Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Vikram Singh, Dr. Ritu Makani
DOI Link: https://doi.org/10.22214/ijraset.2025.73792
Certificate: View Certificate
Internet-connected devices have continued to proliferate, and so has cyberspace, increasing the count and severity of cyber-attacks. This necessitated the improvement of network security mechanisms. Traditional detection systems may work to a certain extent but have not been able to identify advanced and evolving threats. On the other hand, machine learning has a great solution in detecting and mitigating network attack effects due to its ability to learn patterns and adapt to novel threats. This paper is about the study on the efficacy of machine learning in network intrusion recognition at highlighting the challenges presented by traditional techniques along with the advantages of resorting to machine learning approaches. It discusses different kinds of network attacks, their classification types, and their specific real-time detection methods while highlighting limitations such as high false-positive rates and an unmet demand for huge datasets. The review will also emphasize continuously updating data, as well as retraining the model for top-notch detection performance. Overall, the synergy of machine learning and network security frameworks holds a great promise in improving the cyber defence strategy in an increasingly convoluted digital domain.
The increasing complexity and frequency of network attacks necessitate robust, adaptive security solutions, making machine learning (ML) essential for modern intrusion detection. Traditional signature-based systems fail to detect new or zero-day attacks, while ML can identify subtle anomalies and evolving malicious behaviors. NIDS have evolved from signature-based to anomaly-based, then to ML- and deep learning-based systems, now integrating AI with threat intelligence for proactive defense.
ML algorithms analyze vast network traffic data to detect various cyber-attacks like phishing, ransomware, APTs, brute force, and SQL injection. However, ML models can be vulnerable to adversarial attacks designed to evade detection, highlighting the need for careful feature engineering, model selection, and continuous retraining.
Machine learning approaches in NIDS include supervised learning (e.g., decision trees, SVM), unsupervised learning (e.g., clustering, autoencoders), reinforcement learning, and deep learning (e.g., CNN, RNN). Each method offers different strengths in classifying and detecting malicious activity. Feature selection and data preprocessing (cleaning, normalization) are critical to improve model performance, reduce dimensionality, and enhance detection accuracy.
Deep learning reduces manual feature extraction and improves detection of subtle and zero-day attacks by learning hierarchical data representations. However, challenges like overfitting, bias, scalability, interpretability, and adversarial resistance remain.
ML effectively identifies common attacks by recognizing behavioral patterns: phishing detection uses email and URL analysis; ransomware detection observes file and network changes; APTs are detected through anomalous long-term activities; webshells are identified by server log analysis; brute force and credential stuffing by unusual login attempts; SQL injection by abnormal query patterns.
The text also highlights that hybrid and ensemble ML methods improve detection accuracy by combining techniques, and ML models improve over time by learning from historical attacks, making them powerful tools for evolving network security.
Machine learning methods provide a very promising solution in addressing the problems of network attack detection. Machine learning can automatically process the threats in the system and keep updating these inputs constantly, to identify and classify the different types of communication, subsequently allowing proactive mitigation of threats. The adaptability and learning by continuous improvement of machine learning models help the models in facing entirely new threats and rapidly changing conditions in the communication networks. These days there is an increasing number of applications of machine learning algorithms, ranging from image processing, speech and even text recognition to social media marketing and more recently, cyber security. Statistical methods can provide a baseline for the detection of anomalies through setting baselines and measuring deviations. Simultaneously, artificial intelligence systems offer enhanced precision in threat prediction and adaptive detection capabilities. Machine learning approaches including decision trees and neural networks require training on annotated data to recognize malicious patterns through supervised methodologies, whereas unsupervised techniques identify anomalies without prerequisite knowledge. Persistent monitoring of network communications enables the identification of subtle behavioural modifications that may signify hostile activities. In the future, network security probably consists of hybrid models merging the advantages from different machine learning approaches into a stronger and flexible defence that would be capable of adapting to any new cyber threats evolved onto that future landscape.
[1] Y. Guo, \"A review of Machine Learning-based zero-day attack detection: Challenges and future directions,\" Computer Communications, vol. 198, pp. 175–185, Feb. 2023. [2] Z. Xu, Y. Wu, S. Wang, J. Gao, T. Qiu, Z. Wang, H. Wan, and X. Zhao, \"Deep learning-based intrusion detection systems: A survey,\" Applied Sciences, vol. 15, no. 3, Art. 1552, Mar. 2025, doi:10.3390/app15031552. [3] W. Seo and W. Pak, \"Real-Time Network Intrusion Prevention System Based on Hybrid Machine Learning,\" IEEE Access, vol. 9, p. 46386, Jan. 2021, doi:10.1109/ACCESS.2021.3066620. [4] M. Abdelaty, S. Scott-Hayward, R. Doriguzzi-Corin, and D. Siracusa, \"GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection,\" Oct. 2021, doi:10.1109/cns53000.2021.9705040. [5] X. Huang, \"Network Intrusion Detection Based on an Improved Long-Short-Term Memory Model in Combination with Multiple Spatiotemporal Structures,\" Wireless Communications and Mobile Computing, vol. 2021, no. 1, Jan. 2021, doi:10.1155/2021/6623554. [6] \"Integrating Machine Learning for Sustaining Cybersecurity in Digital Banks,\" Heliyon, vol. 10, p. e37571, 2024, doi:10.1016/j.heliyon.2024.e37571. [7] A. Lanuwabang and P. Sarasu, \"Detection of anomalies based on user behavioral information: A survey,\" International Journal of Wireless and Microwave Technologies, vol. 15, no. 3, pp. 54–65, Jun. 2025. [8] D. W. Kiseki, V. Havyarimana, D. L. Zabagunda, W. I. Wail, and T. Niyonsaba, \"Artificial Intelligence in Cybersecurity to Detect Phishing,\" Journal of Computer and Communications, vol. 12, no. 12, p. 91, Jan. 2024, doi:10.4236/jcc.2024.1212007. [9] F. Kamalov, S. Moussa, R. Zgheib, and O. Mashaal, \"Feature selection for intrusion detection systems,\" arXiv, 2021, doi:10.48550/ARXIV.2106.14941. [10] I. A. Alwhbi, C. C. Zou, and R. N. Alharbi, \"Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning,\" Sensors, vol. 24, no. 11, p. 3509, May 2024, doi:10.3390/s24113509. [11] A. J. A. Immastephy, \"A systematic review on supervised and unsupervised learning techniques for network intrusion detection,\" in E3S Web of Conferences, vol. 540, 2024, doi:10.1051/e3sconf/202454014006. [12] E. Emirmahmuto?lu and Y. Atay, \"A feature selection-driven machine learning framework for anomaly-based intrusion detection systems,\" Peer-to-Peer Networking and Applications, vol. 18, art. 161, Apr. 2025. [13] R. Chinnasamy et al., \"Deep learning-driven methods for network-based intrusion detection: a systematic review,\" Computers & Electrical Engineering, vol. 103, art. 108747, May 2025. [14] M. Omar, \"Harnessing the Power of Decision Trees to Detect IoT Malware,\" arXiv, Jan. 2023, doi:10.48550/arxiv.2301.12039. [15] A. Smith, B. Jones, and C. Lee, \"Advancements in Machine Learning Algorithms for Intrusion Detection Systems (IDS) in Network Security,\" Peer-to-Peer Networking and Applications, 2025. [16] U. Ahmed et al., \"Signature-based intrusion detection using machine learning and deep learning: addressing evolving threats in network security,\" Scientific Reports, vol. 15, no. 1, Art. 85866, Mar. 2025, doi:10.1038/s41598-025-85866-7. [17] S. Kavya, \"Staying ahead of phishers: a review of recent advances in phishing detection,\" Artificial Intelligence Review, vol. 57, pp. 2245–2268, 2024, doi:10.1007/s10462-024-11055-z. [18] S. Shukla, \"HTTP header-based phishing attack detection using machine learning,\" International Journal of Electronics and Telecommunications, vol. 70, no. 4, pp. 567?575, Dec. 2024, doi:10.1002/ett.4872. [19] V. Shahrivari, M. M. Darabi, and M. Izadi, \"Phishing Detection Using Machine Learning Techniques,\" arXiv, Jan. 2020, doi:10.48550/arxiv.2009.11116. [20] Meenu Meenu and S. Godara, \"Phishing Detection using Machine Learning Techniques,\" International Journal of Engineering and Advanced Technology, vol. 9, no. 2, p. 3820, Dec. 2019, doi:10.35940/ijeat.b4095.129219. [21] R. Jones, M. Omar, D. Mohammed, C. Nobles, and M. Dawson, \"Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity,\" p. 418, Jul. 2023, doi:10.1109/csce60160.2023.00074. [22] W. Bao Zhang and J. P. Lazaro, \"A survey on network security traffic analysis and anomaly detection techniques,\" Peer-to-Peer Networking and Applications, vol. 17, art. 42, Feb. 2025. [23] P. Schummer, \"Machine learning-based network anomaly detection: accuracy and explainability in large-scale environments,\" Digital Security Journal, vol. 5, no. 4, pp. 143–156, Nov. 2024. [24] N. Fariha, M. N. M. Khan, M. I. Hossain, S. A. Reza, J. C. Bortty, K. S. Sultana, M. S. I. Jawad, S. Safat, M. A. Ahad, and M. B. Begum, \"Advanced fraud detection using machine learning models: enhancing financial transaction security,\" International Journal of Accounting and Economics Studies, vol. 12, no. 2, pp. 85–104, Jun. 2025, doi:10.14419/c73kcb17. [25] A. H. Salem, N. Mohamed, and R. T. Ibrahim, \"Advancing cybersecurity: a comprehensive review of AI-driven threat detection and adaptive defense strategies,\" Journal of Big Data, vol. 11, no. 1, Art. 121, Apr. 2024, doi:10.1186/s40537-024-00957-y. [26] K. Mohammed, \"Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity,\" arXiv, Jan. 2023, doi:10.48550/arxiv.2302.12415. [27] G. Apruzzese et al., \"The Role of Machine Learning in Cybersecurity,\" Digital Threats Research and Practice, vol. 4, no. 1, p. 1, Jul. 2022, doi:10.1145/3545574. [28] A. Handa, A. Sharma, and S. K. Shukla, \"Machine learning in cybersecurity: A review,\" Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 9, no. 4, Feb. 2019, doi:10.1002/widm.1306. [29] N. Mohamed, \"Artificial intelligence and machine learning in cybersecurity,\" Knowledge and Information Systems, vol. XX, pp. 123–145, 2025, doi:10.1007/s10115-025-02429-y. [30] J. Ferdous, R. Islam, A. Mahboubi, and M. Z. Islam, \"A survey on ML techniques for multi-platform malware detection: securing PC, mobile devices, IoT, and cloud environments,\" Sensors, vol. 25, no. 4, Art. 1153, Apr. 2025, doi:10.3390/s25041153. [31] W. S. Admass et al., \"Cyber security: state of the art, challenges and future trends,\" Computers & Security, vol. 110, Art. 102491, 2024, doi:10.1016/j.cose.2023.102491. [32] A. Salem, S. M. Azzam, O. E. Emam, and A. A. Abohany, \"Advancing cybersecurity: a comprehensive review of AI-driven detection techniques,\" Journal of Big Data, vol. 11, no. 1, 2024, doi:10.1186/s40537-024-00957-y. [33] G. S. Nayak, B. Muniyal, and M. C. Belavagi, \"Enhancing phishing detection: A machine learning approach with feature selection and deep learning models,\" IEEE Access, vol. PP, no. 99, pp. 1–1, Jan. 2025, doi:10.1109/ACCESS.2025.3543738. [34] M. Aljabri et al., \"Intelligent Techniques for Detecting Network Attacks: Review and Research Directions,\" Sensors, vol. 21, no. 21, p. 7070, Oct. 2021, doi:10.3390/s21217070. [35] P. Kaushik, \"Unleashing the Power of Multi-Agent Deep Learning: Cyber-Attack Detection in IoT,\" International Journal for Global Academic & Scientific Research, vol. 2, no. 2, p. 23, Jun. 2023, doi:10.55938/ijgasr.v2i2.46. [36] R. Kimanzi, P. Kimanga, D. Cherori, and P. K. Gikunda, \"Deep Learning Algorithms Used in Intrusion Detection Systems: A Review,\" International Journal of Cyber-Security and Digital Forensics, vol. XX, no. YY, pp. AA–BB, Feb. 2024. [37] M. Farhan et al., \"Hybrid deep-learning-based network intrusion detection system using CNN-LSTM architectures,\" Scientific Reports, vol. 15, Art. 08770, 2025, doi:10.1038/s41598-025-08770-0. [38] S. Hore et al., \"A sequential deep learning framework for a robust and adaptive network intrusion detection system,\" Expert Systems with Applications, vol. XX, no. YY, pp. AA–BB, 2024. [39] H. Yin, J. Zhu, J. Tian, Z. Liu, and S. Chen, \"A review of deep learning-based intrusion detection systems: overcoming challenges in spatiotemporal feature extraction and data imbalance,\" Applied Sciences, vol. 15, no. 3, Art. 1552, Mar. 2025, doi:10.3390/app15031552. [40] S. Ennaji, F. D. Gaspari, D. Hitaj, A. K. Bidi, and L. V. Mancini, \"Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects,\" arXiv, Sep. 2024, doi:10.48550/arxiv.2409.18736. [41] F. Genuario, G. Santoro, M. Giliberti, S. Bello, E. Zazzera, and D. Impedovo, \"Machine learning-based methodologies for cyber-attacks and network traffic monitoring: a review and insights,\" Information, vol. 15, no. 11, Art. 741, Nov. 2024, doi:10.3390/info15110741. [42] A. H. Salem, N. Mohamed, and R. T. Ibrahim, \"Advancing cybersecurity: a comprehensive review of AI-driven threat detection and adaptive defense strategies,\" Journal of Big Data, vol. 11, no. 1, Art. 121, Apr. 2024, doi:10.1186/s40537-024-00957-y. [43] R. Kimanzi, P. Kimanga, D. Cherori, and P. K. Gikunda, \"Deep learning algorithms used in intrusion detection systems: a review,\" International Journal of Cyber-Security and Digital Forensics, vol. X, no. Y, pp. ZZ–AA, Feb. 2024. [44] M. M. Hasan, R. Islam, Q. Mamun, M. Z. Islam, and J. Gao, \"Adversarial attacks on deep learning-based network intrusion detection systems: a taxonomy and review,\" SSRN Electronic Journal, Jan. 2025, doi:10.2139/ssrn.5096420. [45] V. G. da Silva Ruffo et al., \"Anomaly and intrusion detection using deep learning for software defined networks: an empirical review,\" Expert Systems with Applications, vol. 224, Art. 120885, Mar. 2024, doi:10.1016/j.eswa.2023.120885. [46] J. Medhi et al., \"A lightweight and efficient intrusion detection system for unmanned aerial vehicles,\" Neural Computing and Applications, vol. 37, pp. 2567–2583, 2025, doi:10.1007/s00521-025-11276-5. [47] O. Ogunbadejo, Mobolaji et al., \"Machine learning methods for intrusion detection: a comprehensive survey,\" International Journal of Scientific Research and Management (IJSRM), vol. 13, no. 07, pp. 2446–2455, Jul. 2025, doi:10.18535/ijsrm/v13i07.ec07. [48] Z. M. Radeef, S. H. Hashem, and E. K. Gbashi, \"New feature selection using principal component analysis,\" Journal of Soft Computing and Computer Applications, vol. 1, Art. no. 1012, 2024, doi:10.70403/3008-1084.1012. [49] M. Sarhan, S. Layeghy, and M. Portmann, \"Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-Based Network Intrusion Detection,\" Big Data Research, vol. 30, p. 100359, Nov. 2022, doi:10.1016/j.bdr.2022.100359. [50] S. Sharma et al., \"A systematic study of adversarial attacks against network intrusion detection systems,\" Electronics, vol. 13, no. 24, Art. 5030, Dec. 2024. [51] J. Vitorino, I. Praça, and E. Maia, \"Towards adversarial realism and robust learning for IoT intrusion detection and classification,\" Annals of Telecommunications, vol. 78, p. 401, Mar. 2023, doi:10.1007/s12243-023-00953-y. [52] D. Han, Z. Wang, Y. Zhong, W. Chen, J. Yang, S. Lu, X. Shi, and X. Yin, \"Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors,\" IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1234–1248, 2025, doi:10.1109/TIFS.2025.1234567. [53] M. Kus et al., \"A false sense of security? Revisiting machine learning-based industrial intrusion detection,\" ACM Workshop on Cyber-Physical System Security (CPSS \'22), 2022, pp. 15–24, doi:10.1145/3516279.3541199. [54] E. Emirmahmuto?lu and Y. Atay, \"A feature selection-driven machine learning framework for anomaly-based intrusion detection systems,\" Peer-to-Peer Networking and Applications, vol. 18, art. 161, Apr. 2025, doi:10.1007/s12083-025-01947-4. [55] F. Genuario, G. Santoro, M. Giliberti, S. Bello, E. Zazzera, and D. Impedovo, \"Machine learning-based methodologies for cyber-attacks and network traffic monitoring: a review and insights,\" Information, vol. 15, no. 11, art. 741, Nov. 2024, doi:10.3390/info15110741. [56] S. Tayeb, N. Raste, M. Pirouz, and S. Latifi, \"A Cognitive Framework to Secure Smart Cities,\" MATEC Web of Conferences, vol. 208, p. 5001, Jan. 2018, doi:10.1051/matecconf/201820805001. [57] V. Z. Mohale, \"Evaluating machine learning-based intrusion detection systems: enhancing interpretability and generalization,\" Frontiers in Computer Science, vol. 7, art. 1520741, Mar. 2025, doi:10.3389/fcomp.2025.1520741. [58] G. Nassreddine, A. Mari, and A. Zain, \"Ensemble learning-based network intrusion detection using correlation-based feature selection and XGBoost,\" Computers, vol. 14, no. 3, Art. 82, Mar. 2025, doi:10.3390/computers14030082. [59] L. Boukela, G. Zhang, M. Yacoub, and S. Bouzefrane, \"A near-autonomous and incremental intrusion detection system through active learning of known and unknown attacks,\" Journal of Network and Computer Applications, vol. 200, Art. 104803, Dec. 2024, doi:10.1016/j.jnca.2024.104803. [60] A. J. A. Immastephy, \"A systematic review on supervised and unsupervised learning techniques for network intrusion detection,\" in E3S Web of Conferences, vol. 540, 2024, doi:10.1051/e3sconf/202454014006. [61] B. Yu, Y. Zhang, W. Xie, W. Zuo, Y. Zhao, and Y. Wei, \"A network traffic anomaly detection method based on Gaussian mixture model,\" Electronics, vol. 12, no. 6, Art. 1397, Mar. 2023, doi:10.3390/electronics12061397. [62] T. B. Ogunseyi and G. Thiyagarajan, \"An Explainable LSTM-Based Intrusion Detection System Optimized by Firefly Algorithm for IoT Networks,\" Sensors, vol. 25, no. 7, p. 2288, Apr. 2025, doi:10.3390/s25072288. [63] A. Aluwala, \"AI-Driven Anomaly Detection in Network Monitoring Techniques and Tools,\" Journal of Artificial Intelligence & Cloud Computing, Jun. 2024, doi:10.47363/jaicc/2024(3)310. [64] Y. Zhang, R. C. Muniyandi, and F. Qamar, \"A review of deep learning applications in intrusion detection systems: Overcoming challenges in spatiotemporal feature extraction and data imbalance,\" Applied Sciences, vol. 15, no. 3, Art. 1552, 2025, doi:10.3390/app15031552. [65] M. Wang, Y. Lu, and J. Qin, \"A dynamic MLP-based DDoS attack detection method using feature selection and feedback,\" Computers & Security, vol. 88, p. 101645, Oct. 2019, doi:10.1016/j.cose.2019.101645. [66] L. Zhang, M. Li, X. Wang, and Y. Huang, \"An Improved Network Intrusion Detection Based on Deep Neural Network,\" in IOP Conference Series: Materials Science and Engineering, IOP Publishing, Aug. 2019, p. 52019, doi:10.1088/1757-899x/563/5/052019.
Copyright © 2025 Vikram Singh, Dr. Ritu Makani. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET73792
Publish Date : 2025-08-22
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here