Hybrid Intrusion Detection System for Enhanced SME Network Security
DOI:
https://doi.org/10.15662/IJEETR.2026.0802039Keywords:
Hybrid Intrusion Detection System, Artificial Intelligence, Machine Learning, XGBoost, Network Security, SME Cybersecurity, Anomaly Detection, Adaptive Learning, Cyber Threats, Intelligent Security SystemsAbstract
The rapid increase in the complexity and volume of cyber threats has created an urgent need for intelligent and adaptive Intrusion Detection Systems (IDS) to secure modern digital infrastructures, particularly within Small and Medium Enterprises (SMEs). Conventional IDS mechanisms, primarily based on signature matching and static rule sets, are inadequate for identifying zero-day attacks and evolving intrusion patterns. To overcome these limitations, Artificial Intelligence (AI) has emerged as a powerful enhancement for IDS frameworks. AI-driven IDS integrate Machine Learning (ML) techniques to analyze large-scale network traffic, system logs, and user behavior data, enabling accurate detection of anomalous and malicious activities
The rapid increase in the complexity and volume of cyber threats has created an urgent need for intelligent and adaptive Intrusion Detection Systems (IDS) to secure modern digital infrastructures, particularly within Small and Medium Enterprises (SMEs). Conventional IDS mechanisms, primarily based on signature matching and static rule sets, are inadequate for identifying zero-day attacks and evolving intrusion patterns. To overcome these limitations, Artificial Intelligence (AI) has emerged as a powerful enhancement for IDS frameworks. AI-driven IDS integrate Machine Learning (ML) techniques to analyze large-scale network traffic, system logs, and user behavior data, enabling accurate detection of anomalous and malicious activities
This paper presents a hybrid AI-driven intrusion detection framework designed for SME network environments. The proposed system leverages XGBoost-based classification to improve detection accuracy while maintaining computational efficiency. Experimental evaluation demonstrates superior performance compared to conventional IDS approaches.
References
1. Y. Zhang, X. Li, and H. Wang, “Hybrid CNN-LSTM Model for Intrusion Detection in IoT Networks,” IEEE Transactions on Information Forensics and Security, vol. 19, no. 1, pp. 112–124, 2024.
2. S. Kim and J. Park, “Generative Adversarial Networks for Synthetic Attack Data Augmentation in Intrusion Detection Systems,” Journal of Cybersecurity and Privacy, vol. 3, no. 2, pp. 45–60, 2024.
3. A. Singh and R. Gupta, “Explainable AI in Intrusion Detection: Techniques and Applications,” ACM Computing Surveys, vol. 56, no. 4, Article 89, 2024.
4. L. Chen and F. Zhao, “Reinforcement Learning-Based Adaptive Firewall for Real-Time Intrusion Mitigation,” IEEE Access, vol. 12, pp. 67890–67902, 2024.
5. C.Nagarajan and M.Madheswaran - ‘Stability Analysis of Series Parallel Resonant Converter with Fuzzy Logic Controller Using State Space Techniques’- Taylor &Francis, Electric Power Components and Systems, Vol.39 (8), pp.780-793, May 2011. DOI: 10.1080/15325008.2010.541746
6. C.Nagarajan and M.Madheswaran - ‘Experimental verification and stability state space analysis of CLL-T Series Parallel Resonant Converter’ - Journal of Electrical Engineering, Vol.63 (6), pp.365-372, Dec.2012. DOI: 10.2478/v10187-012-0054-2
7. C.Nagarajan and M.Madheswaran - ‘Performance Analysis of LCL-T Resonant Converter with Fuzzy/PID Using State Space Analysis’- Springer, Electrical Engineering, Vol.93 (3), pp.167-178, September 2011. DOI 10.1007/s00202-011-0203-9
8. S.Tamilselvi, R.Prakash, C.Nagarajan,“Solar System Integrated Smart Grid Utilizing Hybrid Coot-Genetic Algorithm Optimized ANN Controller” Iranian Journal Of Science And Technology-Transactions Of Electrical Engineering, DOI10.1007/s40998-025-00917-z,2025
9. S.Tamilselvi, R.Prakash, C.Nagarajan,“ Adaptive sliding mode control of multilevel grid-connected inverters using reinforcement learning for enhanced LVRT performance” Electric Power Systems Research 253 (2026) 112428, doi.org/10.1016/j.epsr.2025.112428
10. S.Thirunavukkarasu, C. Nagarajan, 2024, “Performance Investigation on OCF and SCF study in BLDC machine using FTANN Controller," Journal of Electrical Engineering And Technology, Volume 20, pages 2675–2688, (2025), doi.org/10.1007/s42835-024-02126-w
11. C. Nagarajan, M.Madheswaran and D.Ramasubramanian- ‘Development of DSP based Robust Control Method for General Resonant Converter Topologies using Transfer Function Model’- Acta Electrotechnica et Informatica Journal , Vol.13 (2), pp.18-31,April-June.2013, DOI: 10.2478/aeei-2013-0025.
12. C.Nagarajan and M.Madheswaran - ‘DSP Based Fuzzy Controller for Series Parallel Resonant converter’- Springer, Frontiers of Electrical and Electronic Engineering, Vol. 7(4), pp. 438-446, Dec.12. DOI 10.1007/s11460-012-0212-0.
13. C.Nagarajan and M.Madheswaran - ‘Experimental Study and steady state stability analysis of CLL-T Series Parallel Resonant Converter with Fuzzy controller using State Space Analysis’- Iranian Journal of Electrical & Electronic Engineering, Vol.8 (3), pp.259-267, September 2012.
14. C.Nagarajan and M.Madheswaran, “Analysis and Simulation of LCL Series Resonant Full Bridge Converter Using PWM Technique with Load Independent Operation” has been presented in ICTES’08, a IEEE / IET International Conference organized by M.G.R.University, Chennai.Vol.no.1, pp.190-195, Dec.2007
15. Suganthi Mullainathan, Ramesh Natarajan, “An SPSS and CNN modelling based quality assessment using ceramic materials and membrane filtration techniques”, Revista Materia (Rio J.) Vol. 30, 2025, DOI: https://doi.org/10.1590/1517-7076-RMAT-2024-0721
16. M Suganthi, N Ramesh, “Treatment of water using natural zeolite as membrane filter”, Journal of Environmental Protection and Ecology, Volume 23, Issue 2, pp: 520-530,2022
17. T. Wang and Y. Liu, “Federated Learning for Privacy-Preserving Intrusion Detection in Industrial Cyber-Physical Systems,” Computers & Security, vol. 118, p. 102796, 2024.
18. M. Patel and P. Shah, “Robust Intrusion Detection Against Adversarial Attacks: A Survey,” Information Sciences, vol. 612, pp. 367–387, 2024.





