Home > Published Issues > 2025 > Volume 16, No. 11, 2025 >
JAIT 2025 Vol.16(11): 1540-1559
doi: 10.12720/jait.16.11.1540-1559

A Real-Time Deep Neural Network-Based System’s Ability to Identify and Classify Active Assaults on Networks

Karthikeyan Kaliyaperumal 1,*, Raja Sarath Kumar Boddu 2, and Sai Kiran Oruganti 3,*
1. School of Global Postdoctoral and Research, Lincoln University College, Pedaling, Jaya, Malaysia
2. Department of Computer Science and Engineering, Raghu Engineering College, Visakhapatnam, India
3. Faculty of Engineering and Built Science, Lincoln University College, Pedaling, Jaya, Malaysia
Email: pdf.kirithicraj@lincoln.edu.my (K.K.); rajaboddu@lincoln.edu.my (R.S.K.B.); saisharma@lincoln.edu.my (S.K.O.)
*Corresponding author

Manuscript received May 6, 2025; revised June 21, 2025; accepted July 8, 2025; published November 7, 2025.

Abstract—In the context of computer science and technology, a group of linked devices, or nodes, that exchange data, resources, or services with one another is referred to as a network. An active network attack refers to a malicious activity in which an attacker deliberately attempts to disrupt, manipulate, or gain unauthorized access to a computer network or its resources. In today’s digital context, network security is of vital importance as cyber threats continue to evolve in terms of sophistication and frequency. Active network attacks pose significant challenges to traditional detection methods, necessitating the exploration of advanced techniques such as deep learning. This research proposes a novel approach for the identification and classification of active network attacks based on deep learning methodologies. To achieve this, an experimental research analysis design was used. A comprehensive review of deep learning approaches appropriate for network attack detection was undertaken. The proposed methodology involves the development of a model based on deep learning that was learned using a dataset comprising diverse network traffic data which is Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD). This study utilizes a comprehensive preprocessing pipeline, including data cleaning, feature selection for categorical variables and standardization of numerical features to prepare the dataset for modeling. To extract the pertinent information, preprocessing approaches are used. Metrics like as accuracy, precision, recall, F1-Score, and confusion matrix are used to evaluate performance as a result from deep learning models Deep Neural Network (DNN), Convolution Neural Networks (CNN), Long Short Term Memory(LSTM), Bi-Long Short Term Memory (Bi-LSTM) and Gated Recurrent Units (GRU) experiments done, Bi-LSTM model scored the best result of 99.15% and 99.12% accuracy for binary and multi classification, respectively.
 
Keywords—active network, cyber attacks, Deep Neural Network (DNN), Convolution Neural Networks (CNN), deep learning, detection, neural networks

Cite: Karthikeyan Kaliyaperumal, Raja Sarath Kumar Boddu, and Sai Kiran Oruganti, "A Real-Time Deep Neural Network-Based System’s Ability to Identify and Classify Active Assaults on Networks," Journal of Advances in Information Technology, Vol. 16, No. 11, pp. 1540-1559, 2025. doi: 10.12720/jait.16.11.1540-1559

Copyright © 2025 by the authors. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Article Metrics in Dimensions