A Comprehensive Overview of IDPS and Using The TII-SSRC-2023 Dataset for Implementing Machine Learning Techniques for Enhancing Network Security
-
https://doi.org/10.14419/9t3jm248
Received date: June 18, 2025
Accepted date: June 20, 2025
Published date: November 1, 2025
-
Machine-learning-based Intrusion Detection; IDPS; TII-SSRC-23 Dataset -
Abstract
The growing number of connected devices and individuals, coupled with the rise in AI-driven attacks, has made robust network security essential. The dynamic nature of networks, the increasing variety of attack types, and the exponential growth of Artificial Intelligence in attacks have rendered traditional Intrusion Detection techniques obsolete. Therefore, it is necessary to create an effective Intrusion Detection and Prevention System (IDPS). Only a warning or alert message is sent by the Intrusion Detection System (IDS); it does not stop an intrusion from occurring within the network. Therefore, countermeasures can prevent, detect, and limit such attacks that could have a significant impact on the services that these networks offer. This paper begins with an explanation of the distinctions between IDS and IDPS. Additionally, it describes several intrusion detection mechanisms and their corresponding tools, such as SNORT, OSSEC-HIDS, and KISMET, continuing with the different IDPS types and how they operate. Next, for intrusion detection methods in large-scale networks, we delve deeper into some machine learning-based approaches in this research, including SVM, Decision Trees, MLP, XGBoost, and others. The TII-SSRC-23 dataset was utilized for evaluation, and the outcomes were compared to well-known machine learning-based methods for network intrusion detection. Additionally, this paper provides a detailed explanation of various recent cyberattacks documented in the TII-SSRC-23 dataset, including DDoS assaults, Brute-Force attacks, Mirai attacks, and information gathering.
-
References
- Abdulganiyu, O. H., Tchakoucht, T. A., & Saheed, Y. K. (2024). Towards an efficient model for network intrusion detection system (IDS): Systematic literature review. Wireless Networks, 30, 453–482. https://doi.org/10.1007/s11276-023-03495-2.
- Prayaga, L., Devulapalli, K., & Prayaga, C. (2022). Research anthology on machine learning techniques, methods, and applications (pp. 1023–1037). https://doi.org/10.4018/978-1-6684-6291-1.ch053.
- ·Sowmya, T., & Mary Anita, E. A. (2023). A comprehensive review of an AI-based intrusion detection system. Measurement: Sensors, 28. https://doi.org/10.1016/j.measen.2023.100827.
- Macfadyen, L. P., & Doff, S. (2006). Encyclopedia of human-computer interaction (pp. 396–403). https://doi.org/10.4018/978-1-59140-562-7.ch060.
- Herzalla, D., Lunardi, W. T., & Andreoni, M. (2023). TII-SSRC-23 dataset: Typological exploration of diverse traffic patterns for intrusion detection. IEEE Access, 11, 118577–118594. https://doi.org/10.1109/ACCESS.2023.3319213.
- Burrell, D. N. (2018). International Journal of Hyperconnectivity and the Internet of Things, 52–67. https://doi.org/10.4018/IJHIoT.2018010105.
- Ahmed, U., Nazir, M., Sarwar, A., et al. (2025). Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering. Scientific Reports, 15, Article 1726. https://doi.org/10.1038/s41598-025-85866-7.
- Chandrasekaran, M., & Wahida Banu, R. S. D. (2009). Breakthrough perspectives in network and data communications security, design, and applica-tions (pp. 78–94).
- Hossain, M. S., et al. (2023). Performance evaluation of an intrusion detection system using machine learning and deep learning algorithms. 4th Inter-national Conference on Big Data Analytics and Practices (IBDAP), 1–6. https://doi.org/10.1109/IBDAP58581.2023.10271964.
- Chowdary, P. B. K., Udayakumar, R., Jadhav, C., Mohanraj, B., & Vimal, V. R. (2024). An efficient intrusion detection solution for cloud computing environments using integrated machine learning methodologies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Appli-cations, 15(2), 14–26. https://doi.org/10.58346/JOWUA.2024.I2.002.
- Abdulganiyu, O. H., Tchakoucht, T. A., & Saheed, Y. K. (2023). A systematic literature review for network intrusion detection systems (IDS). Interna-tional Journal of Information Security, 22, 1125–1162. https://doi.org/10.1007/s10207-023-00682-2.
- Al-Omari, M., & Al-Haija, Q. A. (2024). Towards robust IDSs: An integrated approach of hybrid feature selection and machine learning. Journal of Internet Services and Information Security, 14(2), 47–67. https://doi.org/10.58346/JISIS.2024.I2.004.
- Gupta, N., Jindal, V., & Bedi, P. (2023). A survey on intrusion detection and prevention systems. SN Computer Science, 4, Article 439. https://doi.org/10.1007/s42979-023-01926-7.
- Krishnan, G., Krishnan, N., Karim, S. S., Yuvarajan, G., & Priya, M. R. (2020). Cyber security in data mining to data driven security. International Journal of Advances in Engineering and Emerging Technology, 11(1), 71–76.
- Utarbayeva, M., & Mukanova, M. (2024). Integrated computer network security system: Intrusion detection and threat prediction using machine learn-ing algorithms. IEEE 4th International Conference on Smart Information Systems and Technologies (SIST), 565–570. https://doi.org/10.1109/SIST61555.2024.10629410.
- Ariunaa, K., & Tudevdagva, U. (2025). Generative adversarial network-based damage simulation model for reinforced concrete structures. Interna-tional Academic Journal of Innovative Research, 12(2), 43–53. https://doi.org/10.71086/IAJIR/V12I2/IAJIR1216.
- Sharma, Y., Chaudhary, J., & Malhotra, V. (2023). Intrusion prevention system for website attacks. International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 3(7). https://ijarsct.co.in/Paper9492.pdf.
- Hussain, I., & Khanna, S. (2025). Development of a chaos theory-based digital image encryption algorithm for enhanced security in modern applica-tions. International Academic Journal of Science and Engineering, 12(2), 1–5. https://doi.org/10.71086/IAJSE/V12I2/IAJSE1210.
- Diez, I. J. B., & Teleron, J. I. (2025). Enhancing cybersecurity: A comprehensive study of intrusion detection and prevention systems. International Journal of Advanced Research in Arts, Science, Engineering & Management (IJARASEM), 12(1).
- Talukder, M. A., Islam, M. M., Uddin, M. A., et al. (2024). Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction. Journal of Big Data, 11, Article 33. https://doi.org/10.1186/s40537-024-00886-w.
- Balamurugan, M., Varanasi, U., Mangai, R. A., Vinayagam, P., Karuppaiah, S., & Sayyed, H. (2024). Deep learning-powered intrusion detection sys-tems: Enhancing efficiency in network security. International Conference on Advances in Computing, Communication and Applied Informatics (AC-CAI), 1–7. https://doi.org/10.1109/ACCAI61061.2024.10602010.
- Telang, S., & Ranawat, R. (2024). Enhancing network security with deep learning-based intrusion detection systems. Journal of Computer Analysis and Applications (JoCAAA), 33(7), 1003–1013. https://eudoxuspress.com/index.php/pub/article/view/1163.
- Sharath, T., & Muthukumaravel, A. (2024). Deep learning-powered intrusion detection systems networks using LSTM. In S. S. Rajest et al. (Eds.), Ad-vancing intelligent networks through distributed optimization (pp. 105–126). IGI Global. https://doi.org/10.4018/979-8-3693-3739-4.ch006.
- Al-Doori, M. B., & Komotskiy, E. I. (2024). Intrusion detection and prevention system AI based features with random forest. IEEE Ural-Siberian Con-ference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), 326–328. https://doi.org/10.1109/USBEREIT61901.2024.10584056.
- Rakesh, L., Upadhyay, L., Reddy, P. M. (2023). Evaluation of network intrusion detection with machine learning and deep learning using ensemble methods on CICIDS-2017 dataset. 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 1429–1433. https://doi.org/10.1109/ICAC3N60023.2023.10541488.
- Issa, M. M., Aljanabi, M., & Muhialdeen, H. M. (2024). Systematic literature review on intrusion detection systems: Research trends, algorithms, meth-ods, datasets, and limitations. Journal of Intelligent Systems, 33(1), Article 20230248. https://doi.org/10.1515/jisys-2023-0248.
- Khanan, A., Mohamed, Y. A., Mohamed, A. H. H. M., & Bashir, M. (2024). From bytes to insights: A systematic literature review on unraveling IDS datasets for enhanced cybersecurity understanding. IEEE Access, 12, 59289–59317. https://doi.org/10.1109/ACCESS.2024.3392338.
- Kauhsik, B., Nandanwar, H., & Katarya, R. (2023). IoT security: A deep learning-based approach for intrusion detection and prevention. International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT), 1–7. https://doi.org/10.1109/EASCT59475.2023.10392490.
- Panchal, R. K., Snehkunj, R., & Panchal, V. V. (2024). A survey on network-based intrusion detection system using learning techniques. 5th Interna-tional Conference on Image Processing and Capsule Networks (ICIPCN), 740–747. https://doi.org/10.1109/ICIPCN63822.2024.00128.
- Kizza, J. M. (2024). System intrusion detection and prevention. In Guide to computer network security (pp. 233–256). Springer. https://doi.org/10.1007/978-3-031-47549-8_13.
- Sharma, V., & Kumar, M. (2025). Comparative analysis of machine learning models for intrusion detection systems. Panamerican Mathematical Jour-nal, 35(3s). https://doi.org/10.52783/pmj.v35.i3s.3891.
- Singh, R., & Ujjwal, R. L. (2024). Intrusion detection and prevention system for smart IoT network. In Adaptive Intelligence. InCITe 2024. Lecture Notes in Electrical Engineering (Vol. 1280). Springer. https://doi.org/10.1007/978-981-97-9045-6.
- Kukartsev, V., Kravtsov, K., Stefanenko, O., Podanyov, N., & Bezvorotnykh, A. (2024). Using machine learning techniques to simulate network intru-sion detection. International Conference on Intelligent Systems for Cybersecurity (ISCS), 1–4. https://doi.org/10.1109/ISCS61804.2024.10581097.
- Möller, D. P. F. (2023). Intrusion detection and prevention. In Guide to cybersecurity in digital transformation (Advances in Information Security, Vol. 103). Springer. https://doi.org/10.1007/978-3-031-26845-8_3.
- Guntoro, G., & Omar, M. N. B. (2023). A systematic literature review of intrusion detection system in network security. In Computing and Informatics. ICOCI 2023. Communications in Computer and Information Science (Vol. 2001). Springer. https://doi.org/10.1007/978-981-99-9589-9_8.
- Rysbekov, S., Aitbanov, A., Abdiakhmetova, Z., & Kartbayev, A. (2025). Advancing network security: A comparative research of machine learning techniques for intrusion detection. International Journal of Electrical and Computer Engineering (IJECE), 15(2), 2271–2281. https://doi.org/10.11591/ijece.v15i2.
- Yogesh, & Goyal, L. M. (2023). A systematic literature review of network intrusion detection system models. In Proceedings of the International Con-ference on Paradigms of Communication, Computing and Data Analytics (PCCDA). Springer. https://doi.org/10.1007/978-981-99-4626-6_38.
- Rege, P. R., Kalnawat, A., Dhablia, A., Sharma, R., Kaldoke, R. S., & Ashtagi, R. (2024). Exploring machine learning’s role in intrusion detection sys-tems for network security. International Conference on Emerging Smart Computing and Informatics (ESCI), 1–6. https://doi.org/10.1109/ESCI59607.2024.10497357.
- Lucena, K., Luedeke, H. J., & Wirth, T. (2025). The evolution of embedded systems in smart wearable devices: Design and implementation. SCCTS Journal of Embedded Systems Design and Applications, 2(1), 23–35.
- Megha, N., Shetty, P., Kudtarkar, R. R., Naik, S. U., & Abhilash, A. L. (2024). Design and VLSI Implementation of SAR Analog to Digital Converter Using Analog Mixed Signal. Journal of VLSI Circuits and Systems, 6(1), 55–60. https://doi.org/10.31838/jvcs/06.01.09.
- Madhanraj. (2025). Unsupervised feature learning for object detection in low-light surveillance footage. National Journal of Signal and Image Pro-cessing, 1(1), 34–43.
- Sathish Kumar, T. M. (2024). Measurement and modeling of RF propagation in forested terrains for emergency communication. National Journal of RF Circuits and Wireless Systems, 1(2), 7–15.
- Rahim, R. (2025). Lightweight speaker identification framework using deep embeddings for real-time voice biometrics. National Journal of Speech and Audio Processing, 1(1), 15–21.
- Uvarajan, K. P. (2025). Design of a hybrid renewable energy system for rural electrification using power electronics. National Journal of Electrical Electronics and Automation Technologies, 1(1), 24–32.
-
Downloads
-
How to Cite
Chandrasekharan , A. ., & Kizhakkethottam , D. J. J. . (2025). A Comprehensive Overview of IDPS and Using The TII-SSRC-2023 Dataset for Implementing Machine Learning Techniques for Enhancing Network Security. International Journal of Basic and Applied Sciences, 14(SI-1), 501-509. https://doi.org/10.14419/9t3jm248
