Enhance Data Security with Efficient Anomaly Detection in a Real Network Environment

Document Type : Research Paper

Authors

SRM Valliammai Engineering College

Abstract

Security in share markets is essential to affirm the integrity, stability, and trust of financial transactions, protecting investors from fraud and cyber threats. Current methods face challenges in high-volume attacks due to their scalability and static rule-based mechanisms. To resolve these issues, this paper develops a Hybrid Isolated Fuzzy Logic to detect anomalies in transactions. The Fuzzy Logic System with the Zebra Optimization Algorithm is utilized to enhance the attack detection accuracy. The isolation forest algorithm computes the threshold abnormal score to distinguish the normal from the malicious transactions. The Reinforcement Learning-based Proximal Policy Optimization algorithm dynamically updates network policies. The Network Function Virtualization for Distributed Denial-of-Service Scrubbing is combined to improve scalability and deliver cost-effective mitigation. The experimental analysis utilizing stock anomaly detection datasets is conducted. The experimental outcomes affirm that the proposed model attains an accuracy of 98.90%, a false positive rate of 2.9%, and improved mitigation efficiency than existing methods.

Keywords

Main Subjects


[1] M. Abdallah, N. An Le Khac, H. Jahromi, A. Delia Jurcut, A hybrid CNN-LSTM based approach for anomaly
detection systems in SDNs, In Proceedings of the 16th International Conference on Availability, Reliability and
Security, (2021), 1-7. https://doi.org/10.1145/3465481.3469190
[2] M. G. Abdolrasol, A. Ayob, A. H. Mutlag, T. S. Ustun, Optimal fuzzy logic controller based PSO for photovoltaic
system, Energy Reports, 9 (2023), 427-434. https://doi.org/10.1016/j.egyr.2022.11.039
[3] M. Alonso, H. Amaris, D. Martin, A. de la Escalera, Proximal policy optimization for energy management of electric
vehicles and PV storage units, Energies, 16(15) (2023), 5689. https://doi.org/10.3390/en16155689
[4] H. Chen, P. Chen, B. Wang, X. Yu, X. Chen, D. Ma, Z. Zheng, Graph neural network based robust anomaly
detection at service level in SDN driven microservice system, Computer Networks, 239 (2024), 110135. https:
//doi.\org/10.1016/j.comnet.2023.110135
[5] L. Chen, Z. Wang, R. Huo, T. Huang, An adversarial DBN-LSTM method for detecting and defending against DDoS
attacks in SDN environments, Algorithms, 16(4) (2023), 197. https://doi.org/10.3390/a16040197
[6] A. Dadhania, P. Dave, J. Bhatia, R. Mehta, M. Kumhar, S. Tanwar, A. Alabdulatif, Software defined network and
graph neural network-based anomaly detection scheme for high speed networks, Cyber Security and Applications, 3
(2025), 100079. https://doi.org/10.1016/j.csa.2024.100079
[7] M. Dom´ınguez-Dorado, J. Calle-Cancho, J. Galeano-Brajones, F. J. Rodr´ıguez-P´ere, D. Cort´es-Polo, Detection and
mitigation of security threats using virtualized network functions in software-defined networks, Applied Sciences,
14(1) (2023), 374. https://doi.org/10.3390/app14010374
[8] Z. Elgamal, A. Q. M. Sabri, M. Tubishat, D. Tbaishat, S. N. Makhadmeh, O. A. Alomari, Improved reptile search
optimization algorithm using chaotic map and simulated annealing for feature selection in medical field, IEEE Access,
10 (2022), 51428-51446. https://doi.org/10.1109/ACCESS.2022.3174854
[9] R. Guo, X. Zhu, T. Liu, Automatic detection of crop lodging from multitemporal satellite data based on the isolation
forest algorithm, Computers and Electronics in Agriculture, 215 (2023), 108415. https://doi.org/10.1016/j.
compag.2023.108415
[10] A. Hirsi, M. A. Alhartomi, L. Audah, A. Salh, N. Bin Mad Sahar, S. Ahmed, G. O. Ansa, A. Farah, Comprehensive
analysis of ddos anomaly detection in software-defined networks, IEEE Access, (2025). https://doi.org/10.1109/
ACCESS.2025.3535943
[11] T. Jafarian, M. Masdari, A. Ghaffari, K. Majidzadeh, SADM-SDNC: Security anomaly detection and mitigation
in software-defined networking using C-support vector classification, Computing, 103(4) (2021), 641-673. https:
//doi.org/10.1007/s00607-020-00866-x
[12] S. Jiang, L. Yang, X. Gao, Y. Zhou, T. Feng, Y. Song, K. Liu, G. Cheng, BSD-Guard: A collaborative blockchainbased
approach for detection and mitigation of SDN-Targeted DDoS attacks, Security and Communication Networks,
2022(1) (2022), 1608689. https://doi.org/10.1155/2022/1608689
[13] A. V. Kachavimath, D. G. Narayan, A hybrid deep learning model with consensus-based feature selection for DDoS
attacks detection in SDN, Procedia Computer Science, 252 (2025), 643-652. https://doi.org/10.1016/j.procs.
2025.01.024
[14] Y. Medjadba, H. Drid, M. Rahouti, Intrusion detection in software-defined networking using hybrid Bayesian model
averaging for reliable uncertainty quantification, Computer Networks, (2025), 111436. https://doi.org/10.1016/
j.comnet.2025.111436
[15] A. A. Najar, S. M. Naik, Cyber-secure SDN: A CNN-based approach for efficient detection and mitigation of DDoS
attacks, Computers and Security, 139 (2024), 103716. https://doi.org/10.1016/j.cose.2024.103716
[16] T. Park, Enhancing anomaly detection in financial markets with an llm-based multi-agent framework, arXiv preprint
arXiv:2403.19735, (2024). https://doi.org/10.48550/arXiv.2403.19735
[17] C. Pazhanimuthu, G. Saravanan, K. P. Suresh, R. S. Kumar, Performance analysis of voltage profile improvement
in AVR system using zebra optimization algorithms based on PID controller, e-Prime-Advances in Electrical
Engineering, Electronics and Energy, 6 (2023), 100380. https://doi.org/10.1016/j.prime.2023.100380
[18] L. Praharaj, D. Gupta, M. Gupta, Efficient federated transfer learning-based network anomaly detection for cooperative smart farming infrastructure, Smart Agricultural Technology, 10 (2025), 100727. https://doi.org/10.
101\6/j.atech.2024.100727
[19] M. Shariatzadeh, M. J. Rostami, M. Eftekhari, An adaptive image encryption scheme guided by fuzzy models,
Iranian Journal of Fuzzy Systems, 21 (2022), 1-8. https://doi.org/10.22111/ijfs.2023.44875.7915
[20] K. Wang, Y. Fu, X. Duan, T. Liu, Detection and mitigation of DDoS attacks based on multi-dimensional characteristics
in SDN, Scientific Reports, 14(1) (2024), 16421. https://doi.org/10.1038/s41598-024-66907-z
[21] K. Wang, Y. Fu, X. Duan, T. Liu, J. Xu, Abnormal traffic detection system in SDN based on deep learning hybrid
models, Computer Communications, 216 (2024), 183-194. https://doi.org/10.1016/j.comcom.2023.12.041
[22] J. Wang, L. Wang, SDN-Defend: A lightweight online attack detection and mitigation system for DDoS attacks in
SDN, Sensors, 22(21) (2022), 8287. https://doi.org/10.3390/s22218287
[23] X. Wang, H. Wang, B. Bhandari, L. Cheng, AI-empowered methods for smart energy consumption: A review
of load forecasting, anomaly detection and demand response, International Journal of Precision Engineering and
Manufacturing-Green Technology, 11(3) (2024), 963-993. https://doi.org/10.1007/s40684-023-00537-0
[24] W. Yang, Y. Shan, J. Wang, Y. Yao, An industrial network intrusion detection algorithm based on IGWO-GRU,
Cluster Computing, 27(6) (2024), 7199-7217.
[25] M. Yue, H. Yan, R. Han, Z. Wu, A DDoS attack detection method based on IQR and DFFCNN in SDN, Journal
of Network and Computer Applications, (2025), 104203. https://doi.org/10.1016/j.jnca.2025.104203
[26] S. Zavrak, M. Iskefiyeli, Flow-based intrusion detection on software-defined networks: A multivariate time series
anomaly detection approach, Neural Computing and Applications, 35(16) (2023), 12175-12193. https://doi.org/
10\.1007/s00521-023-08376-5
[27] Z. Zulfiqar, S. U. Malik, S. A. Moqurrab, Z. Zulfiqar, U. Yaseen, G. Srivastava, DeepDetect: An innovative hybrid
deep learning framework for anomaly detection in IoT networks, Journal of Computational Science, 83 (2024),
102426. https://doi.org/10.1016/j.jocs.2024.102426