An Enhanced Network Intrusion Detection System Using ADASYN and Hybrid Residual Block Techniques

Authors

  • Harish G N Department of Computer Science & Engineering, Sri Siddhartha Academy of Higher Education, Tumakuru, Karnataka, India
  • Annapurna H S Department of Information Science & Engineering, Sri Siddhartha Institute of Technology, Tumakuru, Karnataka, India
Volume: 15 | Issue: 4 | Pages: 25082-25087 | August 2025 | https://doi.org/10.48084/etasr.10961

Abstract

Network security relies on Intrusion Detection Systems (IDS), but current models have problems with feature extraction and inaccurate classification, particularly on unbalanced and small datasets, leading to less effective detection of attack traffic patterns in actual situations. This study suggests an adaptive synthesis method based on an Enhanced Residual Network (ERN) to address these problems to facilitate IDS models in learning from sparse and unbalanced data and increase their detection performance. For optimal distribution of training data and enhanced feature representation, the proposed ERN uses the Inception-ResNet architecture in conjunction with custom sampling modules. Oversampling techniques are used to balance the dataset. The model is trained, tested, and compared to traditional deep learning methods. The proposed model outperforms conventional ones in terms of accuracy, dependability, and feature extraction capacity, as experimentally shown by an intrusion detection accuracy ranging from 89.40% to 91.88%. These results show that the proposed method is a solid choice for tough data settings looking to enhance intrusion detection.

Keywords:

unstable data connection, residual neural network, adaptive synthesis, intrusion detection

Downloads

Download data is not yet available.

References

Z. Hu, L. Wang, L. Qi, Y. Li, and W. Yang, "A Novel Wireless Network Intrusion Detection Method Based on Adaptive Synthetic Sampling and an Improved Convolutional Neural Network," IEEE Access, vol. 8, pp. 195741–195751, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3034015

X. Hu, X. Meng, S. Liu, and L. Liang, "An Improved Algorithm for Network Intrusion Detection Based on Deep Residual Networks," IEEE Access, vol. 12, pp. 66432–66441, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3398007

K. Kotecha et al., "Enhanced Network Intrusion Detection System," Sensors, vol. 21, no. 23, Jan. 2021, Art. no. 7835. DOI: https://doi.org/10.3390/s21237835

S. Farhan, J. Mubashir, Y. U. Haq, T. Mahmood, and A. Rehman, "Enhancing network security: an intrusion detection system using residual network-based convolutional neural network," Cluster Computing, vol. 28, no. 4, Feb. 2025, Art. no. 251. DOI: https://doi.org/10.1007/s10586-025-05156-9

G. Liu, T. Zhang, H. Dai, X. Cheng, and D. Yang, "ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets," Applied Sciences, vol. 15, no. 2, Jan. 2025, Art. no. 956. DOI: https://doi.org/10.3390/app15020956

S. Wang, W. Xu, and Y. Liu, "Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things," Computer Networks, vol. 235, Nov. 2023, Art. no. 109982. DOI: https://doi.org/10.1016/j.comnet.2023.109982

H. Sadia et al., "Intrusion Detection System for Wireless Sensor Networks: A Machine Learning Based Approach," IEEE Access, vol. 12, pp. 52565–52582, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3380014

M. Mohy-Eddine, A. Guezzaz, S. Benkirane, and M. Azrour, "An Intrusion Detection Model using election-Based Feature Selection and K-NN," Microprocessors and Microsystems, Oct. 2023, Art. no. 104966. DOI: https://doi.org/10.1016/j.micpro.2023.104966

M. Rajkumar, V. S. Lakshi, R. Karthik, and S. Pavithra, "Optimized Deep Learning Mechanism for Intrusion Detection: Leveraging RFE-Based Feature Selection and PCA for Improved Accuracy," in 2024 International Conference on Sustainable Communication Networks and Application (ICSCNA), Theni, India, Dec. 2024, pp. 1517–1522. DOI: https://doi.org/10.1109/ICSCNA63714.2024.10863936

Z. Chen, L. Zhou, and W. Yu, "ADASYN−Random Forest Based Intrusion Detection Model," in 2021 4th International Conference on Signal Processing and Machine Learning, Beijing, China, Aug. 2021, pp. 152–159. DOI: https://doi.org/10.1145/3483207.3483232

W. Tian, Y. Shen, N. Guo, J. Yuan, and Y. Yang, "VAE-WACGAN: An Improved Data Augmentation Method Based on VAEGAN for Intrusion Detection," Sensors, vol. 24, no. 18, Sep. 2024, Art. no. 6035. DOI: https://doi.org/10.3390/s24186035

J. Lansky et al., "Deep Learning-Based Intrusion Detection Systems: A Systematic Review," IEEE Access, vol. 9, pp. 101574–101599, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3097247

Z. Yang et al., "A systematic literature review of methods and datasets for anomaly-based network intrusion detection," Computers & Security, vol. 116, May 2022, Art. no. 102675. DOI: https://doi.org/10.1016/j.cose.2022.102675

Y. N. Rao and K. Suresh Babu, "An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset," Sensors, vol. 23, no. 1, Jan. 2023, Art. no. 550. DOI: https://doi.org/10.3390/s23010550

K. M. Abuali, L. Nissirat, and A. Al-Samawi, "Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection," Sensors, vol. 23, no. 21, Jan. 2023, Art. no. 8959. DOI: https://doi.org/10.3390/s23218959

T. Wisanwanichthan and M. Thammawichai, "A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM," IEEE Access, vol. 9, pp. 138432–138450, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3118573

R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024. DOI: https://doi.org/10.48084/etasr.7657

N. Moustafa, J. Slay, and G. Creech, "Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks," IEEE Transactions on Big Data, vol. 5, no. 4, pp. 481–494, Sep. 2019. DOI: https://doi.org/10.1109/TBDATA.2017.2715166

N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, Nov. 2015, pp. 1–6. DOI: https://doi.org/10.1109/MilCIS.2015.7348942

N. Moustafa and J. and Slay, "The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set," Information Security Journal: A Global Perspective, vol. 25, no. 1–3, pp. 18–31, Apr. 2016. DOI: https://doi.org/10.1080/19393555.2015.1125974

N. Moustafa, G. Creech, and J. Slay, "Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models," in Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, I. Palomares Carrascosa, H. K. Kalutarage, and Y. Huang, Eds. Springer International Publishing, 2017, pp. 127–156. DOI: https://doi.org/10.1007/978-3-319-59439-2_5

M. Sarhan, S. Layeghy, N. Moustafa, and M. Portmann, "NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems," in Big Data Technologies and Applications, 2021, pp. 117–135. DOI: https://doi.org/10.1007/978-3-030-72802-1_9

Downloads

How to Cite

[1]
H. G N and A. H S, “An Enhanced Network Intrusion Detection System Using ADASYN and Hybrid Residual Block Techniques”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 25082–25087, Aug. 2025.

Metrics

Abstract Views: 351
PDF Downloads: 324

Metrics Information