Mar. 2021, doi: 10.1007/s10922-021-09589-6.
B. Nawaal, U. Haider, I. U. Khan, and M. Fayaz, “Signature-Based Intrusion Detection System for IoT,” Cyber Security for Next-Generation Computing Technologies, pp. 141–158, Nov. 2023, doi: 10.1201/9781003404361-8.
M. Sajid et al., “Enhancing intrusion detection: a hybrid machine and deep learning approach,” Journal of Cloud Computing, vol. 13, no. 1, Jul. 2024, doi: 10.1186/s13677-024-00685-x.
S. Hizal, U. Cavusoglu, and D. Akgun, “A novel deep learning-based intrusion detection system for IoT DDoS security,” Internet of Things, vol. 28, p. 101336, Dec. 2024, doi: 10.1016/j.iot.2024.101336.
O. H. Abdulganiyu, T. A. Tchakoucht, and Y. K. Saheed, “RETRACTED ARTICLE: Towards an efficient model for network intrusion detection system (IDS): systematic literature review,” Wireless Networks, vol. 30, no. 1, pp. 453–482, Sep. 2023, doi: 10.1007/s11276-023-03495-2.
Andy Victor Amanoul and Adnan Mohsin Abdulazeez, “Enhanced Intrusion Detection System Using Deep Learning Algorithms : A Review,” Indonesian Journal of Computer Science, vol. 13, no. 3, Jun. 2024, doi: 10.33022/ijcs.v13i3.4002.
S. M. S. Bukhari et al., “Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability,” Ad Hoc Networks, vol. 155, p. 103407, Mar. 2024, doi: 10.1016/j.adhoc.2024.103407.
Z. T. Pritee, M. H. Anik, S. B. Alam, J. R. Jim, M. M. Kabir, and M. F. Mridha, “Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review,” Computers & Security, vol. 140, p. 103747, May 2024, doi: 10.1016/j.cose.2024.103747.
Yogesh and L. M. Goyal, “Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes,” International Journal of Information Security, vol. 24, no. 1, Nov. 2024, doi: 10.1007/s10207-024-00947-4.
U. Ahmed et al., “Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering,” Scientific Reports, vol. 15, no. 1, Jan. 2025, doi: 10.1038/s41598-025-85866-7.
F. S. Alrayes, M. Zakariah, S. U. Amin, Z. I. Khan, and J. S. Alqurni, “Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System,” Computers, Materials & Continua, vol. 80, no. 1, pp. 1457–1490, 2024, doi: 10.32604/cmc.2024.051996.
Malibari et al., “A novel metaheuristics with deep learning enabled intrusion detection system for secured smart environment,” Sustainable Energy Technologies and Assessments, vol. 52, p. 102312, Aug. 2022, doi: 10.1016/j.seta.2022.102312.
M. Deivakani, M. S. Sheela, K. Priyadarsini, and Y. Farhaoui, “An intelligent security mechanism in mobile Ad-Hoc networks using precision probability genetic algorithms (PPGA) and deep learning technique (Stacked LSTM),” Sustainable Computing: Informatics and Systems, vol. 43, p. 101021, Sep. 2024, doi: 10.1016/j.suscom.2024.101021.
B. Sharma, L. Sharma, C. Lal, and S. Roy, “Anomaly based network intrusion detection for IoT attacks using deep learning technique,” Computers and Electrical Engineering, vol. 107, p. 108626, Apr. 2023, doi: 10.1016/j.compeleceng.2023.108626.
R. Devendiran and A. V. Turukmane, “Dugat-LSTM: Deep learning-based network intrusion detection system using chaotic optimization strategy,” Expert Systems with Applications, vol. 245, p. 123027, Jul. 2024, doi: 10.1016/j.eswa.2023.123027.
K. Shafi and H. A. Abbass, “An adaptive genetic-based signature learning system for intrusion detection,” Expert Systems with Applications, vol. 36, no. 10, pp. 12036–12043, Dec. 2009, doi: 10.1016/j.eswa.2009.03.036.
M. Vishwakarma and N. Kesswani, “A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection,” Decision Analytics Journal, vol. 7, p. 100233, Jun. 2023, doi: 10.1016/j.dajour.2023.100233.
Hnamte and J. Hussain, “DCNNBiLSTM: An Efficient Hybrid Deep Learning-Based Intrusion Detection System,” Telematics and Informatics Reports, vol. 10, p. 100053, Jun. 2023, doi: 10.1016/j.teler.2023.100053.
A.Balla, M. H. Habaebi, E. A. A. Elsheikh, Md. R. Islam, F. E. M. Suliman, and S. Mubarak, “Enhanced CNN-LSTM Deep Learning for SCADA IDS Featuring Hurst Parameter Self-Similarity,” IEEE Access, vol. 12, pp. 6100–6116, 2024, doi: 10.1109/access.2024.3350978.
S. M. Kasongo, “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework,” Computer Communications, vol. 199, pp. 113–125, Feb. 2023, doi: 10.1016/j.comcom.2022.12.010.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Hemanth Uppala and Renuga Devi R;
Methodology: Hemanth Uppala;
Software: Renuga Devi R;
Data Curation: Hemanth Uppala;
Writing-Original Draft Preparation: Hemanth Uppala and Renuga Devi R;
Visualization: Hemanth Uppala;
Investigation: Renuga Devi R;
Supervision: Hemanth Uppala;
Validation: Renuga Devi R;
Writing- Reviewing and Editing: Hemanth Uppala and Renuga Devi R;
All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
Author(s) thanks to Dr. Renuga Devi R for this research completion and support.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Hemanth Uppala
Department of Computer Science and Applications, SRM Institute of Science and Technology Ramapuram Campus, Chennai, Tamil Nadu, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Hemanth Uppala and Renuga Devi R, “Enhanced Signature Based Intrusion Detection System Using Hyper Scalar Feature Engineering With LSTM Gated Recurrent Neural Network”, Journal of Machine and Computing, vol.6, no.1, pp. 058-072, 2026, doi: 10.53759/7669/jmc202606006.