Abstract
In the field of cyber-security, the challenges related to cyber-attacks over MANET and growing sophistication have led researchers to accept predictive and reactive approaches. For categorizing packets as malicious or standard, the presented paper developed an intrusion detection system based on signature by employing deep hybrid network classifiers. Furthermore, an anomaly-based intrusion detection system is designed to recognize the anomalies by employing two pre-trained network models, i.e. VGG-19 and VGG-16 in the Hybrid Deep Convolutional Network over the MANET environment. The signature generator will process these anomalies. The training dataset is incorporated with relevant attributes extracted from a signature generator. Therefore, by including new attack models, this integration makes continuous learning by the hybrid model possible. The hybrid model’s self-healing property allows for early and quick attack discovery. It is done by generating attack features for unknown attacks that occurred previously. The UNSW-NB-15 dataset is utilized to assess the projected methodology, and the provided dataset is employed to evaluate the effectiveness of the projected hybrid classifier. When the experimental outcomes are compared to the conventional models, the proposed model also exhibits improved detection rates for unknown and known attacks.








Similar content being viewed by others
References
Aldweesh A, Derhab A, Emam AZ (2020) Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl Based Syst 189:105124
Alrzini JRS, Pennington D (2020) A polymorphic malware detection techniques review. Int J Adv Res Eng Technol 11:1238–1247
Baek M et al (2021) Accurate prediction of protein structures and interactions using a three-track neural network. Science 373:871–876
Cha Y-O, Hao YT (2022) dawn of metamaterial engineering predicted via hyperdimensional keyword pool and memory learning. Adv Opt Mater 10:2102444
Chen C-M et al (2023) A provably secure key transfer protocol for the fog-enabled social internet of vehicles based on a confidential computing environment. Veh Commun 39:100567
Deng L, Lee M, Wang H (2019) IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int J Inform Manag 49:533–545
Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inform Sec Appl 50:102419
Ge M, Fu X, Syed N, Baig Z, Teo G, Robles-Kelly A (2019) Deep learning-based intrusion detection for IoT networks. In: 2019 IEEE 24th pacific rim international symposium on dependable computing (PRDC), pp. 256-25609 IEEE
Ghafur S et al (2019) A retrospective impact analysis of the wannacry cyberattack on the NHS. NPJ Digit Med 2:1–7
Hassan A, Gumaei A, Alsanad M, Alrubaian M, Fortino G (2020) A hybrid deep learning model for efficient intrusion detection in the big data environment. Inf Sci 513:386–396
Husák M, Kašpar J (2019) Aida framework: real-time correlation and prediction of intrusion detection alerts. In: Proceedings of the 14th international conference on availability, reliability and security, pp 1–8.
Kebir O, Nouaouri I, Rejeb L, Said LB (2022) Atipreta: an analytical model for time-dependent prediction of terrorist attacks. Int J Appl Math Comput Sci 32:495–510
Liu X, Liu J (2021) Malicious traffic detection combined deep neural network with a hierarchical attention mechanism. Sci Rep 11:1–15
Mae Y, Kumagai W, Kanamori T (2021) Uncertainty propagation for dropout-based Bayesian neural networks. Neural Netw 144:394–406
Malik J et al (2020) Hybrid deep learning: an efficient reconnaissance and surveillance detection mechanism in sdn. IEEE Access 8:134695–134706
Nagasree Y et al (2023) Preserving privacy of classified authentic satellite lane imagery using proxy re-encryption and UAV technologies. Drones 7:53
Okutan A, Yang SJ, McConkey K, Werner G (2019) Capture: cyberattack forecasting using non-stationary features with time lags. In: 2019 IEEE Conference on Communications and Network Security (CNS), pp 205–213 (IEEE).
Otomo, Liu D, Nayak A (2019) DL-IDS: a deep learning-based intrusion detection framework for securing IoT. Trans. Emerg. Telecommun. Technol.
Ren K, Zeng Y, Cao Z, Zhang Y (2022) Id-rdrl: A deep reinforcement learning-based feature selection intrusion detection model. Sci Rep 12:1–18
Sagheer A, Kotb M (2019) Unsupervised pre-training of a deep lstm-based stacked autoencoder for multivariate time series forecasting problems. Sci Rep 9:1–16
Sherubha P (2019) An efficient network threat detection and classification method using ANP-MVPS algorithm in wireless sensor networks. Int J Innov Technol Expl Eng 8(11):1597–1606
Sherubha P (2019) An efficient intrusion detection and authentication mechanism for detecting clone attack in wireless sensor networks. J Adv Res Dyn Control Syst 11(5):55–68
Sherubha P (2020) Graph based event measurement for analyzing distributed anomalies in sensor networks. Sādhanā 45(1):212
Shiferaw Y, Lemma S (2021) Limitations of proof of stake algorithm in blockchain: a review. Zede J 39:81–95
Wang B, Su Y, Zhang M, Nie J (2020) A deep hierarchical network for packet-level malicious traffic detection. IEEE Access 8:201728–201740
Werner G, Yang S, McConkey K (2017) Time series forecasting of cyber attack intensity. In: Proceedings of the 12th Annual Conference on Cyber and Information Security Research, pp 1–3.
Werner G, Yang S, McConkey K (2018) Leveraging intra-day temporal variations to predict daily cyberattack activity. In: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), pp 58–63 (IEEE).
Xu J, Li Z, Du B, Zhang M, Liu J (2020) Reluplex made more practical: Leaky relu. In: 2020 IEEE Symposium on Computers and Communications (ISCC), 1–7 (IEEE).
Yang H, Wang F (2019) Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7:64366–64374
Yin C, Zhang S, Wang J, Xiong NN (2020) Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Trans Syst Man Cybernet Syst 52(1):112–122
Funding
There is no funding for this research article.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
As the corresponding author of this manuscript, the authors and co-authors declare that they have no conflicts of interest.
Human or animal participants
This article does not contain any studies involving animals performed and any studies involving human participants performed by any of the authors.
Informed consent
In this article, there is no human or animal sample was involved in this study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bhutia, R., Mothukuri, R. Evaluating the hybrid network model performance for measuring the prognosis of cyber-attacks in MANET over cyber-forecast representation. Int J Syst Assur Eng Manag (2025). https://doi.org/10.1007/s13198-025-03031-9
Received:
Accepted:
Published:
Version of record:
DOI: https://doi.org/10.1007/s13198-025-03031-9
