Mst. Irin Sultana1,*, Md. Nazmus Salehin2, Abu Saleh Jafar Imam Sujan3, Syed Ali Haider4, Mostak Ahmed5, Abdullah Rakib Akand6
1,2 Bangladesh Army University of Engineering & Technology (BAUET).
6 Lecturer, Dept. of CSE, Asian University of Bangladesh.
6 Lecturer, Dept. of CSE, Asian University of Bangladesh.
* Corresponding Author | Volume 40, Issue 10, November 2025
Resource: Download Full PDF
Abstract
The objective of this quantitative study was to evaluate the effectiveness of neural network based anomaly detection models—particularly temporal architectures—in accurately identifying cyberattacks in real-time within large-scale computing networks. A comprehensive network traffic dataset containing both normal and malicious flows was preprocessed and used to train multiple deep learning architectures, including feedforward neural networks, convolutional neural networks (CNN), recurrent neural networks (RNN), and long short-term memory (LSTM) models. Feature normalization, sequence transformation, and train–test splitting were applied before training. Model performance was assessed using accuracy, precision, recall, F1-score, false positive rate, and detection latency. Traditional machine learning models such as logistic regression, support vector machines (SVM), and random forest were also evaluated for comparison. The LSTM-based anomaly detection model demonstrated the highest performance, achieving a validation accuracy of 97.5%, precision of 96.8%, recall of 95.9%, and an F1-score of 96.3%. The average detection latency was 18.4 ms, confirming real-time capability. While other neural network models performed competitively, traditional machine learning methods showed significantly lower accuracy and slower processing speeds. The LSTM model also achieved a low false positive rate of 2.1% and demonstrated strong generalization when tested on unseen traffic conditions. Neural network–based anomaly detection, particularly using LSTM architectures, provides a highly effective and scalable solution for real-time cyberattack identification in large-scale networks. The study highlights the superiority of deep learning over traditional machine learning methods in capturing complex temporal and nonlinear patterns in network traffic. Future research should investigate adversarial resilience and computational optimization to further enhance deployment in operational cybersecurity environments.
LSTM Accuracy
97.5%
97.5%
Detection Latency
18.4 ms
18.4 ms
False Positive Rate
2.1%
2.1%