Hybrid Intrusion detection model-based density clustering approach and deep learning for detection of malicious traffic over network
DOI:
https://doi.org/10.56294/dm2025739Keywords:
clustering, density clustering , Domain Name System , deep learning, malicious trafficAbstract
Intrusion detection in modern network environments poses significant challenges due to the increasing volume and complexity of cyber-attacks. This study proposes a hybrid approach integrating density-based clustering with deep learning to identify malicious traffic over the network. The proposed framework consists of two steps: clustering and classifying data. in clustering, the proposed model uses density clustering techniques to pre-process and segment network traffic into coherent clusters, thereby reducing data noise within clusters. The deep learning model analyses these clusters, accurately distinguishing between benign and malicious activities. The proposed model was tested over the benchmark dataset CIRA-CIC-DoHBrw-2020. The performance of the proposed model compared with standard machine learning models and the number of states of the artworks. The experiment result demonstrates that our hybrid model significantly improves detection accuracy and reduces false-positive rates compared to existing methods .
References
1. Hadi SM, Alsaeedi AH, Al‐Shammary D, Alkareem Alyasseri ZA, Mohammed MA, Abdulkareem KH, et al. Trigonometric words ranking model for spam message classification. IET Networks. 2022. https://doi.org/10.1049/ntw2.12063
2. Hammi B, Zeadally S, Nebhen J. Security threats, countermeasures, and challenges of digital supply chains. ACM Computing Surveys. 2023., https://doi.org/10.1145/3588999
3. Schmitt M. Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection. Journal of Industrial Information Integration. 2023;36:100520.https://doi.org/10.1016/j.jii.2023.100520
4. Hart M, Dave R, Richardson E. Next-Generation Intrusion Detection and Prevention System Performance in Distributed Big Data Network Security Architectures. International Journal of Advanced Computer Science and Applications. 2023;14(9).DOI:10.14569/IJACSA.2023.01409103
5. Geng J, Wang J, Fang Z, Zhou Y, Wu D, Ge W. A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. Computers & Security. 2024;137:103595. https://doi.org/10.1016/j.cose.2023.103595Manickam S, Nuiaa RR, Alsaeedi AH, Alyasseri ZAA, Mohammed MA, Jaber MM. An enhanced mechanism for detection of Domain Name System-based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques. IET Networks. 2022:1-13.
https://doi.org/10.1049/ntw2.12043
7. Al-E'mari S, Anbar M, Sanjalawe Y, Manickam S, Hasbullah I. Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges. Computer Systems Science & Engineering. 2022;40(1). 10.32604/csse.2022.017941
8. Hasbullah I. Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges. DOI:10.32604/csse.2022.017941
9. Balogun BF. An Enhanced Network Anomaly Intrusion Detection System Using Dimensionality Reduction Approach and Residue Number System: Kwara State University (Nigeria); 2023. Balogun BF. An Enhanced Network Anomaly Intrusion Detection System Using Dimensionality Reduction Approach and Residue Number System: Kwara State University (Nigeria); 2023.
10. Liu Q, Li P, Zhao W, Cai W, Yu S, Leung VC. A survey on security threats and defensive techniques of machine learning: A data driven view. IEEE access. 2018;6:12103-17. https://doi.org/10.1109/ACCESS.2018.2805680
11. Ahmed S, Khan ZA, Mohsin SM, Latif S, Aslam S, Mujlid H, et al. Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron. Future Internet. 2023;15(2):76. https:// doi.org/10.3390/fi15020076
12. Nuiaa RR, Manickam S, Alsaeedi AH, Alomari ES. A new proactive feature selection model based on the enhanced optimization algorithms to detect DRDoS attacks. Int J Electr Comput Eng. 2022;12(2):1869-80. DOI: 10.11591/ijece.v12i2.pp1869-1880
13. Nuiaa RR, Manickam S, Alsaeedi AH, Al-Shammary DEJ. Evolving Dynamic Fuzzy Clustering (EDFC) to Enhance DRDoS_DNS Attacks Detection Mechnism. International Journal of Intelligent Engineering and Systems. 2022;15(1):509-19. DOI: 10.22266/ijies2022.0228.46
14. Aktar S, Nur AY. Towards DDoS attack detection using deep learning approach. Computers & Security. 2023;129:103251. https://doi.org/10.1016/j.cose.2023.103251
15. Nuiaa RR, Alsaeedi AH, Alkafagi SS, Alfoudi ASD. A Critical Review of Optimization MANET Routing Protocols. Wasit Journal of Computer and Mathematics Science. 2022;1(4). https://doi.org/10.31185/wjcm.94
16. Al Ogaili RRN, Raheem OA, Abdkhaleq MHG, Alyasseri ZAA, Alsaidi SAAA, Alsaeedi AH, et al. AntDroidNet Cybersecurity Model: A Hybrid Integration of Ant Colony Optimization and Deep Neural Networks for Android Malware Detection. Mesopotamian Journal of CyberSecurity. 2025;5(1):104-20. DOI: https://doi.org/10.58496/MJCS/2025/008
17. Abd Aliwie, A. N. (2025). Conversational Silence in Harold Pinter’s The Birthday Party: A Pragmatic Perspective. International Journal of Arabic-English Studies. https://doi.org/10.33806/ijaes.v25i2.860
18. Shafi I, Chaudhry M, Montero EC, Alvarado ES, Diez IDLT, Samad MA, et al. A Review of Approaches for Rapid Data Clustering: Challenges, Opportunities and Future Directions. IEEE Access. 2024. DOI: 10.1109/ACCESS.2024.3461798
19. Wani AA. Comprehensive analysis of clustering algorithms: exploring limitations and innovative solutions. PeerJ Computer Science. 2024;10:e2286. DOI:10.7717/peerj-cs.2286
20. Alsaeedi AH, Hadi SM, Alazzawi Y. Adaptive Gamma and Color Correction for Enhancing Low-Light Images. International Journal of Intelligent Engineering & Systems. 2024;17(4). DOI: 10.22266/ijies2024.0831.15
21. Alfoudi AS, Aziz MR, Alyasseri ZAA, Alsaeedi AH, Nuiaa RR, Mohammed MA, et al. Hyper clustering model for dynamic network intrusion detection. IET Communications. 2022. https://doi.org/10.1049/cmu2.12523
22. Hadi SM, Alsaeedi AH, Nuiaa RR, Manickam S, Alfoudi ASD. Dynamic Evolving Cauchy Possibilistic Clustering Based on the Self-Similarity Principle (DECS) for Enhancing Intrusion Detection System. International Journal of Intelligent Engineering & Systems. 2022;15(5). DOI: 10.22266/ijies2022.1031.23
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Ola Ali Obead , Hakem Beitollahi (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
The article is distributed under the Creative Commons Attribution 4.0 License. Unless otherwise stated, associated published material is distributed under the same licence.