Real-Time Network Traffic Anomaly Detection Using Spiking Neural Networks (SNNs) with Adaptive Learning

Document Type : Original Article

Author

Department of Electrical Engineering and Information Technology, Iranian Research Organization for Science and Technology (IROST)

Abstract

This paper presents a novel real-time intrusion detection framework that leverages Spiking Neural Networks (SNNs) for detecting anomalies and cyberattacks in network traffic. Inspired by the biological functioning of the brain, SNNs process information using discrete spikes over time, enabling efficient handling of spatiotemporal patterns in traffic data. The proposed approach dynamically adapts to new and evolving attack strategies through Spike-Timing-Dependent Plasticity (STDP), a biologically inspired learning mechanism that adjusts synaptic weights based on the precise timing of neuron activations. This adaptability allows the system to detect zero-day attacks without requiring frequent retraining, a key advantage over traditional machine learning and deep learning models.

The proposed system was evaluated using well-established cybersecurity datasets, NSL-KDD and CIC-IDS2017, covering a broad spectrum of attack types, including DDoS, brute force attacks, infiltration attempts, and port scanning. Comparative experiments demonstrate that the SNN-based detection system consistently outperforms traditional models, such as Random Forest, Support Vector Machines (SVM), and conventional deep learning architectures, in terms of detection accuracy, adaptability, and computational efficiency. The system achieves high detection accuracy while maintaining low false positive rates and significantly reducing detection time, making it highly suitable for real-time deployment in modern network environments.
This research highlights the potential of neuromorphic computing in the field of cybersecurity, offering a scalable, adaptive, and energy-efficient solution for intrusion detection in evolving network infrastructures.

Keywords


  • Yu, S., Zhang, J., Liu, J., Zhang, X., Li, Y., & Xu, T. (2021). A cooperative DDoS attack detection scheme based on entropy and ensemble learning in SDN. Eurasip Journal on Wireless Communications and Networking, 2021(1), 1–13,. doi:10.1186/s13638-021-01957-9.
  • Liu, H., Lang, B., Liu, M., & Yan, H. (2019). CNN and RNN based payload classification methods for attack detection. Knowledge-Based Systems, 163, 332–341. doi:10.1016/j.knosys.2018.08.036.
  • Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50. doi:10.1109/TETCI.2017.2772792.
  • Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690–1700. doi:10.1016/j.eswa.2013.08.0666.
  • Mirsky, Y., Doitshman, T., Elovici, Y., & Shabtai, A. (2018). Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. Proceedings 2018 Network and Distributed System Security Symposium. doi:10.14722/ndss.2018.23204.
  • Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. IEEE Access, 5, 21954–21961. doi:10.1109/ACCESS.2017.2762418.
  • Lim, H. K., Kim, J. B., Kim, K., Hong, Y. G., & Han, Y. H. (2019). Payload-based traffic classification using multi-layer LSTM in software defined networks. Applied Sciences (Switzerland), 9(12), 2550. doi:10.3390/app9122550.
  • Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R., & Ghogho, M. (2016). Deep learning approach for Network Intrusion Detection in Software Defined Networking. 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM). doi:10.1109/wincom.2016.7777224.
  • Zhang, J., Zulkernine, M., & Haque, A. (2008). Random-Forests-Based Network Intrusion Detection Systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 38(5), 649–659. doi:10.1109/tsmcc.2008.923876.
  • Moustafa, N., & Slay, J. (2016). The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Information Security Journal, 25(1–3), 18–31. doi:10.1080/19393555.2015.1125974.
  • Niyaz, Q., Sun, W., Javaid, A. Y., & Alam, M. (2015). A deep learning approach for network intrusion detection system. EAI International Conference on Bio-Inspired Information and Communications Technologies (BICT), 21–26,. doi:10.4108/eai.3-12-2015.2262516.
  • Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access, 7, 41525–41550. doi:10.1109/ACCESS.2019.2895334.
  • Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768. doi:10.1016/j.future.2017.08.043
  • Islam, A., & Rashid, M. M. (2024). Cyberattack Detection Using Unsupervised Learning Techniques. doi:10.21203/rs.3.rs-4328744/v2.
Volume 2, Issue 2
May 2025
Pages 17-22
  • Receive Date: 05 March 2025
  • Accept Date: 16 April 2025
  • First Publish Date: 01 May 2025
  • Publish Date: 01 May 2025