Tuesday, December 2, 2025

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Hyperparameter Tuning-Based Optimized Performance Analysis of Machine Learning Algorithms for Network Intrusion Detection
Sudhanshu Sekhar Tripathy and Bichitrananda Behera, C.V. Raman Global University, India

Abstract
Network Intrusion Detection Systems (NIDS) are essential for securing networks by identifying and mitigating unauthorized activities indicative of cyberattacks. As cyber threats grow increasingly sophisticated, NIDS must evolve to detect both emerging threats and deviations from normal behavior. This study explores the application of machine learning (ML) methods to improve the NIDS accuracy through analyzing intricate structures in deep-featured network traffic records. Leveraging the 1999 KDD CUP intrusion dataset as a benchmark, this research evaluates and optimizes several ML algorithms, including Support Vector Machines (SVM), Naïve Bayes variants (MNB, BNB), Random Forest (RF), k-Nearest Neighbors (k-NN), Decision Trees (DT), AdaBoost, XGBoost, Logistic Regression (LR), Ridge Classifier, Passive-Aggressive (PA) Classifier, Rocchio Classifier, Artificial Neural Networks (ANN), and Perceptron (PPN). Initial evaluations without hyper-parameter optimization demonstrated suboptimal performance, highlighting the importance of tuning to enhance classification accuracy. After hyper-parameter optimization using grid and random search techniques, the SVM classifier achieved 99.12% accuracy with a 0.0091 False Alarm Rate (FAR), outperforming its default configuration (98.08% accuracy, 0.0123 FAR) and all other classifiers. This result confirms that SVM accomplishes the highest accuracy among the evaluated classifiers. We validated the effectiveness of all classifiers using a tenfold cross-validation approach, incorporating Recursive Feature Elimination (RFE) for feature selection to enhance the classifiers accuracy and efficiency. Our outcomes indicate that ML classifiers are both adaptable and reliable, contributing to enhanced accuracy in systems for detecting network intrusions.

Keywords
Machine learning classification systems, Network intrusion detection mechanism, KDD CUP 1999 data repository, Hyper-parameter tuning, Performance evaluation, Classification accuracy





International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: December 07, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Sunday, November 30, 2025

International Journal of Network Security & Its Applications (IJNSA) - Current Issue: November 2025, Volume 17, Number 5/6

#networksecurity #security #network #blockchain #technology #cybersecurity #artificialintelligence #machinelearning #database #systemsecurity #optimization #internetsecurity #mobile #adhoc #sensors #protocols #Management #intrusion #detection #prevention



International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Current Issue: November 2025, Volume 17, Number 5/6

Hyperparameter Tuning-Based Optimized Performance Analysis of Machine Learning Algorithms for Network Intrusion Detection
Sudhanshu Sekhar Tripathy and Bichitrananda Behera, C.V. Raman Global University, India

An Explainable Graph Neural Network Framework for Anti–Money Laundering in Cryptocurrency Transactions using the Elliptic Dataset
Oluwatosin Lawal1, Awele Okolie2, Callistus Obunadike3, 1Texas A&M University, USA, 2Wentworth Institute of Technology, USA, 3Austin Peay State University, USA

Database and System Security
Nikitha Merilena Jonnada, University of the Cumberlands, USA


Contact us:
Here's where you can reach us : ijnsa@airccse.org or ijnsa@aircconline.com or ijnsajournl@gmail.com

Thursday, November 27, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


International journal of Network Security & Its Applications

Cited Publications - 48.8%

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Wednesday, November 26, 2025

15th International Conference on Advances in Computing and Information Technology (ACITY 2025)

#Computing #InformationTechnology #networking #DataScience #artificialintelligence #virtualreality #BigData #DataBase #cloudcomputing #datamining #computervision #cybersecurity #elearning #deeplearning #machinelearning #Ontology #naturallanguageprocessing #ReinforcementLearning #blockchain #security #Cryptography #softcomputing #SoftwareEngineering #softwaretesting #ComputerScience #engineering #programming #Biometrics #QuantumComputing #SemanticWeb #internetofthings #technology #AdvancedComputing #tech #clouds #GRID #DistributedComputing #parallelcomputing



Submit Your Research Articles...!!!

Welcome To ACITY 2025

15th International Conference on Advances in Computing and Information Technology (ACITY 2025)
December 20 ~ 21, 2025, Sydney, Australia


Submission Deadline: November 29, 2025

Contact us:
Here's where you can reach us: acity@acity2025.org (or) acityconfe@yahoo.com


Tuesday, November 25, 2025

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Methods Toward Enhancing RSA Algorithm : A Survey
Shaheen Saad Al-Kaabi and Samir Brahim Belhaouari, Hamad Bin Khalifa University (HBKU), Qatar

Abstract
Cryptography defines different methods and technologies used in ensuring communication between two parties over any communication medium is secure, especially in presence of a third part. This is achieved through the use of several methods, such as encryption, decryption, signing, generating of pseudo-random numbers, among many others. Cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. This is made possible using two classes of key-based encryption and decryption algorithms, namely symmetric and asymmetric algorithms. The best known and the most widely used public key system is RSA. This algorithm comprises of three phases, which are the key generation phase, encryption phase, and the decryption phase. Owing to the advancement in computing technology, RSA is prone to some security risks, which makes it less secure. The following paper preview different proposals on different methods used to enhance the RSA algorithm and increase its security. Some of these enhancements include combining the RSA algorithm with Diffie-Hellman or ElGamal algorithm, modification of RSA to include three or four prime numbers, offline storage of generated keys, a secured algorithm for RSA where the message can be encrypted using dual encryption keys, etc.

Keywords
Cryptography, RSA Algorithm, Encryption, Decryption, Cryptosystem, Security, Public Key, Private Key






Monday, November 24, 2025

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

#CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper #researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission #opencall #event #applynow



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: November 29, 2025

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA) ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print) Webpage URL: https...