An Intelligent Intrusion Detection System Using Deep Learning and Multi-modal Fusion with RF Classification
DOI:
https://doi.org/10.54153/sjpas.2026.v8i1.1286Keywords:
IDS, , CNN, , DL, , ML, , Multimodal, , RFAbstract
The urgent demand for effective and intelligent intrusion detection systems (IDSs) to handle this problem has grown in line with the growing complexity and diversity of cyberattacks. With deep learning (DL) methods, the presented study aims to build an integrated framework that raises the intrusion detection accuracy and generalizability across several data sources. In this work, three well-known datasets, UNSW-NB15, NSL-KDD, and CICIDS2017, have been utilized. The suggested approach uses convolutional neural networks (CNNs) to extract deep features from such datasets. Dimensionality is reduced and irrelevant features are eliminated using principal component analysis (PCA). Combining the three datasets using a multimodal deep autoencoder (MDAE) extracts a new dataset. Final classification utilizes random forest (RF) technology, efficiently and precisely classifying network traffic using combined data. Supported by high precision, F1 score, and recall of 99.9%, evaluation findings show an excellent accuracy of the model of 99.9%. These results show how well modern classification algorithms, feature extraction, and multi-modal data fusion methods can be combined to create a sophisticated intrusion detection model capable of efficiently and consistently defending against challenging attacks.
References
1. S. Mane and D. Rao, “Explaining network intrusion detection system using explainable AI framework,” arXiv Prepr. arXiv2103.07110, 2021.
2. P. R. Kanna and P. Santhi, “Unified deep learning approach for efficient intrusion detection system using integrated spatial–temporal features,” Knowledge-Based Syst., vol. 226, p. 107132, 2021.
3. A. T. Assy, Y. Mostafa, A. Abd El-khaleq, and M. Mashaly, “Anomaly-based intrusion detection system using one-dimensional convolutional neural network,” Procedia Comput. Sci., vol. 220, pp. 78–85, 2023.
4. M. Kumar and A. K. Singh, “Distributed intrusion detection system using blockchain and cloud computing infrastructure,” in 2020 4th international conference on trends in electronics and informatics (ICOEI)(48184), IEEE, 2020, pp. 248–252.
5. L. Ashiku and C. Dagli, “Network intrusion detection system using deep learning,” Procedia Comput. Sci., vol. 185, pp. 239–247, 2021.
6. M. M. Hamood, M. L. Shuwandy, and R. A. F. Alsharida, “Enhancing Smartphone Authentication by Integrating Decision-Making Model with Touch Pressure, Finger Location Data, and Advanced Cybersecurity Techniques,” Iraqi J. Comput. Sci. Math., vol. 5, no. 4, p. 26, 2024.
7. T. P. Quinn et al., “A primer on the use of machine learning to distil knowledge from data in biological psychiatry,” Mol. Psychiatry, vol. 29, no. 2, pp. 387–401, 2024.
8. A. Halimaa and K. Sundarakantham, “Machine learning based intrusion detection system,” in 2019 3rd International conference on trends in electronics and informatics (ICOEI), IEEE, 2019, pp. 916–920.
9. Q. Alasad, M. M. Hammood, and S. Alahmed, “Performance and Complexity Tradeoffs of Feature Selection on Intrusion Detection System-Based Neural Network Classification with High-Dimensional Dataset,” in International Conference on Emerging Technologies and Intelligent Systems, Springer, 2022, pp. 533–542.
10. E. P. Cynthia et al., “Convolutional Neural Network and Deep Learning Approach for Image Detection and Identification,” in Journal of Physics: Conference Series, IOP Publishing, 2022, p. 12019.
11. L. Mohammadpour, T. C. Ling, C. S. Liew, and A. Aryanfar, “A mean convolutional layer for intrusion detection system,” Secur. Commun. Networks, vol. 2020, no. 1, p. 8891185, 2020.
12. I. Lauriola, A. Lavelli, and F. Aiolli, “An introduction to deep learning in natural language processing: Models, techniques, and tools,” Neurocomputing, vol. 470, pp. 443–456, 2022.
13. M. Shakir, A. B. Abubakar, Y. Yousoff, M. Al-Emran, and M. Hammood, “Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing,” 2016.
14. H. Benmeziane, “Comparison of deep learning frameworks and compilers,” Master Comput. Sci. École Natl. Supérieure d’Informatique, 2020.
15. R. Zebari, A. Abdulazeez, D. Zeebaree, D. Zebari, and J. Saeed, “A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction,” J. Appl. Sci. Technol. Trends, vol. 1, no. 1, pp. 56–70, 2020.
16. H. He, X. Sun, H. He, G. Zhao, L. He, and J. Ren, “A novel multimodal-sequential approach based on multi-view features for network intrusion detection,” IEEE Access, vol. 7, pp. 183207–183221, 2019.
17. A. A. Ojugo and R. E. Yoro, “Empirical solution for an optimized machine learning framework for anomaly-based network intrusion detection,” Technol. Rep. Kansai Univ., vol. 62, no. 08, pp. 6353–6364, 2020.
18. W. Jo, S. Kim, C. Lee, and T. Shon, “Packet preprocessing in CNN-based network intrusion detection system,” Electronics, vol. 9, no. 7, p. 1151, 2020.
19. J. Yoo, B. Min, S. Kim, D. Shin, and D. Shin, “Study on network intrusion detection method using discrete pre-processing method and convolution neural network,” IEEE Access, vol. 9, pp. 142348–142361, 2021.
20. M. Gamal, H. M. Abbas, N. Moustafa, E. Sitnikova, and R. A. Sadek, “Few-shot learning for discovering anomalous behaviors in edge networks,” Comput. Mater. Contin., vol. 69, no. 2, pp. 1823–1837, 2021.
21. J. Yin et al., “Internet of things intrusion detection system based on convolutional neural network,” Comput. Mater. Contin., vol. 75, no. 1, pp. 2119–2135, 2023.
22. Z. Wang and F. A. Ghaleb, “An attention-based convolutional neural network for intrusion detection model,” IEEE Access, vol. 11, pp. 43116–43127, 2023.
23. O. Berjawi, A. El Attar, F. Chbib, R. Khatoun, and W. Fahs, “Cyberattacks detection through behavior analysis of internet traffic,” Procedia Comput. Sci., vol. 224, pp. 52–59, 2023.
24. V. Hnamte and J. Hussain, “Dependable intrusion detection system using deep convolutional neural network: A novel framework and performance evaluation approach,” Telemat. Informatics Reports, vol. 11, p. 100077, 2023.
25. M. Zakariah, S. A. AlQahtani, A. M. Alawwad, and A. A. Alotaibi, “Intrusion Detection System with Customized Machine Learning Techniques for NSL-KDD Dataset.,” Comput. Mater. Contin., vol. 77, no. 3, 2023.
26. S. P. Jadhav, A. Srinivas, P. D. Raghunath, M. R. Prabhu, J. Suryawanshi, and A. Haldorai, “Deep learning approaches for multi-modal sensor data analysis and abnormality detection,” Meas. Sensors, vol. 33, p. 101157, 2024.
27. L. Wang, M. Xia, H. Hu, J. Li, F. Hou, and G. Chen, “FusionNN: A Semantic Feature FusionModel Based onMultimodal forWeb Anomaly Detection.,” Comput. Mater. Contin., vol. 79, no. 2, 2024.
28. A. D. Vibhute and V. Nakum, “Deep learning-based network anomaly detection and classification in an imbalanced cloud environment,” Procedia Comput. Sci., vol. 232, pp. 1636–1645, 2024.
29. A. D. Vibhute, M. Khan, C. H. Patil, S. V Gaikwad, A. V Mane, and K. K. Patel, “Network anomaly detection and performance evaluation of Convolutional Neural Networks on UNSW-NB15 dataset,” Procedia Comput. Sci., vol. 235, pp. 2227–2236, 2024.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright Notice
Authors retain copyright and grant the SJPAS journal right of first publication, with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in Samarra Journal of Pure and Applied Science.
The Samarra Journal of Pure and Applied Science permits and encourages authors to archive Pre-print and Post-print items submitted to the journal on personal websites or institutional repositories per the author's choice while providing bibliographic details that credit their submission, and publication in this journal. This includes the archiving of a submitted version, an accepted version, or a published version without any Risks.



