Building Trust in Intelligent Systems: An AI-Based Intrusion Detection System for Detecting AI-Generated Cyber Attacks

Show simple item record

dc.contributor.author Bandarigodagea, S.H.
dc.contributor.author Dharmarathna, S.A.D.M.
dc.contributor.author Nusky Ahamedd, T.
dc.contributor.author Mihiranga, R.S.
dc.date.accessioned 2026-03-17T08:30:26Z
dc.date.available 2026-03-17T08:30:26Z
dc.date.issued 2026
dc.identifier.uri http://drr.vau.ac.lk/handle/123456789/1998
dc.description.abstract The rapid evolution of Artificial Intelligence (AI) has transformed the cyber threat landscape, enabling attackers to generate sophisticated and automated attacks that bypass traditional security mechanisms. This study proposes a holistic multimodal AI-Based Intrusion Detection System (AI-IDS) aimed at strengthening trust in intelligent systems by effectively detecting AI-generated cyber-attacks across three dimensions: network traffic, malicious URLs, and phishing emails. The proposed framework integrates an XGBoost-based Network Intrusion Detection System trained on the CSE-CIC-IDS2018 dataset with SMOTE-based balancing, an XGBoost-driven malicious URL detection module using lexical features, and a hybrid CNN-LSTM model for identifying AI-generated phishing emails through semantic analysis. Experimental results demonstrate strong performance, achieving 97% accuracy for network intrusion detection, 90.71% accuracy for malicious URL detection, and 99.1% accuracy with an AUC of 0.997 for phishing email detection. A Streamlit-based prototype secured via Cloudflare Tunnel illustrates practical deployment within a Zero Trust environment. en_US
dc.language.iso en en_US
dc.publisher Korea Database Strategy Society (KDSS) en_US
dc.subject Artificial intelligence en_US
dc.subject Intrusion detection system (IDS) en_US
dc.subject XGBoost en_US
dc.subject Deep learning (CNN-LSTM) en_US
dc.subject Network security en_US
dc.title Building Trust in Intelligent Systems: An AI-Based Intrusion Detection System for Detecting AI-Generated Cyber Attacks en_US
dc.type Conference full paper en_US
dc.identifier.proceedings 32nd International Conference on IT Applications and Management en_US


Files in this item

This item appears in the following Collection(s)

  • IITAMS - 2026 [10]
    International Conference on IT Applications and Management

Show simple item record

Search


Browse

My Account