Performance Evaluation of AI Driven Cybersecurity Intrusion Detection Systems Using Adversarial Traffic in Encrypted Networks

Authors

  • Ilkin Javadov Azerbaijan Technical University

DOI:

https://doi.org/10.22399/ijcesen.3694

Keywords:

Artificial intelligence, Cybersecurity, Intrusion Detection System (IDS), AI-driven encryption, Advanced Encryption Standard

Abstract

The growth of encrypted network traffic in recent years has made it much more difficult to identify advanced cyberthreats. In these kinds of settings, traditional intrusion detection systems (IDS) frequently find it difficult to remain accurate, especially when confronted with maliciously constructed traffic that is intended to avoid detection. The performance of AI driven cybersecurity intrusion detection systems running inside encrypted network infrastructures is thoroughly assessed in this study.In order to replicate realistic adversarial scenarios, a controlled testbed was created that included datasets with both malicious and benign encrypted flows. Under various degrees of adversarial perturbations, a number of machine learning and deep learning models, such as Random Forest, Support Vector Machine, and Convolutional Neural Networks, were trained and assessed. Performance metrics such as accuracy, precision, recall, F1 score, and ROC-AUC were measured to quantify detection capability. The results demonstrate that while AI driven IDS significantly outperform traditional signature based methods, their resilience decreases under high intensity adversarial traffic, particularly in scenarios with limited feature visibility due to encryption. This research highlights the importance of incorporating adversarial training, feature engineering, and adaptive learning strategies to enhance IDS robustness in encrypted environments. The findings provide actionable insights for the development of next generation cybersecurity solutions capable of mitigating advanced evasion techniques.

References

[1] Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316. DOI:10.1109/SP.2010.25

[2] Goodfellow, I., Shlens, J., & Szegedy, C. (2015). Explaining and harnessing adversarial examples. International Conference on Learning Representations (ICLR 2015). https://arxiv.org/abs/1412.6572

[3] Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31. DOI:10.1016/j.jnca.2015.11.016

[4] Kurakin, A., Goodfellow, I., & Bengio, S. (2017). Adversarial machine learning at scale. International Conference on Learning Representations (ICLR 2017). https://arxiv.org/abs/1611.01236

[5] Zhang, J., & Zulkernine, M. (2006). Anomaly based network intrusion detection with unsupervised outlier detection. Proceedings of the 2006 IEEE International Conference on Communications, 2388–2393. DOI:10.1109/ICC.2006.255506

Downloads

Published

2024-12-29

How to Cite

Javadov, I. (2024). Performance Evaluation of AI Driven Cybersecurity Intrusion Detection Systems Using Adversarial Traffic in Encrypted Networks. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.3694

Issue

Section

Research Article