Detection of Real-Time Anomalies in Network Environment Using Deep Learning

Authors

  • Adeola, Olajide Olatunde
  • Alese, Boniface Kayode
  • Akinwonmi, Akintoba Emmanuel
  • Owolafe, Otasowie
  • Omoniyi, Victoria Ibiyemi

DOI:

https://doi.org/10.64321/jcr.v2i4.49

Keywords:

Anomaly, Deep Learning, Detection, Network, Models

Abstract

The exponentially growing overlap of the networks of Information Technology (IT) and Operational Technology (OT) of which the widespread establishment of the Internet of Things (IoT) is a main feature of Industry 4.0 has greatly increased the attack surface targeted at the critical infrastructure. This convergence is not only providing massive operational efficiencies; it is also creating a new form of unprecedented cyber-physical risks and this requires the deployment of advanced anomaly detection processes. The signature-based security tools have proved inefficient due to the increase in sophistication and invention of new cyber threats, analysis of zero-day attacks, and clandestine insider threats. Deep learning (DL) has become an efficient paradigm, and it is the only technology that can analyse the massive, multi-dimensional and high-dimensional data streams originating in a decentralised way as far as recognising in complex patterns and subtle deviations that may signal of malicious. This paper categorizes the algorithm based on deep learning that detects anomalies and provides an in-depth discussion of the recent deep learning-based anomaly detection algorithms with emphasis on the context that is related to these converged environments. It also evaluates critically the application of the various DL structures such as Autoencoders, Recurrent Neural Networks (RNNs), Convolutional Neural Networks (CNNs), Transformers and Graph Neural Networks (GNNs) in the identification of the threatening activities, comprising Distributed Denial of Service (DDoS) attacks, malware as well as cyber-physical. Along with this, the paper illuminates the great difficulties that occur in practice (deployment), including but are not limited to data scarcity and imbalance, interpretability, computational overhead, and adversarial. Among the most prominent trends, one is aware of the transition of the models to unsupervised and hybrid with a special focus on the necessity to consider the explosion of Explainable AI (XAI), Federated Learning (FL) and the necessity of solid design of AI. The paper concludes by highlighting some of the main areas where future research can be done to come up with more trustworthy, believable and practically usable anomaly detection system in strategic critical infrastructures.

Author Biographies

Adeola, Olajide Olatunde

Department of Computer Science, Federal University of Technology, Akure, Ondo State, Nigeria

Alese, Boniface Kayode

Department of Cyber Security, Federal University of Technology, Akure, Ondo State, Nigeria

Akinwonmi, Akintoba Emmanuel

Department of Computer Science, Federal University of Technology, Akure, Ondo State, Nigeria

Owolafe, Otasowie

Department of Cyber Security, Federal University of Technology, Akure, Ondo State, Nigeria

Omoniyi, Victoria Ibiyemi

Department of Software Engineering, Federal University of Technology, Akure, Ondo State, Nigeria

References

Abshari, D. & Sridhar, M. (2025). A Survey of Anomaly Detection in Cyber-Physical Systems (2025). arXiv. Available at: https://arxiv.org/html/2502.13256v1

Ahmed, W. F., & Jameel, N. G. M. (2022). Malicious URL detection using decision tree-based lexical feature selection and multilayer perceptron model. UHD Journal of Science and Technology, 6(2), 105-116. https://doi.org/10.21928/uhdjst.v6n2y2022.pp105-116

Albanbay, N., Tursynbek, Y., Graffi, K., Uskenbayeva, R., Kalpeyeva, Z., Abilkaiyr, Z. & Ayapov, Y. (2025). Federated Learning-Based Intrusion Detection in IoT Networks: Performance Evaluation and Data Scaling Study. J. Sens. Actuator Netw. 2025, 14(4), 78. Available at: https://www.mdpi.com/2224-2708/14/4/78

Alger, J & Tu, M. (2025). Anomaly Detection of Network Layer Attacks Against Cyber Physical Systems Using Machine Learning and Deep Learning Techniques. Journal of Military Cyber Affairs, 8(1). Available at: https://digitalcommons.usf.edu/mca/vol8/iss1/4/

Alparslan, Y. C. (2023). Adversarial Attacks and Robustness in Deep Learning Models and Applications. Master of Science (M.S.), Drexel University Research Discovery. Available at: https://researchdiscovery.drexel.edu/esploro/outputs/graduate/Adversarial-Attacks-and-Robustness-in-Deep/991014961449004721

Birihanu, E. & Lendák, I. (2025). Explainable correlation-based anomaly detection for Industrial Control Systems. Front. Artif. Intell., Sec. Machine Learning and Artificial Intelligence. Available at: https://www.frontiersin.org/journals/artificial-intelligence/articles/10.3389/frai.2024.1508821/full

Drewek-Ossowicka, A., Pietrołaj, M., & Rumiński, J. (2020). A survey of neural networks usage for intrusion detection systems. Journal of Ambient Intelligence and Humanized Computing, 12, 497–514. https://doi.org/10.1007/s12652-020-02014-x

Dunmore, A., Jang-Jaccard, J., Sabrina, F., & Kwak, J. (2023). A comprehensive survey of generative adversarial networks (GANs) in cybersecurity intrusion detection. IEEE Access, 11, 76071-76095. https://doi.org/10.1109/ACCESS.2023.3296707

Elgarhy, I., Badr, M. M., Mahmoud, M. Alsabaan, M., Alshawi, T. & Alsaqhan, M. (2024). XAI-Based Accurate Anomaly Detector That Is Robust Against Black-Box Evasion Attacks for the Smart Grid. Applied Sciences, 14(21), 9897. Available at: https://www.mdpi.com/2076-3417/14/21/9897

Fotiadou, K., Velivassaki, T. H., Voulkidis, A., Skias, D., Tsekeridou, S., & Zahariadis, T. (2020). Network Traffic Anomaly Detection via Deep Learning. DOAJ. 12(5), 215. Available at: https://doaj.org/article/55d3922e9afe43619db7d1788842f561

Ghourabi, A. (2022). A security model based on LightGBM and Transformer to protect healthcare systems from cyberattacks. IEEE Access, 10, 48890-48905. https://doi.org/10.1109/ACCESS.2022.3172432

Goetz, C. & Humm, B. G. (2024). A Hybrid and Modular Integration Concept for Anomaly Detection in Industrial Control Systems. AI 2025, 6(5), 91. Available at: https://www.mdpi.com/2673-2688/6/5/91

Ibrahim, A., Thiruvady, D., Schneider, J. G., & Abdelrazek, M. (2020). The Challenges of Leveraging Threat Intelligence to Stop Data Breaches. DOAJ. Available at: https://doaj.org/article/6f5f971cbbb34aa4a892a7257b2ab8af

Jaouedi, N., Boujnah, N., & Bouhlel, M. S. (2020). A new hybrid deep learning model for human action recognition. DOAJ. 32(4), 447 – 453. Available at: https://doaj.org/article/06cbf63fdc83418f9d356cfe3c1b761e

Liu, H. & Lang, B. (2020). Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. (2020). DOAJ. 9(20), 4396. Available at: https://doaj.org/article/ecac058e11464fb2a61b606bc09d2b6e

Mishra, N., & Pandya, S. (2021). Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review. IEEE Access, 9, 59353–59386. https://doi.org/10.1109/ACCESS.2021.3073408

Ododo, F. & Addotey, N. (2025). Advancements And Challenges In Deep Learning For Cyber Threat Detection. ResearchGate. International Journal of Science Research and Technology. 7(9). Available at: DOI: 10.70382/tijsrat.v07i9.019.

Rashid, M. U., Khan, M. A., Alhaisoni, M., Tariq, U., Armghan, A., Alenezi, F., & Alqahtani, A. (2025). Hybrid Android Malware Detection and Classification Using Deep Neural Networks. International Journal of Computational Intelligence Systems, 18(1), 1–26. Avaialble at: https://doaj.org/article/85b61489ab0b4420917e50892a902364

Sabeel, U., Heydari, S. S., Elgazzar, K., & El-Khatib, K. (2021). Building an intrusion detection system to detect atypical cyberattack flows. IEEE Access, 9, 94352–94364. https://doi.org/10.1109/ACCESS.2021.3093830

Sauka, K., Shin, G. Y., Kim, D. W., & Han, M.-M. (2023). Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning. DOAJ. Available at: https://doaj.org/article/d11145a82960455084cc517e10227a57

Schmitt, M. (2023). Securing the digital world: Protecting smart infrastructures and digital industries with artificial intelligence (AI)-enabled malware and intrusion detection. Journal of Industrial Information Integration, 100520. https://doi.org/10.1016/j.jii.2023.100520

Uccello, F., Pawlicki, M., D'Antonio,S., Kozik, R. & Choraś, M. A. (2025). New Cybersecurity Approach Enhanced by XAI-Derived Rules to Improve Network Intrusion Detection and SIEM. Computers, Materials & Continua, 83(2), 2023–2045. Available at: https://www.techscience.com/cmc/v83n2/60589/html

Vanin, P., Newe, T., Dhirani, L. L., O’Connell, E., O’Shea, D., Lee, B., & Rao, M. (2022). A study of network intrusion detection systems using artificial intelligence/machine learning. Applied Sciences, 12(22), 11752. https://doi.org/10.3390/app122211752

Vasan, D., Alazab, M., Venkatraman, S., Akram, J., & Qin, Z. (2020). MTHAEL: Cross-architecture IoT malware detection based on neural network advanced ensemble learning. IEEE Transactions on Computers. https://doi.org/10.1109/TC.2020.3015584

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., & Venkatraman, S. (2019). Robust intelligent malware detection using deep learning. IEEE Access, 7, 101179-101190. https://doi.org/10.1109/ACCESS.2019.2906934

Wang, F. Jiang, Y., Zhang, R., Wei, A., Xie, J. & Pang, X. (2025). A Survey of Deep Anomaly Detection in Multivariate Time Series: Taxonomy, Applications, and Directions (MTSAD). Sensors 2025, 25(1). Available at: https://www.mdpi.com/1424-8220/25/1/190

Xu, Z., Wu, Y., Wang, S., Gao, J., Qiu, T., Wang, Z., Wan, H.& Zhao, X. (2025). Deep Learning-based Intrusion Detection Systems: A Survey. Cryptography and Security. Available at: https://arxiv.org/abs/2504.07839

Yang, J., Li, T., Liang, G., He, W., & Zhao, Y. (2019). A simple recurrent unit model based intrusion detection system with DCGAN. IEEE Access, 7, 83286-83296. https://doi.org/10.1109/ACCESS.2019.2922692

Downloads

Published

2025-08-14

How to Cite

Adeola, Olajide Olatunde, Alese, Boniface Kayode, Akinwonmi, Akintoba Emmanuel, Owolafe, Otasowie, & Omoniyi, Victoria Ibiyemi. (2025). Detection of Real-Time Anomalies in Network Environment Using Deep Learning. Journal of Current Research and Studies, 2(4), 103–119. https://doi.org/10.64321/jcr.v2i4.49