WEB-BASED INTRUSION DETECTION SYSTEM FOR LOGIN ATTACK DETECTION USING DEEP LEARNING TECHNIQUES
The rapid proliferation of web applications and internet-based services has significantly heightened the need for robust authentication and intrusion-prevention mechanisms. Among the most critical cybersecurity challenges are unauthorized login attempts and credential-based attacks, including brute force, dictionary, and credential stuffing techniques. Traditional security controls — password policies, CAPTCHA, and signature-based intrusion detection systems — have proven insufficient against these evolving threats. This paper proposes and evaluates a Web-Based Intrusion Detection System (IDS) that leverages deep learning to monitor, analyse, and detect suspicious login activities in real time. The system captures multidimensional authentication features — username, IP address, login frequency, geolocation, device fingerprint, and temporal patterns — and processes them through Artificial Neural Network (ANN) and Long Short-Term Memory (LSTM) models. Experimental results demonstrate that the deep learning-based IDS achieves superior detection accuracy, low false-positive rates, and sub-second classification latency, outperforming conventional rule-based approaches. The proposed system is designed as a modular, scalable architecture comprising frontend, backend, database, and AI inference components, making it applicable to banking, e-commerce, and enterprise environments
M, M. (2026). Web-Based Intrusion Detection System for Login Attack Detection using Deep Learning Techniques. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.047
M, Muthupriya. "Web-Based Intrusion Detection System for Login Attack Detection using Deep Learning Techniques." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.047.
M, Muthupriya. "Web-Based Intrusion Detection System for Login Attack Detection using Deep Learning Techniques." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.047.
[1] A. Khraisat, I. Gondal, and P. Vamplew, 'A Comprehensive Survey on Intrusion Detection Systems,' Cybersecurity, Springer, 2019.
[2] Y. Xin, L. Kong, and Z. Liu, 'Machine Learning and Deep Learning Methods for Cybersecurity,' IEEE Access, vol. 6, pp. 35365–35381, 2018.
[3] R. Vinayakumar et al., 'Deep Learning Approach for Intelligent IDS,' Journal of Information Security and Applications, 2020.
[4] D. E. Denning, 'An Intrusion-Detection Model,' IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 222–232, 1987.
[5] S. Axelsson, 'Intrusion Detection Systems: A Survey and Taxonomy,' Tech. Report, Chalmers Univ., 2000.
[6] A. L. Buczak and E. Guven, 'A Survey of Data Mining and Machine Learning Methods for Cybersecurity Intrusion Detection,' IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016.
[7] V. Chandola, A. Banerjee, and V. Kumar, 'Anomaly Detection: A Survey,' ACM Computing Surveys, vol. 41, no. 3, 2009.
[8] R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, and S. Venkatraman, 'Robust Intelligent Malware Detection Using Deep Learning,' IEEE Access, 2019.
[9] J. Lansky et al., 'Deep Learning-Based Intrusion Detection Systems: A Systematic Review,' IEEE Access, vol. 9, pp. 101574–101599, 2021.
[10] M. Soltani et al., 'A Survey of Network-Based IDS Using Deep Learning,' J. Network and Computer Applications, 2021.