JOURNAL ARTICLE

Development of Intrusion Detection System using Residual Feedforward Neural Network Algorithm

Rushendra RushendraKalamullah RamliNur HayatiEko IhsantoTeddy Surya GunawanAsmaa Halbouni

Year: 2021 Journal:   2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) Pages: 539-543

Abstract

An intrusion detection system (IDS) is required to protect data from security threats that infiltrate unwanted information via a regular channel, both during storage and transmission. This detection system must differentiate between normal data and abnormal or hacker-generated data. Additionally, the intrusion detection system (IDS) must be precise and quick to analyze real-time traffic data. Despite extensive research, there is still a need to improve detection accuracy and speed due to the tremendous increase in internet traffic volume and variety. This paper introduces a novel, efficient, and accurate approach for real-time intrusion detection and classification based on the Residual Feedforward Neural Network (RFNN) algorithm. The RFNN algorithm is developed to avoid overfitting, improve detection accuracy, and accelerate training and inference. Additionally, the suggested algorithm is highly adaptable and straightforward to accommodate different types of intrusion. The prominent NSL-KDD dataset was utilized for training and testing in this study. The accuracy obtained for two and five classes was 84.7 percent and 90.5 percent, respectively. Additionally, the identification speed was $15\ \mu\mathrm{s}$ and $14\ \mu\mathrm{s}$ , respectively, indicating that real-time detection is feasible.

Keywords:
Overfitting Intrusion detection system Computer science Residual Artificial intelligence Artificial neural network Algorithm Data mining Identification (biology) Machine learning

Metrics

7
Cited By
1.56
FWCI (Field Weighted Citation Impact)
22
Refs
0.82
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.