IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

WEB-BASED INTRUSION DETECTION SYSTEM FOR LOGIN ATTACK DETECTION USING DEEP LEARNING TECHNIQUES

AUTHORS:
Muthupriya M
Mentor
Dr. A. Angel Cerli
Affiliation
Dept. of CS & IT, VISTAS, Chennai
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

The rapid proliferation of web applications and internet-based services has significantly heightened the need for robust authentication and intrusion-prevention mechanisms. Among the most critical cybersecurity challenges are unauthorized login attempts and credential-based attacks, including brute force, dictionary, and credential stuffing techniques. Traditional security controls — password policies, CAPTCHA, and signature-based intrusion detection systems — have proven insufficient against these evolving threats. This paper proposes and evaluates a Web-Based Intrusion Detection System (IDS) that leverages deep learning to monitor, analyse, and detect suspicious login activities in real time. The system captures multidimensional authentication features — username, IP address, login frequency, geolocation, device fingerprint, and temporal patterns — and processes them through Artificial Neural Network (ANN) and Long Short-Term Memory (LSTM) models. Experimental results demonstrate that the deep learning-based IDS achieves superior detection accuracy, low false-positive rates, and sub-second classification latency, outperforming conventional rule-based approaches. The proposed system is designed as a modular, scalable architecture comprising frontend, backend, database, and AI inference components, making it applicable to banking, e-commerce, and enterprise environments

Keywords
Article Metrics
Article Views
55
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

M, M. (2026). Web-Based Intrusion Detection System for Login Attack Detection using Deep Learning Techniques. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.047

M, Muthupriya. "Web-Based Intrusion Detection System for Login Attack Detection using Deep Learning Techniques." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.047.

M, Muthupriya. "Web-Based Intrusion Detection System for Login Attack Detection using Deep Learning Techniques." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.047.

References

[1]   A. Khraisat, I. Gondal, and P. Vamplew, 'A Comprehensive Survey on Intrusion Detection Systems,' Cybersecurity, Springer, 2019.


[2]   Y. Xin, L. Kong, and Z. Liu, 'Machine Learning and Deep Learning Methods for Cybersecurity,' IEEE Access, vol. 6, pp. 35365–35381, 2018.


[3]   R. Vinayakumar et al., 'Deep Learning Approach for Intelligent IDS,' Journal of Information Security and Applications, 2020.


[4]   D. E. Denning, 'An Intrusion-Detection Model,' IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 222–232, 1987.


[5]   S. Axelsson, 'Intrusion Detection Systems: A Survey and Taxonomy,' Tech. Report, Chalmers Univ., 2000.


[6]   A. L. Buczak and E. Guven, 'A Survey of Data Mining and Machine Learning Methods for Cybersecurity Intrusion Detection,' IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016.


[7]   V. Chandola, A. Banerjee, and V. Kumar, 'Anomaly Detection: A Survey,' ACM Computing Surveys, vol. 41, no. 3, 2009.


[8]   R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, and S. Venkatraman, 'Robust Intelligent Malware Detection Using Deep Learning,' IEEE Access, 2019.


[9]   J. Lansky et al., 'Deep Learning-Based Intrusion Detection Systems: A Systematic Review,' IEEE Access, vol. 9, pp. 101574–101599, 2021.


[10]  M. Soltani et al., 'A Survey of Network-Based IDS Using Deep Learning,' J. Network and Computer Applications, 2021.

Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Mobile Application for Personal Finance Management using Android Platform
string(15) "Hari Prasad A.G" A.G, H. P.
(2026)
DOI: 10.55041/ijsmt.v2i3.153
Green Synthesis and Characterization of TiO2 nano particles by SCM
string(15) "A.Umesh Chandra" Chandra, A.et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.037
From Life Support to Legal Support:Understanding Living Wills in India a Critical Legal and Ethical Analysis
string(18) "Debosmita Banerjee" Banerjee, D.
(2026)
DOI: 10.55041/ijsmt.v2i5.358
Scroll to Top