Journal of Machine and Computing


Enhanced Signature Based Intrusion Detection System Using Hyper Scalar Feature Engineering With LSTM Gated Recurrent Neural Network



Journal of Machine and Computing

Received On : 18 April 2025

Revised On : 12 September 2025

Accepted On : 03 October 2025

Published On : 14 October 2025

Volume 06, Issue 01

Pages : 058-072


Abstract


In the fast-changing world of cybersecurity, cyber threats have been challenging the traditional defence mechanisms in the signature-based Intrusion Detection Systems (IDS). Although these systems are effective for detecting known threats and cannot handle advanced, unknown and evasion-based attacks. The proposed work presents an enhanced signature-based IDS framework to bridge the gap of conventional approaches toward detecting advanced persistent threats and provide timely responses to security incidents. The proposed methodology uses hyper-scaler feature engineering with a Long Short-Term Memory Gated Recurrent Neural Network (LSTM-GRNN) improves the efficacy and accuracy in intrusion detection. The approach pre-processes to start with the min-max normalization by ensuring uniform scaling of feature values. A new technique named Intrusion Behavior Feature Pattern Impact Rate (IBFPIR) is proposed to determine the relevance of feature patterns that are more related to intrusion behavior in malicious activities. For optimization of feature selection, a new advanced optimization approach such as Simplified Whale Optimization Algorithm (SWOA) is used for information gain while minimizing redundancy and reducing the dimensionality along with superior model performance. Finally, the LSTM-GRNN architecture is applied to classify intrusion behaviors based on the refined features. The long-term dependencies in time-series data captured by the LSTM combined with gated recurrent units is used to learn patterns during intrusion detection. The proposed system gives a better performance interms of accuracy (97%), precision (98%), recall (97%), F1 score (98%), with reduced false positive rate (FPR of 4%) and false negative rate (FNR of 5%) compared with existing models. The proposed work gives a significant development in intrusion detection systems in safeguarding sensitive data against cyber threats.


Keywords


Intrusion Detection System, Feature Engineering, Long Short-Term Memory, Whale Optimization Algorithm, Intrusion Behaviour Detection, Cybersecurity.


  1. Y. Otoum and A. Nayak, “AS-IDS: Anomaly and Signature Based IDS for the Internet of Things,” Journal of Network and Systems Management, vol. 29, no. 3, Mar. 2021, doi: 10.1007/s10922-021-09589-6.
  2. B. Nawaal, U. Haider, I. U. Khan, and M. Fayaz, “Signature-Based Intrusion Detection System for IoT,” Cyber Security for Next-Generation Computing Technologies, pp. 141–158, Nov. 2023, doi: 10.1201/9781003404361-8.
  3. M. Sajid et al., “Enhancing intrusion detection: a hybrid machine and deep learning approach,” Journal of Cloud Computing, vol. 13, no. 1, Jul. 2024, doi: 10.1186/s13677-024-00685-x.
  4. S. Hizal, U. Cavusoglu, and D. Akgun, “A novel deep learning-based intrusion detection system for IoT DDoS security,” Internet of Things, vol. 28, p. 101336, Dec. 2024, doi: 10.1016/j.iot.2024.101336.
  5. O. H. Abdulganiyu, T. A. Tchakoucht, and Y. K. Saheed, “RETRACTED ARTICLE: Towards an efficient model for network intrusion detection system (IDS): systematic literature review,” Wireless Networks, vol. 30, no. 1, pp. 453–482, Sep. 2023, doi: 10.1007/s11276-023-03495-2.
  6. Andy Victor Amanoul and Adnan Mohsin Abdulazeez, “Enhanced Intrusion Detection System Using Deep Learning Algorithms : A Review,” Indonesian Journal of Computer Science, vol. 13, no. 3, Jun. 2024, doi: 10.33022/ijcs.v13i3.4002.
  7. S. M. S. Bukhari et al., “Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability,” Ad Hoc Networks, vol. 155, p. 103407, Mar. 2024, doi: 10.1016/j.adhoc.2024.103407.
  8. Z. T. Pritee, M. H. Anik, S. B. Alam, J. R. Jim, M. M. Kabir, and M. F. Mridha, “Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review,” Computers & Security, vol. 140, p. 103747, May 2024, doi: 10.1016/j.cose.2024.103747.
  9. Yogesh and L. M. Goyal, “Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes,” International Journal of Information Security, vol. 24, no. 1, Nov. 2024, doi: 10.1007/s10207-024-00947-4.
  10. U. Ahmed et al., “Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering,” Scientific Reports, vol. 15, no. 1, Jan. 2025, doi: 10.1038/s41598-025-85866-7.
  11. F. S. Alrayes, M. Zakariah, S. U. Amin, Z. I. Khan, and J. S. Alqurni, “Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System,” Computers, Materials & Continua, vol. 80, no. 1, pp. 1457–1490, 2024, doi: 10.32604/cmc.2024.051996.
  12. Malibari et al., “A novel metaheuristics with deep learning enabled intrusion detection system for secured smart environment,” Sustainable Energy Technologies and Assessments, vol. 52, p. 102312, Aug. 2022, doi: 10.1016/j.seta.2022.102312.
  13. M. Deivakani, M. S. Sheela, K. Priyadarsini, and Y. Farhaoui, “An intelligent security mechanism in mobile Ad-Hoc networks using precision probability genetic algorithms (PPGA) and deep learning technique (Stacked LSTM),” Sustainable Computing: Informatics and Systems, vol. 43, p. 101021, Sep. 2024, doi: 10.1016/j.suscom.2024.101021.
  14. B. Sharma, L. Sharma, C. Lal, and S. Roy, “Anomaly based network intrusion detection for IoT attacks using deep learning technique,” Computers and Electrical Engineering, vol. 107, p. 108626, Apr. 2023, doi: 10.1016/j.compeleceng.2023.108626.
  15. R. Devendiran and A. V. Turukmane, “Dugat-LSTM: Deep learning-based network intrusion detection system using chaotic optimization strategy,” Expert Systems with Applications, vol. 245, p. 123027, Jul. 2024, doi: 10.1016/j.eswa.2023.123027.
  16. K. Shafi and H. A. Abbass, “An adaptive genetic-based signature learning system for intrusion detection,” Expert Systems with Applications, vol. 36, no. 10, pp. 12036–12043, Dec. 2009, doi: 10.1016/j.eswa.2009.03.036.
  17. Dataset collection: Kaggle repository: https://www.kaggle.com/code/essammohamed4320/intrusion-detection-system-with-ml-dl/input
  18. M. Vishwakarma and N. Kesswani, “A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection,” Decision Analytics Journal, vol. 7, p. 100233, Jun. 2023, doi: 10.1016/j.dajour.2023.100233.
  19. Hnamte and J. Hussain, “DCNNBiLSTM: An Efficient Hybrid Deep Learning-Based Intrusion Detection System,” Telematics and Informatics Reports, vol. 10, p. 100053, Jun. 2023, doi: 10.1016/j.teler.2023.100053.
  20. A.Balla, M. H. Habaebi, E. A. A. Elsheikh, Md. R. Islam, F. E. M. Suliman, and S. Mubarak, “Enhanced CNN-LSTM Deep Learning for SCADA IDS Featuring Hurst Parameter Self-Similarity,” IEEE Access, vol. 12, pp. 6100–6116, 2024, doi: 10.1109/access.2024.3350978.
  21. S. M. Kasongo, “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework,” Computer Communications, vol. 199, pp. 113–125, Feb. 2023, doi: 10.1016/j.comcom.2022.12.010.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Hemanth Uppala and Renuga Devi R; Methodology: Hemanth Uppala; Software: Renuga Devi R; Data Curation: Hemanth Uppala; Writing-Original Draft Preparation: Hemanth Uppala and Renuga Devi R; Visualization: Hemanth Uppala; Investigation: Renuga Devi R; Supervision: Hemanth Uppala; Validation: Renuga Devi R; Writing- Reviewing and Editing: Hemanth Uppala and Renuga Devi R; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


Author(s) thanks to Dr. Renuga Devi R for this research completion and support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Hemanth Uppala and Renuga Devi R, “Enhanced Signature Based Intrusion Detection System Using Hyper Scalar Feature Engineering With LSTM Gated Recurrent Neural Network”, Journal of Machine and Computing, vol.6, no.1, pp. 058-072, 2026, doi: 10.53759/7669/jmc202606006.


Copyright


© 2026 Hemanth Uppala and Renuga Devi R. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.