Enhancing Robustness of Machine Learning based Intrusion Detection Systems under Distribution Shift through Stability-Constrained Learning
DOI:
https://doi.org/10.15662/IJEETR.2026.0802072Keywords:
Intrusion Detection Systems, Distribution Shift, Stability, Constrained Learning, Network Security, Robust Machine LearningAbstract
Machine learning is widely used in intrusion detection systems to identify malicious network activities, but in practical environments, the data used during training often differs from the data encountered after deployment because network traffic changes over time. As a result, models that perform well during training may behave inconsistently in real conditions, especially when small variations in input lead to noticeable changes in prediction. This work looks at intrusion detection from the perspective of prediction stability under such changing data conditions by introducing a stability constraint during training that limits how much the model output can vary when the input is slightly modified. Along with classification accuracy, the behavior of the model is examined using measures such as prediction sensitivity, output variance, and parameter magnitude so that reliability can be understood more clearly rather than relying on accuracy alone. The approach is evaluated using benchmark intrusion detection data with controlled variations that represent changes in network traffic, and the observations show that the model produces more consistent outputs and is less affected by small input changes while maintaining a similar level of detection performance, indicating that incorporating stability into the learning process can improve the reliability of intrusion detection systems in dynamic environments
References
1. Zhou K., Yang Y., Qiao Y., Xiang T. Domain Generalization: A Survey. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2023. https://doi.org/10.1109/TPAMI.2022.3195549
2. Wang M., Deng W. Deep Visual Domain Adaptation: A Survey. Neurocomputing. 2018.
https://doi.org/10.1016/j.neucom.2018.05.083
3. Csurka G. A Comprehensive Survey on Domain Adaptation for Visual Applications. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2021.
https://doi.org/10.1109/TPAMI.2020.3001236
4. Li Y., Xie X., Wang J. Robust Domain Adaptation with Distribution Alignment. IEEE Transactions on Neural Networks and Learning Systems. 2023. https://doi.org/10.1109/TNNLS.2022.3174128
5. Chen X., Li Y., Zhang H. Feature Alignment for Domain Adaptation under Distribution Shift. IEEE Access. 2023.
https://doi.org/10.1109/ACCESS.2023.3241112
6. Sinha A., Namkoong H., Duchi J. Certifiable Distributional Robustness with Principled Adversarial Training. SIAM Journal on Optimization. 2020 .https://doi.org/10.1137/18M121228X
7. Duchi J., Namkoong H. Learning Models with Uniform Performance via Distributionally Robust Optimization. Operations Research. 2021 .https://doi.org/10.1287/opre.2020.1996
8. Arjovsky M., Bottou L., Gulrajani I., Lopez-Paz D. Invariant Risk Minimization. Journal of Machine Learning Research. 2022 https://doi.org/10.5555/3495724.3496885
9. Gulrajani I., Lopez-Paz D. In Search of Lost Domain Generalization. Journal of Artificial Intelligence Research. 2021.https://doi.org/10.1613/jair.1.12235
10. Krueger D., Caballero E., Jacobsen J., Zhang A. Out-of-Distribution Generalization via Risk Extrapolation. Journal of Machine Learning Research. 202 1.https://doi.org/10.5555/3540261.3540268
11. Bousquet O., Elisseeff A. Stability and Generalization. Journal of Machine Learning Research. 2002 .
https://doi.org/10.1162/153244303321897733
12. C.Nagarajan and M.Madheswaran - ‘Stability Analysis of Series Parallel Resonant Converter with Fuzzy Logic Controller Using State Space Techniques’- Taylor &Francis, Electric Power Components and Systems, Vol.39 (8), pp.780-793, May 2011. DOI: 10.1080/15325008.2010.541746
13. C.Nagarajan and M.Madheswaran - ‘Experimental verification and stability state space analysis of CLL-T Series Parallel Resonant Converter’ - Journal of Electrical Engineering, Vol.63 (6), pp.365-372, Dec.2012. DOI: 10.2478/v10187-012-0054-2
14. C.Nagarajan and M.Madheswaran - ‘Performance Analysis of LCL-T Resonant Converter with Fuzzy/PID Using State Space Analysis’- Springer, Electrical Engineering, Vol.93 (3), pp.167-178, September 2011. DOI 10.1007/s00202-011-0203-9
15. S.Tamilselvi, R.Prakash, C.Nagarajan,“Solar System Integrated Smart Grid Utilizing Hybrid Coot-Genetic Algorithm Optimized ANN Controller” Iranian Journal Of Science And Technology-Transactions Of Electrical Engineering, DOI10.1007/s40998-025-00917-z,2025
16. S.Tamilselvi, R.Prakash, C.Nagarajan,“ Adaptive sliding mode control of multilevel grid-connected inverters using reinforcement learning for enhanced LVRT performance” Electric Power Systems Research 253 (2026) 112428, doi.org/10.1016/j.epsr.2025.112428
17. S.Thirunavukkarasu, C. Nagarajan, 2024, “Performance Investigation on OCF and SCF study in BLDC machine using FTANN Controller," Journal of Electrical Engineering And Technology, Volume 20, pages 2675–2688, (2025), doi.org/10.1007/s42835-024-02126-w
18. C. Nagarajan, M.Madheswaran and D.Ramasubramanian- ‘Development of DSP based Robust Control Method for General Resonant Converter Topologies using Transfer Function Model’- Acta Electrotechnica et Informatica Journal , Vol.13 (2), pp.18-31,April-June.2013, DOI: 10.2478/aeei-2013-0025.
19. C.Nagarajan and M.Madheswaran - ‘DSP Based Fuzzy Controller for Series Parallel Resonant converter’- Springer, Frontiers of Electrical and Electronic Engineering, Vol. 7(4), pp. 438-446, Dec.12. DOI 10.1007/s11460-012-0212-0.
20. C.Nagarajan and M.Madheswaran - ‘Experimental Study and steady state stability analysis of CLL-T Series Parallel Resonant Converter with Fuzzy controller using State Space Analysis’- Iranian Journal of Electrical & Electronic Engineering, Vol.8 (3), pp.259-267, September 2012.
21. C.Nagarajan and M.Madheswaran, “Analysis and Simulation of LCL Series Resonant Full Bridge Converter Using PWM Technique with Load Independent Operation” has been presented in ICTES’08, a IEEE / IET International Conference organized by M.G.R.University, Chennai.Vol.no.1, pp.190-195, Dec.2007
22. Suganthi Mullainathan, Ramesh Natarajan, “An SPSS and CNN modelling based quality assessment using ceramic materials and membrane filtration techniques”, Revista Materia (Rio J.) Vol. 30, 2025, DOI: https://doi.org/10.1590/1517-7076-RMAT-2024-0721
23. M Suganthi, N Ramesh, “Treatment of water using natural zeolite as membrane filter”, Journal of Environmental Protection and Ecology, Volume 23, Issue 2, pp: 520-530,2022
24. Hardt M., Recht B., Singer Y. Train Faster, Generalize Better: Stability of Stochastic Gradient Descent. Journal of Machine Learning Research. 2016. https://doi.org/10.5555/2946645.2946707
25. Guo C., Pleiss G., Sun Y., Weinberger K. On Calibration of Modern Neural Networks. Journal of Machine Learning Research. 2017. https://doi.org/10.5555/3305381.3305516
26. Niculescu-Mizil A., Caruana R. Predicting Good Probabilities with Supervised Learning. Machine Learning Journal. 2005 .https://doi.org/10.1007/s10994-005-0460-1
27. Bühlmann P., Meinshausen N. Stability Selection. Journal of the Royal Statistical Society Series B. 2010 .
https://doi.org/10.1111/j.1467-9868.2010.00740.x
28. Zhang Y., Song L., Qi H. Domain Adaptation under Target and Conditional Shift. Journal of Machine Learning Research. 2013. https://doi.org/10.5555/2567709.2567721
29. Long M., Zhu H., Wang J., Jordan M. Deep Transfer Learning with Joint Adaptation Networks. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2019. https://doi.org/10.1109/TPAMI.2018.2795992
30. Tzeng E., Hoffman J., Saenko K., Darrell T. Adversarial Discriminative Domain Adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2020 https://doi.org/10.1109/TPAMI.2019.2915536
31. Hoffman J., Tzeng E., Park T. CyCADA: Cycle-Consistent Adversarial Domain Adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2021 https://doi.org/10.1109/TPAMI.2020.2979623
32. Singh A., Sharma R., Gupta B. Machine Learning-Based Intrusion Detection in Cyber-Physical Systems. International Journal of Information Security. 2020. https://doi.org/10.1007/s10207-019-00445-6
33. Ferrag M., Maglaras L., Moschoyiannis S., Janicke H. Deep Learning for Cyber Security Intrusion Detection. Computer Networks. 2020. https://doi.org/10.1016/j.comnet.2020.107179
34. Kim G., Lee S., Kim S. A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection with Misuse Detection. Expert Systems with Applications. 2014. https://doi.org/10.1016/j.eswa.2013.08.066
35. Tavallaee M., Bagheri E., Lu W., Ghorbani A. A Detailed Analysis of the KDD CUP 99 Dataset. Journal of Network and Computer Applications. 2009. https://doi.org/10.1016/j.jnca.2009.03.004
36. Sommer R., Paxson V. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. IEEE Security and Privacy. 2010 .https://doi.org/10.1109/MSP.2010.25
37. Buczak A., Guven E. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys and Tutorials. 2016. https://doi.org/10.1109/COMST.2015.2494502
38. Shone N., Ngoc T., Phai V., Shi Q. A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence. 2018. https://doi.org/10.1109/TETCI.2017.2772792
39. Ring M., Wunderlich S., Grüdl D., Landes D., Hotho A. A Survey of Network-Based Intrusion Detection Data Sets. Computers and Security. 2019. https://doi.org/10.1016/j.cose.2019.101716
40. Vinayakumar R., Soman K., Poornachandran P. Evaluating Deep Learning Approaches for Network Intrusion Detection. IEEE Access. 2019. https://doi.org/10.1109/ACCESS.2019.2895334
41. Ferrag M., Maglaras L., Moschoyiannis S. Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study. Journal of Information Security and Applications. 2020.
https://doi.org/10.1016/j.jisa.2019.102419
42. Khraisat A., Gondal I., Vamplew P., Kamruzzaman J. Survey of Intrusion Detection Systems: Techniques, Datasets and Challenges. Cybersecurity. 2019. https://doi.org/10.1186/s42400-019-0038-7
43. Chandola V., Banerjee A., Kumar V. Anomaly Detection: A Survey. ACM Computing Surveys. 2009 .
https://doi.org/10.1145/1541880.1541882
44. Ahmed M., Mahmood A., Hu J. A Survey of Network Anomaly Detection Techniques. Journal of Network and Computer Applications. 2016. https://doi.org/10.1016/j.jnca.2015.11.016





