{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T17:31:25Z","timestamp":1777915885772,"version":"3.51.4"},"reference-count":46,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:00:00Z","timestamp":1725408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Algerian Ministry of Higher Education and Scientific Research","award":["C00L07UN180120230001"],"award-info":[{"award-number":["C00L07UN180120230001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>In the last few years, the use of convolutional neural networks (CNNs) in intrusion detection domains has attracted more and more attention. However, their results in this domain have not lived up to expectations compared to the results obtained in other domains, such as image classification and video analysis. This is mainly due to the datasets used, which contain preprocessed features that are not compatible with convolutional neural networks, as they do not allow a full exploit of all the information embedded in the original network traffic. With the aim of overcoming these issues, we propose in this paper a new efficient convolutional neural network model for network intrusion detection based on raw traffic data (pcap files) rather than preprocessed data stored in CSV files. The novelty of this paper lies in the proposal of a new method for adapting the raw network traffic data to the most suitable format for CNN models, which allows us to fully exploit the strengths of CNNs in terms of pattern recognition and spatial analysis, leading to more accurate and effective results. Additionally, to further improve its detection performance, the structure and hyperparameters of our proposed CNN-based model are automatically adjusted using the self-adaptive differential evolution (SADE) metaheuristic, in which symmetry plays an essential role in balancing the different phases of the algorithm, so that each phase can contribute in an equal and efficient way to finding optimal solutions. This helps to make the overall performance more robust and efficient when solving optimization problems. The experimental results on three datasets, KDD-99, UNSW-NB15, and CIC-IDS2017, show a strong symmetry between the frequency values implemented in the images built for each network traffic and the different attack classes. This was confirmed by a good predictive accuracy that goes well beyond similar competing models in the literature.<\/jats:p>","DOI":"10.3390\/sym16091151","type":"journal-article","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:54:47Z","timestamp":1725429287000},"page":"1151","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Convolutional Neural Network with Hyperparameter Tuning for Packet Payload-Based Network Intrusion Detection"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4771-4831","authenticated-orcid":false,"given":"Ammar","family":"Boulaiche","sequence":"first","affiliation":[{"name":"LaRIA Laboratory, Faculty of Exact Sciences and Computer Science, University of Jijel, Jijel 18000, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5768-1335","authenticated-orcid":false,"given":"Sofiane","family":"Haddad","sequence":"additional","affiliation":[{"name":"RE Laboratory, Faculty of Science and Technology, University of Jijel, Jijel 18000, Algeria"}]},{"given":"Ali","family":"Lemouari","sequence":"additional","affiliation":[{"name":"LaRIA Laboratory, Faculty of Exact Sciences and Computer Science, University of Jijel, Jijel 18000, Algeria"},{"name":"Faculty of Science and Technology, University of Tamanrasset, Tamanrasset 11000, Algeria"}]}],"member":"1968","published-online":{"date-parts":[[2024,9,4]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"100031","DOI":"10.1016\/j.csa.2023.100031","article-title":"Cyber security: State of the art, challenges and future directions","volume":"2","author":"Admass","year":"2024","journal-title":"Cyber Secur. Appl."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Kwon, H., Kim, Y., Yoon, H., and Choi, D. (2017). Optimal cluster expansion-based intrusion tolerant system to prevent denial of service attacks. Appl. Sci., 7.","DOI":"10.3390\/app7111186"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"111728","DOI":"10.1016\/j.automatica.2024.111728","article-title":"Adaptive intrusion tolerant control for a class of uncertain nonlinear cyber-physical systems with full-state constraints","volume":"166","author":"Cuan","year":"2024","journal-title":"Automatica"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","article-title":"Federated Learning for intrusion detection system: Concepts, challenges and future directions","volume":"195","author":"Agrawal","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"100827","DOI":"10.1016\/j.measen.2023.100827","article-title":"A comprehensive review of AI based intrusion detection system","volume":"28","author":"Sowmya","year":"2023","journal-title":"Meas. Sens."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"103111","DOI":"10.1016\/j.jnca.2021.103111","article-title":"Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review","volume":"187","author":"Lee","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"110817","DOI":"10.1016\/j.asoc.2023.110817","article-title":"The effectiveness of deep learning vs. traditional methods for lung disease diagnosis using chest X-ray images: A systematic review","volume":"147","author":"Sajed","year":"2023","journal-title":"Appl. Soft Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"106125","DOI":"10.1016\/j.compag.2021.106125","article-title":"Plant diseases recognition on images using convolutional neural networks: A systematic review","volume":"185","author":"Abade","year":"2021","journal-title":"Comput. Electron. Agric."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"118476","DOI":"10.1016\/j.eswa.2022.118476","article-title":"Remora whale optimization-based hybrid deep learning for network intrusion detection using CNN features","volume":"210","author":"Pingale","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2022.12.009","article-title":"Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm","volume":"175","author":"Asgharzadeh","year":"2023","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"103285","DOI":"10.1016\/j.cose.2023.103285","article-title":"NE-GConv: A lightweight node edge graph convolutional network for intrusion detection","volume":"130","author":"Altaf","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"102130","DOI":"10.1016\/j.datak.2022.102130","article-title":"Convolutional neural network-based high-precision and speed detection system on CIDDS-001","volume":"144","author":"Daoud","year":"2023","journal-title":"Data Knowl. Eng."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"100077","DOI":"10.1016\/j.teler.2023.100077","article-title":"Dependable intrusion detection system using deep convolutional neural network: A Novel framework and performance evaluation approach","volume":"11","author":"Hnamte","year":"2023","journal-title":"Telemat. Informa. Rep."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","article-title":"Deep Learning Approach for Intelligent Intrusion Detection System","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"107450","DOI":"10.1016\/j.measurement.2019.107450","article-title":"Robust detection for network intrusion of industrial IoT based on multi-CNN fusion","volume":"154","author":"Li","year":"2020","journal-title":"Measurement"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"117144","DOI":"10.1016\/j.eswa.2022.117144","article-title":"ROULETTE: A neural attention multi-output model for explainable Network Intrusion Detection","volume":"201","author":"Andresini","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_17","first-page":"10246","article-title":"SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks","volume":"34","author":"Udas","year":"2022","journal-title":"J. King Saud Univ. -Comput. Inf. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1007\/s10207-023-00663-5","article-title":"BLoCNet: A hybrid, dataset-independent intrusion detection system using deep learning","volume":"22","author":"Brandon","year":"2023","journal-title":"Int. J. Inf. Secur."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"109982","DOI":"10.1016\/j.comnet.2023.109982","article-title":"Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things","volume":"235","author":"Wang","year":"2023","journal-title":"Comput. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.neucom.2023.01.072","article-title":"A multiscale intrusion detection system based on pyramid depthwise separable convolution neural network","volume":"530","author":"He","year":"2023","journal-title":"Neurocomputing"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"102842","DOI":"10.1016\/j.cose.2022.102842","article-title":"HDFEF: A hierarchical and dynamic feature extraction framework for intrusion detection systems","volume":"121","author":"Li","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.neucom.2021.01.146","article-title":"Deep anomaly detection in packet payload","volume":"485","author":"Liu","year":"2022","journal-title":"Neurocomputing"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"102709","DOI":"10.1016\/j.cose.2022.102709","article-title":"Hybrid intrusion detection system based on Dempster-Shafer evidence theory","volume":"117","author":"Qiu","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"108658","DOI":"10.1016\/j.comnet.2021.108658","article-title":"MFFusion: A Multi-level Features Fusion Model for Malicious Traffic Detection based on Deep Learning","volume":"202","author":"Lin","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"108117","DOI":"10.1016\/j.comnet.2021.108117","article-title":"PBCNN: Packet Bytes-based Convolutional Neural Network for Network Intrusion Detection","volume":"194","author":"Yu","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Crowley, J.L. (2023). Convolutional Neural Networks. Human-Centered Artificial Intelligence: Advanced Lectures, Springer International Publishing.","DOI":"10.1007\/978-3-031-24349-3_5"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.patcog.2017.10.013","article-title":"Recent advances in convolutional neural networks","volume":"77","author":"Gu","year":"2018","journal-title":"Pattern Recognit."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C. (2023). Neural Networks and Deep Learning\u2014A Textbook, Springer.","DOI":"10.1007\/978-3-031-29642-0"},{"key":"ref_29","unstructured":"Huang, V., Qin, A., and Suganthan, P. (2006, January 16\u201321). Self-adaptive Differential Evolution Algorithm for Constrained Real-Parameter Optimization. Proceedings of the 2006 IEEE International Conference on Evolutionary Computation, Vancouver, BC, Canada."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1008202821328","article-title":"Differential evolution\u2013a simple and efficient heuristic for global optimization over continuous spaces","volume":"11","author":"Storn","year":"1997","journal-title":"J. Glob. Optim."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"6171","DOI":"10.1007\/s00500-017-2685-5","article-title":"A novel differential evolution algorithm with a self-adaptation parameter control method by differential evolution","volume":"22","author":"Cui","year":"2018","journal-title":"Soft Comput."},{"key":"ref_32","unstructured":"DARPA (1999). DARPA Intrusion Detection Data Sets, DARPA. Available online: https:\/\/www.ll.mit.edu\/r-d\/datasets\/1999-darpa-intrusion-detection-evaluation-dataset."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J. (2015, January 10\u201312). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Habibi Lashkari, A., and Ghorbani, A.A. (2018, January 22\u201324). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy\u2014ICISSP. INSTICC, SciTePress, Funchal, Portugal.","DOI":"10.5220\/0006639801080116"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","article-title":"A systematic analysis of performance measures for classification tasks","volume":"45","author":"Sokolova","year":"2009","journal-title":"Inf. Process. Manag."},{"key":"ref_36","unstructured":"Geron, A. (2019). Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems, O\u2019Reilly Media, Inc.. [2nd ed.]."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.future.2022.01.026","article-title":"Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection","volume":"131","author":"Ding","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.procs.2022.12.023","article-title":"Time Complexity in Deep Learning Models","volume":"215","author":"Shah","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"115404","DOI":"10.1016\/j.eswa.2021.115404","article-title":"CAE-CNN: Predicting transcription factor binding site with convolutional autoencoder and convolutional neural network","volume":"183","author":"Zhang","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.eswa.2019.01.063","article-title":"Shallow neural network with kernel approximation for prediction problems in highly demanding data networks","volume":"124","author":"Carro","year":"2019","journal-title":"Expert Syst. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"13647","DOI":"10.1007\/s00521-021-05994-9","article-title":"A novel context-aware feature extraction method for convolutional neural network-based intrusion detection systems","volume":"33","author":"Shams","year":"2021","journal-title":"Neural Comput. Appl."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.future.2021.04.017","article-title":"GAN augmentation to deal with imbalance in imaging-based intrusion detection","volume":"123","author":"Andresini","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"102499","DOI":"10.1016\/j.cose.2021.102499","article-title":"CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems","volume":"112","author":"Gupta","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"12416","DOI":"10.1007\/s10489-022-03995-2","article-title":"Network intrusion detection based on conditional wasserstein variational autoencoder with generative adversarial network and one-dimensional convolutional neural networks","volume":"53","author":"Jiaxing","year":"2023","journal-title":"Appl. Intell."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"101752","DOI":"10.1016\/j.cose.2020.101752","article-title":"A deep learning method with wrapper based feature extraction for wireless intrusion detection system","volume":"92","author":"Kasongo","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"103061","DOI":"10.1016\/j.cose.2022.103061","article-title":"Audio adversarial detection through classification score on speech recognition systems","volume":"126","author":"Kwon","year":"2023","journal-title":"Comput. Secur."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/9\/1151\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:48:28Z","timestamp":1760111308000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/9\/1151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,4]]},"references-count":46,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["sym16091151"],"URL":"https:\/\/doi.org\/10.3390\/sym16091151","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,4]]}}}