Reliable cyber-attack detection system using genetic hesitant fuzzy-based deep transform classifier
Girubagari N1, Ravi T N2 and Panneer Arokiaraj S3
Associate Professor, Department of Computer Science,Jamal Mohamed College (Autonomous), Affiliated to Bharathidasan University, Tiruchirappalli,Tamil Nadu,India2
Associate Professor, Department of Computer Science,Thanthai Periyar Government Arts and Science College (Autonomous), Affiliated to Bharathidasan University, Tiruchirappalli,Tamil Nadu,India3
Corresponding Author : Girubagari N
Recieved : 25-November-2024; Revised : 15-April-2026; Accepted : 16-April-2026
Abstract
Rapid advancements in network technologies, along with the increasing size and volume of data transmitted across networks, necessitate innovative security solutions. In this context, the complexity and severity of cyber threats and attacks have grown significantly. Deep learning (DL) provides effective mechanisms for automating cyber-attack detection and enabling rapid identification of attack types. To address this challenge, this study proposes a method called knapsack genetic hesitant fuzzy (KGHF)-class compatible deep transform learning (CCDTL) for cyber-attack detection. The proposed KGHF-CCDTL framework consists of two main stages: feature engineering and classification. Using the benchmark dataset NSL-KDD as input, the feature engineering stage applies the KGHF model for preprocessing and feature selection. The selected features are then fed into the CCDTL classifier for accurate cyber-attack detection. Experimental evaluation based on quantitative metrics such as precision, recall, accuracy, F-score, and false alarm rate (FAR) demonstrates the effectiveness of the proposed approach. Furthermore, the KGHF-CCDTL method shows strong potential for securing internet of things (IoT) networks against cyber-threats, as evidenced by its superior performance on the real-time dataset CICIoT2023. Overall, this research contributes to the development of an intelligent cyber-attack detection system, enhancing the security and integrity of smart city environments.
Keywords
Cyber-attack detection, Deep learning, Feature engineering, NSL-KDD, Internet of things (IoT) security, CICIoT2023.
Cite this article
N G, TN Ravi, S PA. Reliable cyber-attack detection system using genetic hesitant fuzzy-based deep transform classifier. International Journal of Advanced Technology and Engineering Exploration. 2026;13(137):490-511. DOI : 10.19101/IJATEE.2024.111102088
[1] Ishak KK, Mat RNA, Malizan NA, Sulong G, Md JMG. Smart cities’ cybersecurity and IoT: challenges and future research directions. IAENG International Journal of Computer Science. 2024; 51(7):725-37.
[2] Mishra DV, Kadam S. The performance of logistic regression, decision tree, KNN, naive bayes and SVM for identifying automotive cybersecurity attack and prevention: an experimental study. Journal of Electrical Systems. 2024:687-99.
[3] Schummer P, Del RA, Serrano J, Jimenez D, Sánchez G, Llorente Á. Machine learning-based network anomaly detection: design, implementation, and evaluation. AI. 2024; 5(4):2967-83.
[4] Aldhaheri A, Alwahedi F, Ferrag MA, Battah A. Deep learning for cyber threat detection in IoT networks: a review. Internet of Things and cyber-physical systems. 2024; 4:110-28.
[5] Kamal IH, Kartit A. Network intrusion detection using combined deep learning models: literature survey and future research directions. IAENG International Journal of Computer Science. 2024; 51(8):998-1010.
[6] Inuwa MM, Das R. A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks. Internet of Things. 2024; 26:101162.
[7] Abdulkareem SA, Foh CH, Shojafar M, Carrez F, Moessner K. Network intrusion detection: an IoT and non IoT-related survey. IEEE Access. 2024; 12:147167-91.
[8] Yuan K, Zhao C, Chen Y, Shen L, Tang Q, Jia C. Mapping the knowledge structure and research evolution of deep learning. IAENG International Journal of Computer Science. 2024; 51(10):1404-12.
[9] Farooq M, Khan MH. Cyber attack detection using machine learning techniques in IoT networks. Architecture. 2024; 28:32-8.
[10] Vardhan A, Kumar P, Awasthi LK. A resilient intrusion detection system for IoT environment based on a modified stacking ensemble classifier. SN Computer Science. 2024; 5(8):1020.
[11] Wu G, Wang Y, Wu Z. Physics-informed machine learning in cyber-attack detection and resilient control of chemical processes. Chemical Engineering Research and Design. 2024; 204:544-55.
[12] Jeffrey N, Tan Q, Villar JR. A hybrid methodology for anomaly detection in cyber–physical systems. Neurocomputing. 2024; 568:127068.
[13] Girubagari N, Ravi TN. Parallel ABILSTM and CBIGRU ensemble network intrusion detection system. International Journal of Intelligent Engineering & Systems. 2024; 17(1):93-107.
[14] Girubagari N, Ravi TN, Arokiaraj SP. Hybrid intelligent anomaly detection system using attention based deep learning approach for cyber attacks prevention. Indian Journal of Science and Technology. 2024; 17(38):3947–59.
[15] Irankunda D, El FK, Hamid T, Riffi J. A comparative study of deep learning-based ransomware detection for industrial IoT. International Journal of Advanced Technology and Engineering Exploration. 2025; 12(124):450-66.
[16] Zakariah M, Alqahtani SA, Alawwad AM, Alotaibi AA. Intrusion detection system with customized machine learning techniques for NSL-KDD dataset. Computers, Materials & Continua. 2023; 77(3):4025-54.
[17] Zaryn G, Waleed F, Xin-wen W, Soundararajan E, Maria B, Franklin M, et al. Comparative analysis of machine learning techniques for IoT anomaly detection using the NSL-KDD dataset. International Journal of Computer Science & Network Security. 2023; 23(1):46-52.
[18] Balega M, Farag W, Wu XW, Ezekiel S, Good Z. Enhancing IoT security: optimizing anomaly detection through machine learning. Electronics. 2024; 13(11):1-18.
[19] Sugin SV, Kanchana M. Enhancing intrusion detection with imbalanced data classification and feature selection in machine learning algorithms. International Journal of Advanced Technology and Engineering Exploration. 2024; 11(112):405-19.
[20] Abbas S, Bouazzi I, Ojo S, Al HA, Sampedro GA, Almadhor A, et al. Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. PeerJ Computer Science. 2024; 10:e1793.
[21] Jose J, Jose DV. AS-CL IDS: anomaly and signature-based CNN-LSTM intrusion detection system for internet of things. International Journal of Advanced Technology and Engineering Exploration. 2023; 10(109):1622-39.
[22] Yaras S, Dener M. IoT-based intrusion detection system using new hybrid deep learning algorithm. Electronics. 2024 ;13(6):1-28.
[23] Jony AI, Arnob AK. A long short-term memory based approach for detecting cyber attacks in IoT using CIC-IoT2023 dataset. Journal of Edge Computing. 2024; 3(1):28-42.
[24] Pariselvam S, Sathishkumar R, Abitha K, Akshana EV, Thisha S. Rooting out intruders using deep learning through RNN and BILSTM. Educational Administration: Theory and Practice. 2024; 30(4): 8705-15.
[25] Udas PB, Roy KS, Karim ME, Ullah SM. Attention-based RNN architecture for detecting multi-step cyber-attack using PSO metaheuristic. In international conference on electrical, computer and communication engineering (ECCE) 2023 (pp. 1-6). IEEE.
[26] Cui M, Chen J, Qiu X, Lv W, Qin H, Zhang X. Multi-class intrusion detection system in SDN based on hybrid BiLSTM model. Cluster Computing. 2024; 27(7):9937-56.
[27] Udurume M, Shakhov V, Koo I. Comparative analysis of deep convolutional neural network-bidirectional long short-term memory and machine learning methods in intrusion detection systems. Applied Sciences. 2024; 14(16):1-16.
[28] Wang J, Si C, Wang Z, Fu Q. A new industrial intrusion detection method based on CNN-BiLSTM. Computers, Materials & Continua. 2024; 79(3):4297-318.
[29] Alsulami MH. Residual dense optimization-based multi-attention transformer to detect network intrusion against cyber attacks. Applied Sciences. 2024; 14(17):1-20.
[30] Vitorino J, Silva M, Maia E, Praça I. Reliable feature selection for adversarially robust cyber-attack detection. Annals of Telecommunications. 2025; 80(3):341-55.
[31] Wang X, Dai L, Yang G. A network intrusion detection system based on deep learning in the IoT. The Journal of Supercomputing. 2024; 80(16):24520-58.
[32] Abd EM, Fares IA, Aseeri AO. Ckan: convolutional kolmogorov–arnold networks model for intrusion detection in IoT environment. IEEE Access. 2024; 12:134837-51.
[33] Alshahrani E, Alghazzawi D, Alotaibi R, Rabie O. Adversarial attacks against supervised machine learning based network intrusion detection systems. Plos One. 2022; 17(10):e0275971.
[34] Aravamudhan P, T K. A novel adaptive network intrusion detection system for internet of things. Plos One. 2023; 18(4):e0283725.
[35] Gheni HQ, Al-yaseen WL. Two-step data clustering for improved intrusion detection system using CICIoT2023 dataset. e-Prime-Advances in Electrical Engineering, Electronics and Energy. 2024; 9:1-8.
[36] Çavuşoğlu Ü, Akgun D, Hizal S. A novel cyber security model using deep transfer learning. Arabian Journal for Science and Engineering. 2024; 49(3):3623-32.
[37] Wang G, Liu D, Zhang C, Hu T. Deep learning-enabled heterogeneous transfer learning for improved network attack detection in internal networks. Applied Sciences. 2023; 13(21):1-16.
[38] Maggu J, Majumdar A. Greedy deep transform learning. In international conference on image processing (ICIP) 2017 (pp. 1822-6). IEEE.
[39] Tang W, Chouzenoux E, Pesquet JC, Krim H. Deep transform and metric learning network: wedding deep dictionary learning and neural network. Neurocomputing. 2022; 509:244-56.
[40] Qiu C, Pfrommer T, Kloft M, Mandt S, Rudolph M. Neural transformation learning for deep anomaly detection beyond images. In international conference on machine learning 2021 (pp. 8703-14). PMLR.
[41] Liu Y, Guo F, Zhao Q, Wu C. An intrusion detection model based on a residual memory convolutional neural network with attention mechanism. In Journal of Physics: Conference Series 2024 (pp. 1-7). IOP Publishing.
[42] Tseng SM, Wang YQ, Wang YC. Multi-class intrusion detection based on transformer for IoT networks using CIC-IoT-2023 dataset. Future Internet. 2024; 16(8):1-25.
[43] Zhao J, Liu X, Yan Q, Li B, Shao M, Peng H, et al. Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning. Computers & Security. 2021; 102:1-25.
[44] Ravipati RD, Abualkibash M. Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets-a review paper. International Journal of Computer Science & Information Technology (IJCSIT). 2019; 102:65-80.
[45] Neto EC, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA. CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors. 2023; 23(13):1-26.
[46] Becerra-suarez FL, Tuesta-monteza VA, Mejia-cabrera HI, Arcila-diaz J. Performance evaluation of deep learning models for classifying cybersecurity attacks in IoT networks. Informatics. 2024; 11(32):1-13.
