IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 03

Published on: March 2026 2026

AI-ENABLED INTRUSION DETECTION FRAMEWORK FOR SECURE SMART NETWORK ENVIRONMENTS

Harish Kanchan Shreekanth Nirmala N G Chaithra Achar

Department of computer Applications Dr. B. B. Hegde First Grade College Kundapura Karnataka

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

The rapid growth of smart network environments, cloud computing, and Internet of Things (IoT) devices has significantly increased the risk of cyber attacks. Traditional intrusion detection systems rely mainly on signature-based techniques, which are ineffective in detecting unknown or evolving threats. Artificial Intelligence (AI) and Machine Learning (ML) techniques provide advanced capabilities for analyzing large-scale network traffic and detecting malicious behavior.

This paper proposes an AI-enabled intrusion detection framework designed to enhance the security of smart network infrastructures. The proposed system utilizes machine learning algorithms to monitor network traffic, identify abnormal patterns, and classify potential intrusions. The framework consists of multiple stages including data collection, preprocessing, feature extraction, model training, and intrusion detection.

Experimental evaluation using benchmark datasets demonstrates that the AI-based model achieves improved detection accuracy and reduced false positive rates compared to conventional intrusion detection systems. The proposed framework provides an efficient and intelligent approach to securing modern smart network environments.

How to Cite this Paper

Kanchan, H., Shreekanth, , Nirmala, & Achar, N. G. C. (2026). AI-Enabled Intrusion Detection Framework for Secure Smart Network Environments. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(03). https://doi.org/10.55041/ijcope.v2i3.206

Kanchan, Harish, et al.. "AI-Enabled Intrusion Detection Framework for Secure Smart Network Environments." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i3.206.

Kanchan, Harish, Shreekanth, Nirmala, and N Achar. "AI-Enabled Intrusion Detection Framework for Secure Smart Network Environments." International Journal of Creative and Open Research in Engineering and Management 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i3.206.

Search & Index

References


  1. E. Denning, “An Intrusion Detection Model,” IEEE Transactions on Software Engineering, 1987.

  2. Tavallaee et al., “A Detailed Analysis of the KDD Cup 99 Dataset,” IEEE Symposium on Computational Intelligence, 2009.

  3. Sharafaldin, A. Lashkari, and A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset,” ICISSP, 2018.

  4. Dua and X. Du, Data Mining and Machine Learning in Cybersecurity, CRC Press, 2016.

  5. Kim et al., “Deep Learning Based Intrusion Detection System,” IEEE Access, 2020.

  6. Alanazi et al., “Intrusion Detection System: Overview.” https://arxiv.org/abs/1002.4047

  7. Albayati and B. Issac, “Analysis of Intelligent Classifiers for Intrusion Detection Systems.” Link:https://arxiv.org/abs/1509.08239

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: Mar 29 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top