Skip to main content
Log in

Evaluating the hybrid network model performance for measuring the prognosis of cyber-attacks in MANET over cyber-forecast representation

  • ORIGINAL ARTICLE
  • Published:
Save article
View saved research
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

In the field of cyber-security, the challenges related to cyber-attacks over MANET and growing sophistication have led researchers to accept predictive and reactive approaches. For categorizing packets as malicious or standard, the presented paper developed an intrusion detection system based on signature by employing deep hybrid network classifiers. Furthermore, an anomaly-based intrusion detection system is designed to recognize the anomalies by employing two pre-trained network models, i.e. VGG-19 and VGG-16 in the Hybrid Deep Convolutional Network over the MANET environment. The signature generator will process these anomalies. The training dataset is incorporated with relevant attributes extracted from a signature generator. Therefore, by including new attack models, this integration makes continuous learning by the hybrid model possible. The hybrid model’s self-healing property allows for early and quick attack discovery. It is done by generating attack features for unknown attacks that occurred previously. The UNSW-NB-15 dataset is utilized to assess the projected methodology, and the provided dataset is employed to evaluate the effectiveness of the projected hybrid classifier. When the experimental outcomes are compared to the conventional models, the proposed model also exhibits improved detection rates for unknown and known attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1:
Fig. 2
Algorithm 2:
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Aldweesh A, Derhab A, Emam AZ (2020) Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl Based Syst 189:105124

    Article  Google Scholar 

  • Alrzini JRS, Pennington D (2020) A polymorphic malware detection techniques review. Int J Adv Res Eng Technol 11:1238–1247

    Google Scholar 

  • Baek M et al (2021) Accurate prediction of protein structures and interactions using a three-track neural network. Science 373:871–876

    Article  Google Scholar 

  • Cha Y-O, Hao YT (2022) dawn of metamaterial engineering predicted via hyperdimensional keyword pool and memory learning. Adv Opt Mater 10:2102444

    Article  Google Scholar 

  • Chen C-M et al (2023) A provably secure key transfer protocol for the fog-enabled social internet of vehicles based on a confidential computing environment. Veh Commun 39:100567

    Google Scholar 

  • Deng L, Lee M, Wang H (2019) IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int J Inform Manag 49:533–545

    Google Scholar 

  • Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inform Sec Appl 50:102419

    Google Scholar 

  • Ge M, Fu X, Syed N, Baig Z, Teo G, Robles-Kelly A (2019) Deep learning-based intrusion detection for IoT networks. In: 2019 IEEE 24th pacific rim international symposium on dependable computing (PRDC), pp. 256-25609 IEEE

  • Ghafur S et al (2019) A retrospective impact analysis of the wannacry cyberattack on the NHS. NPJ Digit Med 2:1–7

    Article  Google Scholar 

  • Hassan A, Gumaei A, Alsanad M, Alrubaian M, Fortino G (2020) A hybrid deep learning model for efficient intrusion detection in the big data environment. Inf Sci 513:386–396

    Article  Google Scholar 

  • Husák M, Kašpar J (2019) Aida framework: real-time correlation and prediction of intrusion detection alerts. In: Proceedings of the 14th international conference on availability, reliability and security, pp 1–8.

  • Kebir O, Nouaouri I, Rejeb L, Said LB (2022) Atipreta: an analytical model for time-dependent prediction of terrorist attacks. Int J Appl Math Comput Sci 32:495–510

    Article  MATH  Google Scholar 

  • Liu X, Liu J (2021) Malicious traffic detection combined deep neural network with a hierarchical attention mechanism. Sci Rep 11:1–15

    Google Scholar 

  • Mae Y, Kumagai W, Kanamori T (2021) Uncertainty propagation for dropout-based Bayesian neural networks. Neural Netw 144:394–406

    Article  Google Scholar 

  • Malik J et al (2020) Hybrid deep learning: an efficient reconnaissance and surveillance detection mechanism in sdn. IEEE Access 8:134695–134706

    Article  Google Scholar 

  • Nagasree Y et al (2023) Preserving privacy of classified authentic satellite lane imagery using proxy re-encryption and UAV technologies. Drones 7:53

    Article  Google Scholar 

  • Okutan A, Yang SJ, McConkey K, Werner G (2019) Capture: cyberattack forecasting using non-stationary features with time lags. In: 2019 IEEE Conference on Communications and Network Security (CNS), pp 205–213 (IEEE).

  • Otomo, Liu D, Nayak A (2019) DL-IDS: a deep learning-based intrusion detection framework for securing IoT. Trans. Emerg. Telecommun. Technol.

  • Ren K, Zeng Y, Cao Z, Zhang Y (2022) Id-rdrl: A deep reinforcement learning-based feature selection intrusion detection model. Sci Rep 12:1–18

    Article  Google Scholar 

  • Sagheer A, Kotb M (2019) Unsupervised pre-training of a deep lstm-based stacked autoencoder for multivariate time series forecasting problems. Sci Rep 9:1–16

    Article  Google Scholar 

  • Sherubha P (2019) An efficient network threat detection and classification method using ANP-MVPS algorithm in wireless sensor networks. Int J Innov Technol Expl Eng 8(11):1597–1606

    Google Scholar 

  • Sherubha P (2019) An efficient intrusion detection and authentication mechanism for detecting clone attack in wireless sensor networks. J Adv Res Dyn Control Syst 11(5):55–68

    Google Scholar 

  • Sherubha P (2020) Graph based event measurement for analyzing distributed anomalies in sensor networks. Sādhanā 45(1):212

    Article  MathSciNet  Google Scholar 

  • Shiferaw Y, Lemma S (2021) Limitations of proof of stake algorithm in blockchain: a review. Zede J 39:81–95

    Google Scholar 

  • Wang B, Su Y, Zhang M, Nie J (2020) A deep hierarchical network for packet-level malicious traffic detection. IEEE Access 8:201728–201740

    Article  Google Scholar 

  • Werner G, Yang S, McConkey K (2017) Time series forecasting of cyber attack intensity. In: Proceedings of the 12th Annual Conference on Cyber and Information Security Research, pp 1–3.

  • Werner G, Yang S, McConkey K (2018) Leveraging intra-day temporal variations to predict daily cyberattack activity. In: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), pp 58–63 (IEEE).

  • Xu J, Li Z, Du B, Zhang M, Liu J (2020) Reluplex made more practical: Leaky relu. In: 2020 IEEE Symposium on Computers and Communications (ISCC), 1–7 (IEEE).

  • Yang H, Wang F (2019) Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7:64366–64374

    Article  Google Scholar 

  • Yin C, Zhang S, Wang J, Xiong NN (2020) Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Trans Syst Man Cybernet Syst 52(1):112–122

    Article  Google Scholar 

Download references

Funding

There is no funding for this research article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rudramani Bhutia.

Ethics declarations

Conflict of interests

As the corresponding author of this manuscript, the authors and co-authors declare that they have no conflicts of interest.

Human or animal participants

This article does not contain any studies involving animals performed and any studies involving human participants performed by any of the authors.

Informed consent

In this article, there is no human or animal sample was involved in this study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhutia, R., Mothukuri, R. Evaluating the hybrid network model performance for measuring the prognosis of cyber-attacks in MANET over cyber-forecast representation. Int J Syst Assur Eng Manag (2025). https://doi.org/10.1007/s13198-025-03031-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Version of record:

  • DOI: https://doi.org/10.1007/s13198-025-03031-9

Keywords

Profiles

  1. Rudramani Bhutia