IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 04

Published on: April 2026

DL-IDF:A RESILIENT DEEP LEANING METHODOLOGY FOR SECURING INDUSTRIAL IOT NETWORKS

N Sravani K. Sai Charan S Moksha Netra

G Pavan Kumar ,G Swarnalatha

Dept of CSE,CMR Technical Campus Hyderabad, Telangana, India

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

--- Loan approval is an essential process in financial institutions that requires careful evaluation of an applicant’s financial background and repayment capability. Traditional loan approval methods are often manual, time-consuming, and may lead to inconsistent decisions due to human involvement. To address these challenges, this study proposes a machine learning–based system for predicting loan eligibility using applicant demographic and financial information such as income, loan amount, credit score, employment status, number of dependents, and asset values. The dataset is preprocessed using techniques including missing value handling, categorical encoding, and feature scaling to improve data quality and model performance. Multiple machine learning algorithms such as Logistic Regression, Decision Tree, Random Forest, Gradient Boosting, Support Vector Machine, and K-Nearest Neighbors are implemented and evaluated using performance metrics like accuracy, precision, recall, F1-score, and confusion matrix. Experimental results indicate that ensemble models such as Random Forest and Gradient Boosting achieve higher predictive accuracy compared to other classifiers. The best performing model is integrated into a Streamlit-based web application that enables real-time loan eligibility prediction through a user-friendly interface. The proposed system helps financial institutions automate the loan approval process, reduce manual effort, and improve decision-making efficiency

How to Cite this Paper

Sravani, N., Charan, K. S. & Netra, S. M. (2026). DL-IDF:A Resilient Deep Leaning Methodology for Securing Industrial IOT Networks. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.366

Sravani, N, et al.. "DL-IDF:A Resilient Deep Leaning Methodology for Securing Industrial IOT Networks." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.366.

Sravani, N,K. Charan, and S Netra. "DL-IDF:A Resilient Deep Leaning Methodology for Securing Industrial IOT Networks." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.366.

Search & Index

References

[1] Mukherjee, B., Heberlein, L. T., & Levitt, K. N. (1994). Network Intrusion Detection. IEEE Network, 8(3), 26–41.

[2] Staudemeyer, R. C. (2015). Applying Long Short-Term Memory Recurrent Neural Networks to Intrusion Detection. South African Computer Journal, 56(1), 136–154.

[3] Vinayakumar, R., Alazab, M., Soman, K. P., & Poornachandran, P. (2019). Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access.

[4] Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence.

[5] Moustafa, N., & Slay, J. (2015). The Evaluation of Network Anomaly Detection Systems: Statistical Analysis of the UNSW-NB15 Dataset. IEEE.

[6] Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A Detailed Analysis of the KDD CUP 99 Data Set. IEEE Symposium on Computational Intelligence for Security and Defense Applications.

 

 

 

 

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: Apr 14 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top