Machine Learning Based Intrusion Detection System using Supervised and Unsupervised Learning

Authors

  • Vangara Navaneetha, Prathi Bhargavi, Rayapalli Chandu, Vadi Bhavani UG Student, Department of Computer Science and Engineering, Holy Mary Institute of Technology and Science, Telangana, India Author
  • D. Bhagyaraj Yadav Assistant Professor, Department of Computer Science and Engineering, Holy Mary Institute of Technology and Science, Telangana, India Author
  • Dr. Prasad Dharnasi Professor, Department of Computer Science and Engineering, Holy Mary Institute of Technology and Science, Telangana, India Author

DOI:

https://doi.org/10.15662/IJEETR.2026.0802004

Keywords:

Intrusion Detection System, Machine Learning, Supervised Learning, Unsupervised Learning, Anomaly Detection, Cybersecurity

Abstract

An Intrusion Detection System (IDS) can monitor and sift through data traffic to identify and protect the network from unauthorized or dangerous activities. In this paper, we propose a hybrid approach to Intrusion Detection Systems that utilizes both supervised and unsupervised machine learning models. Supervised learning models use labelled data to train the models to classify traffic, while unsupervised learning models identify anomalies and perform outlier detection without any labelled data. Examples of supervised learning models include Decision Tree, Random Forest, Support Vector Machine, and K-Nearest Neighbours. Examples of unsupervised learning models include K-Means Clustering, Autoencoders, and DBSCAN. Our work use the cleansed and pre-processed NSL-KDD and UNSW-NB15 to develop and evaluate machine learning models to achieve the greatest data accuracy. Our approach hybrid Intrusion Detection System improves the detection of both known and unknown intrusions, decreases the false positive and false negative rates and increases the level of protection offered by IoT and corporate networks. Yes, intrusive detection and preventative systems can learn and continue to evolve over time as new data enters the system, deepening the data accuracy as time goes by. This enhanced system calibres will guarantee a proactive data protection and threat counteraction system to net and wireless net environments. 

References

1. Vaidya, S., Shah, N., Shah, N., & Shankarmani, R. (2020, May). Real-time object detection for visually challenged people. In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 311–316). IEEE.

2. Dharnasi, P. (2025). A multi-domain AI framework for enterprise agility integrating retail analytics with SAP modernization and secure financial intelligence. International Journal of Humanities and Information Technology, 7(4), 61–66.

3. Krishna, G., Rajesh, B., Dinesh, B., Sravani, B., Rajesh, G., Dharnasi, P., & Sarvanan, M. (2026). Smart agriculture system using IoT with help of AI-techniques. International Journal of Computer Technology and Electronics Communication, 9(2), 479–487.

4. Patnaik, S. K., Sidhu, M. S., Gehlot, Y., Sharma, B., & Muthu, P. (2018). Automated skin disease identification using deep learning algorithm. Biomedical & Pharmacology Journal, 11(3), 1429.

5. Saravanan, M., & Sivakumaran, T. S. (2016). Three phase dual input direct matrix converter for integration of two AC sources from wind turbines. Circuits and Systems, 7, 3807–3817.

6. Akshaya, N., Balaji, Y., Chennarao, J., Sathwik, P., & Dharnasi, P. (2026). Diabetic retinopathy diagnosis with deep learning. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 9(2), 506–512.

7. Lakshmi, A. J., Dasari, R., Chilukuri, M., Tirumani, Y., Praveena, H. D., & Kumar, A. P. (2023, May). Design and implementation of a smart electric fence built on solar with an automatic irrigation system. In 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (pp. 1553–1558). IEEE.

8. Reddy, N. H. V., Reddy, N. T., Bharath, M., Hemanth, N., Dharnasi, D. P., Nirmala, B., & Jitendra, A. (2026). AI based learning assistant using machine learning. International Journal of Engineering & Extended Technologies Research, 8(2), 495–504.

9. Kumar, A. S., Saravanan, M., Joshna, N., & Seshadri, G. (2019). Contingency analysis of fault and minimization of power system outage using fuzzy controller. International Journal of Innovative Technology and Exploring Engineering, 9(1), 4111–4115.

10. Gopinathan, V. R. (2025). Intelligent workload scheduling for telecom cloud architecture using reinforcement learning. International Journal of Research Publications in Engineering, Technology and Management, 8(6), 13244–13255.

11. Bhagyasri, Y., Bhargavi, P., Akshaya, T., Pavansai, S., Dharnasi, P., & Jitendra, A. (2026). IoT based security & smart home intrusion prevention system. International Journal of Computer Technology and Electronics Communication, 9(2), 457–462.

12. Roy, S., & Saravana Kumar, S. (2021). Feature construction through inductive transfer learning in computer vision. In Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2020 (pp. 95–107). Springer.

13. Reddy, V. N., Rao, P. H. S., Singh, N. S., Kumar, V. S. S., Reddy, Y. B., & Dharnasi, P. (2026). Face recognition using criminal identification system. International Journal of Research Publications in Engineering, Technology and Management, 9(2), 520–527.

14. Fazilath, M., & Umasankar, P. (2025, February). Comprehensive analysis of artificial intelligence applications for early detection of ovarian tumours: Current trends and future directions. In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS) (pp. 1–9). IEEE.

15. Vijayakumar, R., & Gireesh, G. (2013, July). Quantitative analysis and fracture detection of pelvic bone X-ray images. In 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1–7). IEEE.

16. Chinthala, S., Erla, P. K., Dongari, A., Bantu, A., Chityala, S. G., & Saravanan, M. S. (2026). Food recognition and calorie estimation using machine learning. International Journal of Engineering & Extended Technologies Research, 8(2), 480–488.

17. Saravanan, M., Kumar, A. S., Devasaran, R., Seshadri, G., & Sivaganesan, S. (2019). Performance analysis of very sparse matrix converter using indirect space vector modulation. International Journal of Innovative Technology and Exploring Engineering, 9(1), 4756–4762.

18. Rupika, M., Nandini, G., Mythri, M., Vasu, K., Abhiram, M., Shivalingam, N., & Dharnasi, P. (2026). Electronic gadget addiction prediction using machine learning. International Journal of Research Publications in Engineering, Technology and Management, 9(2), 500–505.

19. Prasad, E. D., Sahithi, B., Jyoshnavi, C., Swathi, D., Arun Kumar, T., Dharnasi, P., & Saravanan, M. (2026). A technology driven solution for food and hunger management. International Journal of Computer Technology and Electronics Communication, 9(2), 440–448.

20. Chanamalla, B., Murali, V. N., Suresh, B., Deepak, M. S., Zakriya, M., Yadav, D. B., & Saravanan, M. (2026). AI-driven multi-agent shopping system through e-commerce system. International Journal of Computer Technology and Electronics Communication, 9(2), 463–470.

21. David, A. (2020). Air pollution control monitoring & delivery rate escalated by efficient use of Markov process in MANET networks: To measure quality of service parameters. Test Engineering & Management.

22. Thotla, S. B., Vyshnavi, S., Anusha, P., Vinisha, R., Mahesh, S., Yadav, D. B., & Dharnasi, P. (2026). Traffic congestion prediction using real time data by using deep learning techniques. International Journal of Engineering & Extended Technologies Research, 8(2), 489–494.

23. Nagamani, K., Laxmikala, K., Sreeram, K., Eshwar, K., Jitendra, A., & Dharnasi, P. (2026). Disaster management and earthquake prediction system using machine learning. International Journal of Research Publications in Engineering, Technology and Management, 9(2), 495–499.

24. Vimal Raja, G. (2024). Intelligent data transition in automotive manufacturing systems using machine learning. International Journal of Multidisciplinary and Scientific Emerging Research, 12(2), 515–518.

25. Rakesh, V., Vinay Kumar, M., Bharath Patel, P., Varun Raj, B., Saravanan, M., & Dharnasi, P. (2026). IoT-based gas leakage detector with SMS alert. International Journal of Computer Technology and Electronics Communication, 9(2), 449–456.

26. Vishwarup, S., et al. (2020). Automatic person count indication system using IoT in a hotel infrastructure. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1–4). IEEE. https://doi.org/10.1109/ICCCI48352.2020.9104195

27. Poornima, G., & Anand, L. (2024, April). Effective strategies and techniques used for pulmonary carcinoma survival analysis. In 2024 1st International Conference on Trends in Engineering Systems and Technologies (ICTEST) (pp. 1–6). IEEE.

28. Nandhini, T., Babu, M. R., Natarajan, B., Subramaniam, K., & Prasanna, D. (2024). A novel hybrid algorithm combining neural networks and genetic programming for cloud resource management. Frontiers in Health Informatics, 13(8).

29. Chinthamalla, N., Anumula, G., Banja, N., Chelluboina, L., Dangeti, S., Jitendra, A., & Saravanan, M. (2026). IoT-based vehicle tracking with accident alert system. International Journal of Research Publications in Engineering, Technology and Management, 9(2), 486–494.

30. Rachana, P., Kalyan, P. P., Kumar, T. S., Reddy, P. M., Rohan, P., Saravanan, M., & Dharnasi, P. (2026). Secure chat application with end-to-end encryption using deep learning. International Journal of Computer Technology and Electronics Communication, 9(2), 472–478.

31. Pavan Kumar, T., Abhishek Goud, T., Yogesh, S., Manikanta, V., Dinesh, P., Srinu, B., & Dharnasi, P. (2026). Smart attendance system using facial recognition for staff using AI/ML. International Journal of Research Publications in Engineering, Technology and Management, 9(2), 513–519. https://doi.org/10.15662/IJRPETM.2026.0902005

32. Charumathi, M. V., & Inbavalli, M. FAMILIARIZING THE PINE NUT OIL BY FUSING IT INTO DIFFERENT FOOD PRODUCTS.

Downloads

Published

2026-03-15

How to Cite

Machine Learning Based Intrusion Detection System using Supervised and Unsupervised Learning. (2026). International Journal of Engineering & Extended Technologies Research (IJEETR), 8(2), 505-511. https://doi.org/10.15662/IJEETR.2026.0802004