Sentinel Shield: Leveraging ConvLSTM and Elephant Herd Optimization for Advanced Network Intrusion Detection




Traffic Prediction, ConvLSTM, EHO


Given the escalating intricacy of network environments and the rising level of sophistication in cyber threats, there is an urgent requirement for resilient and effective network intrusion detection systems (NIDS). This document presents an innovative NIDS approach that utilizes Convolutional Long Short-Term Memory (ConvLSTM) networks and Elephant Herd Optimization (EHO) to achieve precise and timely intrusion detection. Our proposed model combines the strengths of ConvLSTM, which can effectively capture spatiotemporal dependencies in network traffic data, and EHO, which allow the model to focus on relevant information while filtering out noise. To achieve this, we first preprocess network traffic data into sequential form and use ConvLSTM layers to learn both spatial and temporal features. Subsequently, we introduce Elephant Herd Optimization that dynamically assigns different weights to different parts of the input data, emphasizing the regions most likely to contain malicious activity. To evaluate the effectiveness of our approach, we conducted extensive experiments on publicly available network intrusion CICIDS2017 Dataset. The experimental results demonstrate the efficacy of the proposed approach (Accuracy = 99.98%), underscoring its potential to revolutionize modern network intrusion detection and proactively safeguard digital assets.


Abdel-Rahman, Mohamed. "Advanced Cybersecurity Measures in IT Service Operations and Their Crucial Role in Safeguarding Enterprise Data in a Connected World." Eigenpub Review of Science and Technology 7, no. 1 (2023): 138-158.

Adhikari, Naresh, and Mahalingam Ramkumar. "IoT and Blockchain Integration: Applications, Opportunities, and Challenges." Network 3, no. 1 (2023): 115-141.

Khan, Abid, Awais Ahmad, Mansoor Ahmed, Jadran Sessa, and Marco Anisetti. "Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends." Complex & Intelligent Systems 8, no. 5 (2022): 3919-3941.

Pan, Gary, Poh Sun SEOW, Calvin Chan, and Chu Yeong LIM. "Analytics and cybersecurity: The shape of things to come." (2015): 1.

Vinayakumar, R., K. P. Soman, and Prabaharan Poornachandran. "Applying deep learning approaches for network traffic prediction." In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2353-2358. IEEE, 2017.

Ramakrishnan, Nipun, and Tarun Soni. "Network traffic prediction using recurrent neural networks." In 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 187-193. IEEE, 2018.

Mahdavinejad, Mohammad Saeid, Mohammadreza Rezvan, MohammadaminBarekatain, Peyman Adibi, Payam Barnaghi, and Amit P. Sheth. "Machine learning for Internet of Things data analysis: A survey." Digital Communications and Networks 4, no. 3 (2018): 161-175.

Zhao, Ling, Yujiao Song, Chao Zhang, Yu Liu, Pu Wang, Tao Lin, Min Deng, and Haifeng Li. "T-gcn: A temporal graph convolutional network for traffic prediction." IEEE transactions on intelligent transportation systems 21, no. 9 (2019): 3848-3858.

Yang, Shuguan, Wei Ma, Xidong Pi, and Sean Qian. "A deep learning approach to real-time parking occupancy prediction in transportation networks incorporating multiple spatio-temporal data sources." Transportation Research Part C: Emerging Technologies 107 (2019): 248-265.

Ranjan, Navin, Sovit Bhandari, Hong Ping Zhao, Hoon Kim, and Pervez Khan. "City-wide traffic congestion prediction based on CNN, LSTM and transpose CNN." IEEE Access 8 (2020): 81606-81620.

Zhu, Hailong, Yawen Xie, Wei He, Chao Sun, Kaili Zhu, Guohui Zhou, and Ning Ma. "A novel traffic flow forecasting method based on RNN-GCN and BRB." Journal of Advanced Transportation 2020 (2020): 1-11.

Yu, Bing, Haoteng Yin, and Zhanxing Zhu. "Spatio-temporal graph convolutional networks: A deep learning framework for traffic forecasting." arXiv preprint arXiv:1709.04875 (2017).

Gao, Xianwei, Chun Shan, Changzhen Hu, Zequn Niu, and Zhen Liu. "An adaptive ensemble machine learning model for intrusion detection." Ieee Access 7 (2019): 82512-82521.

Sabeel, Ulya, Shahram Shah Heydari, Harsh Mohanka, Yasmine Bendhaou, Khalid Elgazzar, and Khalil El-Khatib. "Evaluation of deep learning in detecting unknown network attacks." In 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), pp. 1-6. IEEE, 2019.

Asad, Muhammad, Muhammad Asim, Talha Javed, Mirza O. Beg, Hasan Mujtaba, and Sohail Abbas. "Deepdetect: detection of distributed denial of service attacks using deep learning." The Computer Journal 63, no. 7 (2020): 983-994.

Muraleedharan, N., and B. Janet. "A deep learning based HTTP slow DoS classification approach using flow data." ICT Express 7, no. 2 (2021): 210-214.

Amaizu, Gabriel Chukwunonso, Cosmas Ifeanyi Nwakanma, Sanjay Bhardwaj, J. M. Lee, and Dong-Seong Kim. "Composite and efficient DDoS attack detection framework for B5G networks." Computer Networks 188 (2021): 107871

Hasan, Md Zahid, KM Zubair Hasan, and Abdus Sattar. "Burst header packet flood detection in optical burst switching network using deep learning model." Procedia computer science 143 (2018): 970-977.

Amma, Narayanavadivoo Gopinathan Bhuvaneswari, and Selvakumar Subramanian. "Vcdeepfl: Vector convolutional deep feature learning approach for identification of known and unknown denial of service attacks." In TENCON 2018-2018 IEEE Region 10 Conference, pp. 0640-0645. IEEE, 2018.

Chen, Jinyin, Yi-tao Yang, Ke-ke Hu, Hai-bin Zheng, and Zhen Wang. "DAD-MCNN: DDoS attack detection via multi-channel CNN." In Proceedings of the 2019 11th International Conference on Machine Learning and Computing, pp. 484-488. 2019.

Haider, Shahzeb, Adnan Akhunzada, Iqra Mustafa, Tanil Bharat Patel, Amanda Fernandez, Kim-Kwang Raymond Choo, and Javed Iqbal. "A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks." Ieee Access 8 (2020): 53972-53983.

Wang, Lu, and Ying Liu. "A DDoS attack detection method based on information entropy and deep learning in SDN." In 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), vol. 1, pp. 1084-1088. IEEE, 2020.

Kim, Jiyeon, Jiwon Kim, Hyunjung Kim, Minsun Shim, and Eunjung Choi. "CNN-based network intrusion detection against denial-of-service attacks." Electronics 9, no. 6 (2020): 916.

Hussain, Faisal, Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid U. Fayyaz, Farrukh Shahzad, and Ghalib A. Shah. "IoT DoS and DDoS attack detection using ResNet." In 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1-6. IEEE, 2020.

Li, Chuanhuang, Yan Wu, Xiaoyong Yuan, Zhengjun Sun, Weiming Wang, Xiaolin Li, and Liang Gong. "Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN." International Journal of Communication Systems 31, no. 5 (2018): e3497.

Shurman, Mohammad M., Rami M. Khrais, and Abdulrahman A. Yateem. "DoS and DDoS attack detection using deep learning and IDS." Int. Arab J. Inf. Technol. 17, no. 4A (2020): 655-661.

Bhardwaj, Aanshi, Veenu Mangat, and Renu Vig. "Hyperband tuned deep neural network with well posed stacked sparse autoencoder for detection of DDoS attacks in cloud." IEEE Access 8 (2020): 181916-181929.

Mohammadnia, Hamzeh, and Slimane Ben Slimane. "IoT-NETZ: Practical spoofing attack mitigation approach in SDWN network." In 2020 Seventh International Conference on Software Defined Systems (SDS), pp. 5-13. IEEE, 2020.

He, Jiawei, Yejin Tan, Wangshu Guo, and Ming Xian. "A small sample DDoS attack detection method based on deep transfer learning." In 2020 International Conference on Computer Communication and Network Security (CCNS), pp. 47-50. IEEE, 2020.

Li, Juan, Hong Lei, Amir H. Alavi, and Gai-Ge Wang. "Elephant herding optimization: variants, hybrids, and applications." Mathematics 8, no. 9 (2020): 1415.

Ismaeel, Alaa AK, Islam A. Elshaarawy, Essam H. Houssein, Fatma Helmy Ismail, and Aboul Ella Hassanien. "Enhanced elephant herding optimization for global optimization." IEEE Access 7 (2019): 34738-34752.




How to Cite

Tiwari A, Kumar D. Sentinel Shield: Leveraging ConvLSTM and Elephant Herd Optimization for Advanced Network Intrusion Detection. EAI Endorsed Scal Inf Syst [Internet]. 2024 Jun. 26 [cited 2024 Jul. 19];11(6). Available from: