Published on: May 2026
COMPARATIVE ANALYSIS OF OPTIMIZATION STRATEGIES FOR NEURAL NETWORK-BASED NETWORK INTRUSION DETECTION ON THE UNSW-NB15 DATASET
Anghan Priyank Aryan Manhas Apoorva Kumari Chandrika Lamani
JP Nagar–560076 Bengaluru
Article Status
Available Documents
Abstract
Keywords: NIDS, Neural Network, Random Forest, Adam Optimizer, SGD, UNSW-NB15, Intrusion Detection, Anomaly Detection
How to Cite this Paper
Priyank, A., Manhas, A., Kumari, A. & Lamani, C. (2026). Comparative Analysis of Optimization Strategies for Neural Network-Based Network Intrusion Detection on the UNSW-NB15 Dataset. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(05). https://doi.org/10.55041/ijcope.v2i5.261
Priyank, Anghan, et al.. "Comparative Analysis of Optimization Strategies for Neural Network-Based Network Intrusion Detection on the UNSW-NB15 Dataset." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i5.261.
Priyank, Anghan,Aryan Manhas,Apoorva Kumari, and Chandrika Lamani. "Comparative Analysis of Optimization Strategies for Neural Network-Based Network Intrusion Detection on the UNSW-NB15 Dataset." International Journal of Creative and Open Research in Engineering and Management 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i5.261.
References
[1] O. Linda, T. Vollmer, and M. Manic, “Neural network based intrusion detection system for critical infrastructures,” in International Joint Conference on Neural Networks, June 2009, pp. 1827–1834.[2] N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems,” in 2015 Military Communications and Information Systems Conference (MilCIS), Nov. 2015, pp. 1–6.
[3] J. Yao, S. Zhao, and L. Fan, “An enhanced support vector machine model for intrusion detection,” in Rough Sets and Knowledge Technology, Berlin, Heidelberg: Springer, 2006, pp. 538–543.
[4] F. E. Heba, A. Darwish, A. E. Hassanien, and A. Abraham, “Principal component analysis and support vector machine based intrusion detection system,” in ISDA, 2010, pp. 363–367.
[5] N. Kausar, B. Belhaouari Samir, A. Abdullah, I. Ahmad, and M. Hussain, “A review of classification approaches using support vector machine in intrusion detection,” in Informatics Engineering and Information Science, Berlin, Heidelberg: Springer, 2011, pp. 24–34.
[6] B. Subba, S. Biswas, and S. Karmakar, “A neural network based system for intrusion detection and attack classification,” in 2016 Twenty Second National Conference on Communication (NCC), March 2016, pp. 1–6.
[7] J. Shun and H. A. Malki, “Network intrusion detection system using neural networks,” in Fourth International Conference on Natural Computation, vol. 5, Oct. 2008, pp. 242–246.
[8] S. S. S. Sindhu, S. Geetha, and A. Kannan, “Decision tree based lightweight intrusion detection using a wrapper approach,” Expert Systems with Applications, vol. 39, no. 1, pp. 129–141, 2012.
[9] M. Kumar, M. Hanumanthappa, and T. V. S. Kumar, “Intrusion detection system using decision tree algorithm,” in IEEE International Conference on Communication Technology, Nov. 2012, pp. 629–634.
[10] G. Meena and R. R. Choudhary, “A review paper on IDS classification using KDD 99 and NSL-KDD dataset in WEKA,” in International Conference on Computer, Communications and Electronics (Comptelix), July 2017, pp. 553–558.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: May 08 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

