An Enhanced Network Intrusion Detection System Using ADASYN and Hybrid Residual Block Techniques
Received: 15 March 2025 | Revised: 11 April 2025, 23 April 2025, and 27 April 2025 | Accepted: 1 May 2025 | Online: 2 August 2025
Corresponding author: Harish G N
Abstract
Network security relies on Intrusion Detection Systems (IDS), but current models have problems with feature extraction and inaccurate classification, particularly on unbalanced and small datasets, leading to less effective detection of attack traffic patterns in actual situations. This study suggests an adaptive synthesis method based on an Enhanced Residual Network (ERN) to address these problems to facilitate IDS models in learning from sparse and unbalanced data and increase their detection performance. For optimal distribution of training data and enhanced feature representation, the proposed ERN uses the Inception-ResNet architecture in conjunction with custom sampling modules. Oversampling techniques are used to balance the dataset. The model is trained, tested, and compared to traditional deep learning methods. The proposed model outperforms conventional ones in terms of accuracy, dependability, and feature extraction capacity, as experimentally shown by an intrusion detection accuracy ranging from 89.40% to 91.88%. These results show that the proposed method is a solid choice for tough data settings looking to enhance intrusion detection.
Keywords:
unstable data connection, residual neural network, adaptive synthesis, intrusion detectionDownloads
References
Z. Hu, L. Wang, L. Qi, Y. Li, and W. Yang, "A Novel Wireless Network Intrusion Detection Method Based on Adaptive Synthetic Sampling and an Improved Convolutional Neural Network," IEEE Access, vol. 8, pp. 195741–195751, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3034015
X. Hu, X. Meng, S. Liu, and L. Liang, "An Improved Algorithm for Network Intrusion Detection Based on Deep Residual Networks," IEEE Access, vol. 12, pp. 66432–66441, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3398007
K. Kotecha et al., "Enhanced Network Intrusion Detection System," Sensors, vol. 21, no. 23, Jan. 2021, Art. no. 7835. DOI: https://doi.org/10.3390/s21237835
S. Farhan, J. Mubashir, Y. U. Haq, T. Mahmood, and A. Rehman, "Enhancing network security: an intrusion detection system using residual network-based convolutional neural network," Cluster Computing, vol. 28, no. 4, Feb. 2025, Art. no. 251. DOI: https://doi.org/10.1007/s10586-025-05156-9
G. Liu, T. Zhang, H. Dai, X. Cheng, and D. Yang, "ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets," Applied Sciences, vol. 15, no. 2, Jan. 2025, Art. no. 956. DOI: https://doi.org/10.3390/app15020956
S. Wang, W. Xu, and Y. Liu, "Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things," Computer Networks, vol. 235, Nov. 2023, Art. no. 109982. DOI: https://doi.org/10.1016/j.comnet.2023.109982
H. Sadia et al., "Intrusion Detection System for Wireless Sensor Networks: A Machine Learning Based Approach," IEEE Access, vol. 12, pp. 52565–52582, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3380014
M. Mohy-Eddine, A. Guezzaz, S. Benkirane, and M. Azrour, "An Intrusion Detection Model using election-Based Feature Selection and K-NN," Microprocessors and Microsystems, Oct. 2023, Art. no. 104966. DOI: https://doi.org/10.1016/j.micpro.2023.104966
M. Rajkumar, V. S. Lakshi, R. Karthik, and S. Pavithra, "Optimized Deep Learning Mechanism for Intrusion Detection: Leveraging RFE-Based Feature Selection and PCA for Improved Accuracy," in 2024 International Conference on Sustainable Communication Networks and Application (ICSCNA), Theni, India, Dec. 2024, pp. 1517–1522. DOI: https://doi.org/10.1109/ICSCNA63714.2024.10863936
Z. Chen, L. Zhou, and W. Yu, "ADASYN−Random Forest Based Intrusion Detection Model," in 2021 4th International Conference on Signal Processing and Machine Learning, Beijing, China, Aug. 2021, pp. 152–159. DOI: https://doi.org/10.1145/3483207.3483232
W. Tian, Y. Shen, N. Guo, J. Yuan, and Y. Yang, "VAE-WACGAN: An Improved Data Augmentation Method Based on VAEGAN for Intrusion Detection," Sensors, vol. 24, no. 18, Sep. 2024, Art. no. 6035. DOI: https://doi.org/10.3390/s24186035
J. Lansky et al., "Deep Learning-Based Intrusion Detection Systems: A Systematic Review," IEEE Access, vol. 9, pp. 101574–101599, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3097247
Z. Yang et al., "A systematic literature review of methods and datasets for anomaly-based network intrusion detection," Computers & Security, vol. 116, May 2022, Art. no. 102675. DOI: https://doi.org/10.1016/j.cose.2022.102675
Y. N. Rao and K. Suresh Babu, "An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset," Sensors, vol. 23, no. 1, Jan. 2023, Art. no. 550. DOI: https://doi.org/10.3390/s23010550
K. M. Abuali, L. Nissirat, and A. Al-Samawi, "Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection," Sensors, vol. 23, no. 21, Jan. 2023, Art. no. 8959. DOI: https://doi.org/10.3390/s23218959
T. Wisanwanichthan and M. Thammawichai, "A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM," IEEE Access, vol. 9, pp. 138432–138450, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3118573
R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024. DOI: https://doi.org/10.48084/etasr.7657
N. Moustafa, J. Slay, and G. Creech, "Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks," IEEE Transactions on Big Data, vol. 5, no. 4, pp. 481–494, Sep. 2019. DOI: https://doi.org/10.1109/TBDATA.2017.2715166
N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, Nov. 2015, pp. 1–6. DOI: https://doi.org/10.1109/MilCIS.2015.7348942
N. Moustafa and J. and Slay, "The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set," Information Security Journal: A Global Perspective, vol. 25, no. 1–3, pp. 18–31, Apr. 2016. DOI: https://doi.org/10.1080/19393555.2015.1125974
N. Moustafa, G. Creech, and J. Slay, "Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models," in Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, I. Palomares Carrascosa, H. K. Kalutarage, and Y. Huang, Eds. Springer International Publishing, 2017, pp. 127–156. DOI: https://doi.org/10.1007/978-3-319-59439-2_5
M. Sarhan, S. Layeghy, N. Moustafa, and M. Portmann, "NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems," in Big Data Technologies and Applications, 2021, pp. 117–135. DOI: https://doi.org/10.1007/978-3-030-72802-1_9
Downloads
How to Cite
License
Copyright (c) 2025 G. N. Harish, H. S. Annapoorna

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
