IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 05

Published on: May 2026

COMPARATIVE ANALYSIS OF OPTIMIZATION STRATEGIES FOR NEURAL NETWORK-BASED NETWORK INTRUSION DETECTION ON THE UNSW-NB15 DATASET

Anghan Priyank Aryan Manhas Apoorva Kumari Chandrika Lamani

Department of Computer Science and Engineering RV Institute of Technology and Management
JP Nagar–560076 Bengaluru

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

Network Intrusion Detection Systems (NIDS) are a critical component of modern cybersecurity infrastructure. This paper extends the Neural Network-based NIDS framework proposed by Subba (2019) by introducing two novel contributions: (1) the Adam optimizer as an alternative to Stochastic Gradient Descent (SGD) for training the MLP classifier, and (2) a Random Forest classifier as a strong ensemble baseline. All three models are evaluated on the contemporary UNSW-NB15 binary classification dataset. Experimental results show that the Adam-optimized neural network (Accuracy: 96.58%, AUC: 1.00) outperforms the SGD baseline (Accuracy: 96.19%, AUC: 0.99), and the Random Forest achieves the highest overall performance (Accuracy: 97.59%, AUC: 1.00). These findings confirm the benefit of adaptive optimization and ensemble methods for real-time network anomaly detection.

Keywords: NIDS, Neural Network, Random Forest, Adam Optimizer, SGD, UNSW-NB15, Intrusion Detection, Anomaly Detection

How to Cite this Paper

Priyank, A., Manhas, A., Kumari, A. & Lamani, C. (2026). Comparative Analysis of Optimization Strategies for Neural Network-Based Network Intrusion Detection on the UNSW-NB15 Dataset. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(05). https://doi.org/10.55041/ijcope.v2i5.261

Priyank, Anghan, et al.. "Comparative Analysis of Optimization Strategies for Neural Network-Based Network Intrusion Detection on the UNSW-NB15 Dataset." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i5.261.

Priyank, Anghan,Aryan Manhas,Apoorva Kumari, and Chandrika Lamani. "Comparative Analysis of Optimization Strategies for Neural Network-Based Network Intrusion Detection on the UNSW-NB15 Dataset." International Journal of Creative and Open Research in Engineering and Management 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i5.261.

Search & Index

References

[1] O. Linda, T. Vollmer, and M. Manic, “Neural network based intrusion detection system for critical infrastructures,” in International Joint Conference on Neural Networks, June 2009, pp. 1827–1834.

[2] N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems,” in 2015 Military Communications and Information Systems Conference (MilCIS), Nov. 2015, pp. 1–6.

[3] J. Yao, S. Zhao, and L. Fan, “An enhanced support vector machine model for intrusion detection,” in Rough Sets and Knowledge Technology, Berlin, Heidelberg: Springer, 2006, pp. 538–543.

[4] F. E. Heba, A. Darwish, A. E. Hassanien, and A. Abraham, “Principal component analysis and support vector machine based intrusion detection system,” in ISDA, 2010, pp. 363–367.

[5] N. Kausar, B. Belhaouari Samir, A. Abdullah, I. Ahmad, and M. Hussain, “A review of classification approaches using support vector machine in intrusion detection,” in Informatics Engineering and Information Science, Berlin, Heidelberg: Springer, 2011, pp. 24–34.

[6] B. Subba, S. Biswas, and S. Karmakar, “A neural network based system for intrusion detection and attack classification,” in 2016 Twenty Second National Conference on Communication (NCC), March 2016, pp. 1–6.

[7] J. Shun and H. A. Malki, “Network intrusion detection system using neural networks,” in Fourth International Conference on Natural Computation, vol. 5, Oct. 2008, pp. 242–246.

[8] S. S. S. Sindhu, S. Geetha, and A. Kannan, “Decision tree based lightweight intrusion detection using a wrapper approach,” Expert Systems with Applications, vol. 39, no. 1, pp. 129–141, 2012.

[9] M. Kumar, M. Hanumanthappa, and T. V. S. Kumar, “Intrusion detection system using decision tree algorithm,” in IEEE International Conference on Communication Technology, Nov. 2012, pp. 629–634.

[10] G. Meena and R. R. Choudhary, “A review paper on IDS classification using KDD 99 and NSL-KDD dataset in WEKA,” in International Conference on Computer, Communications and Electronics (Comptelix), July 2017, pp. 553–558.

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: May 08 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top