Hybrid Adaptive Threat Intelligence Detection System for Modern Cyber Attacks

Authors

  • I. Varalakshmi
  • S. Pariselvam
  • D. Oviya

DOI:

https://doi.org/10.63682/jns.v14i30S.7031

Keywords:

HATIDS, Intrusion Detection System, Zero-Day Attacks, Anomaly Detection, Machine Learning, Cybersecurity False Positives, Mitigation Time, Threat Intelligence, Feature Fusion

Abstract

Situations like zero-day attacks and advanced persistent threats require strong real-time detection of intrusion methods. The HATIDS combines signature-based detection and machine learning algorithms namely Isolation Forest and One-Class Support Vector Machine (SVM) employing a new weighted feature fusion engine for the best threat scoring. In the experiment on CIC-IDS2017 dataset and attacks such as DDoS and botnets, HATIDS has a 94.26% detection accuracy, 12 false positives reduced (6%) and 18 false negatives reduced (7%), and a mitigation time of 450 seconds, better than the previous hybrid models by 25%. This would in effect reduce the level of alert fatigue and improve security operations. The given features of HATIDS such as real time automated mitigation, threat intelligence sharing, and sharing make it scalable for enterprises and IoT. In future work we plan to look into developing abilities in detecting encrypted threats and to also extend to the federated learning approach.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

A. K. Ranjan and A. K. Dubey, "Evolution and Advancements in Intrusion Detection Systems: From Traditional Methods to Deep Learning and Federated Learning Approaches," ACCENTS Transactions on Information Security, vol. 9, no. 36, pp. 15–19, 2024.

M. S. Khan, H. J. Kim, S. R. Lee, and J. Y. Kwon, "Hybrid Anomaly Detection Model for Real-Time Cyber Threat Detection Using Machine Learning and Signature-Based Approaches," IEEE Access, vol. 9, pp. 54870–54882, Mar. 2021.

T. N. Dang, V. T. Nguyen, and D. C. Nguyen, "Zero-Day Vulnerability Detection Using Machine Learning Techniques in Cybersecurity," Journal of Network and Computer Applications, vol. 185, pp. 103108, May 2022.

A. Roy, R. Jha, and K. Kumar, "Adaptive Threat Intelligence for Hybrid Detection Systems: Reducing False Positives in Real-Time," ACM Transactions on Privacy and Security, vol. 26, no. 4, pp. 23–45, Sep. 2023.

M. P. Singh, R. Sharma, and P. R. Gupta, "Improved Mitigation Time in Cybersecurity Systems Using Automation and Anomaly Detection," International Journal of Information Security, vol. 18, no. 1, pp. 88–104, Jan. 2023.

J. Zhang, L. Yu, and H. Liu, "Combining Signature-Based and Machine Learning Approaches to Detect Cyber Threats in Smart Environments," IEEE Transactions on Cybernetics, vol. 53, no. 2, pp. 451–462, Feb. 2024.

S. M. Allen, P. Verma, and K. S. Rao, "Collaborative Threat Intelligence Sharing for Enhanced Cybersecurity Detection and Mitigation," Cybersecurity Science and Engineering Journal, vol. 13, no. 2, pp. 120–137, Jun. 2022.

L. Yu, J. Zhang, and T. Nguyen, "Hybrid Cyber Threat Detection Systems for Smart City Networks," IEEE Internet of Things Journal, vol. 10, no. 5, pp. 19045–19060, Jun. 2024.

J. Wu, H. Lee, and A. Kumar, "Improved Cyber Defense Mechanisms Using Hybrid Machine Learning-Based IDS," IEEE Access, vol. 11, pp. 24560–24575, Apr. 2024.

D. Patel, M. S. Allen, and L. Zhang, "Adaptive Detection Frameworks for Zero-Day Attacks Using Hybrid Systems," ACM Transactions on Privacy and Security, vol. 27, no. 1, pp. 33–48, Mar. 2024.

K. Patel, D. Verma, and S. Allen, "Feature Fusion in Hybrid IDS for Improved Detection Accuracy," International Journal of Information Security, vol. 30, no. 2, pp. 77–95, Apr. 2024.

R. Singh, K. Kumar, and A. Gupta, "Integration of Threat Intelligence into Hybrid IDS for Real-Time Detection," ACM Computing Surveys, vol. 56, no. 3, pp. 65–80, Dec. 2023.

C. Zhao, Y. Chen, and H. Li, "Dynamic Hybrid Models for Advanced Cyber Threat Detection," IEEE Transactions on Network and Service Management, vol. 14, no. 6, pp. 385–402, Dec. 2023.

F. Wang, J. Park, and S. K. Kim, "Real-Time Intrusion Detection with Optimized Machine Learning Algorithms," Journal of Information Security and Applications, vol. 65, pp. 102937, Jan. 2023.

S. Verma, P. Patel, and R. Rao, "Collaborative Intelligence for Threat Detection in Distributed Systems," Journal of Cybersecurity Research, vol. 22, no. 3, pp. 105–120, Jul. 2023.

T. Zhang, X. Liu, and H. Li," IEEE Transactions on Dependable and Secure Computing, "Multimodal Detection Framework for Cyber Threats Using Hybrid Techniques, vol. 19, no. 2, pp. 310–325, Nov. 2023.

D. Chen, M. S. Kim, and J. Y. Lee, "Advanced Detection Techniques for Real-Time Cybersecurity Systems," IEEE Transactions on Cybersecurity, vol. 54, no. 1, pp. 35–50, Jan. 2024.

P. Kumar, L. Wang, and J. Brown, "Threat Mitigation Strategies Using Hybrid Adaptive Models," Journal of Network and Computer Applications, vol. 190, pp. 103215, Feb. 2024.

M. P. Singh, T. N. Dang, and R. Gupta, "A Unified Hybrid Approach for Real-Time Threat Detection in IoT Ecosystems," IEEE Access, vol. 12, pp. 45870–45885, Mar. 2024.

R. T. Sharma, V. Gupta, and S. Roy, “Cybersecurity Science Journal,"Anomaly and Signature-Based Detection for Enhanced Network Security, vol. 12, no. 4, pp. 140–158, Aug. 2023.

S. Fuhrman, O. Gungor, and T. Rosing, "CND-IDS: Continual Novelty Detection for Intrusion Detection Systems," IEEE Transactions on Information Forensics and Security, vol. 20, no. 2, pp. 75–89, Feb. 2025.

M. A. Akif, I. Butun, A. Williams, and I. Mahgoub, "Hybrid Machine Learning Models for Intrusion Detection in IoT," Journal of Information Security and Applications, vol. 92, no. 1, pp. 101221–101234, Jan. 2025.

M. Gourceyraud, R. Ben Salem, C. Neal, F. Cuppens, and N. Boulahia Cuppens, "Federated Intrusion Detection System Based on Unsupervised Machine Learning," ACM Transactions on Privacy and Security, vol. 28, no. 1, pp. 32–47, Mar. 2025.

E. Li, Z. Shang, O. Gungor, and T. Rosing, Self-Supervised Anomaly Detection Framework for Intrusion Detection," IEEE Access, vol. 13, pp. 11256–11273, Apr. 2025

Downloads

Published

2025-06-04

How to Cite

1.
Varalakshmi I, Pariselvam S, Oviya D. Hybrid Adaptive Threat Intelligence Detection System for Modern Cyber Attacks. J Neonatal Surg [Internet]. 2025Jun.4 [cited 2025Oct.21];14(30S):654-71. Available from: https://www.jneonatalsurg.com/index.php/jns/article/view/7031