Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Epistemic uncertain computing for intrusion detection with explainability & multi-criteria optimization using AA-NLS and GRUSO-GRU
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 18 March 2026

Epistemic uncertain computing for intrusion detection with explainability & multi-criteria optimization using AA-NLS and GRUSO-GRU

  • K. Kiruthika1,
  • M. Karpagam2,
  • Tanvir H. Sardar3 &
  • …
  • Sk Mahmudul Hassan4 

Scientific Reports , Article number:  (2026) Cite this article

  • 635 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Owing to incomplete and inaccurate data, intrusion detection in networks is uncertain. The out-of-order packet arrival uncertainty was not analyzed in the existing works, thereby causing false positives in intrusion detection. So, in this paper, a novel Algebraic Average-based Neutrosophic Logic System (AA-NLS)-based out-of-order uncertainty analysis is proposed. Firstly, the nodes are initialized, and the data is sensed. Then, for intrusion detection, the Network Intrusion Detection System (NIDS) is trained. Here, the data is collected and pre-processed. At the time of pre-processing, Weighted Distance Error Function-based K-Nearest Neighbour (WDEFKNN) is utilized to impute the uncertainty caused by missing values. Further, utilizing the Density-Based Beta Distribution Soergel Spatial Clustering of Applications with Noise (DBBDSSCAN), the behavioural patterns are grouped. Then, the features are extracted, and by utilizing AA-NLS, the epistemic uncertainty caused by out-of-order packet arrival is analyzed. In the meantime, by utilizing the Hidden Laplace Witten Bell Markov Model (HLWBMM), the temporal patterns are assessed. Then, the intrusion is detected by the Generalized Riccati Uniform Scaling Orthogonal-based Gated Recurrent Unit (GRUSO-GRU). Here, utilizing the Pareto Entropy-based SHapley Additive exPlanation (PESHAP) model, the explainability of the intrusion detection is carried out. If there is no intrusion, then data transmission is continued. And, if there is intrusion, then the gathered alerts are prioritized and transmitted utilizing the multi-criteria-based Log-Cosh Fennec Fox Optimization Algorithm (LCFFOA). Hence, the intrusion is detected by the proposed framework with an accuracy of 99.299% under the full multi-class setting, demonstrating effective performance compared to prevailing Deep Learning (DL)-based NIDS approaches.

Similar content being viewed by others

Slow drift aware dynamic risk assessment in cyber physical systems using quantum neutrosophic fuzzy modelling

Article Open access 02 April 2026

A novel intrusion detection framework for optimizing IoT security

Article Open access 18 September 2024

Graph attention and Kolmogorov–Arnold network based smart grids intrusion detection

Article Open access 13 March 2025

Data availability

The datasets used in this study are publicly available intrusion detection datasets. The primary dataset used is the CSE-CIC-IDS2018 dataset, and additional validation was conducted using the Network Intrusion Detection Dataset and CIC-IDS-2017 dataset. These datasets are available through public repositories such as Kaggle. CSE-CIC-IDS2018 dataset: https://www.kaggle.com/datasets/solarmainframe/ids-intrusion-csv Network Intrusion Detection Dataset : [https://www.kaggle.com/datasets/chethuhn/network-intrusion-dataset] CIC-IDS-2017 dataset: [https://www.kaggle.com/datasets/sampadab17/network-intrusion-detection?resource=download].

References

  1. Akhtar, M. A. et al. Robust genetic machine learning ensemble model for intrusion detection in network traffic. Sci. Rep. 13, 1–22. https://doi.org/10.1038/s41598-023-43816-1 (2023).

    Google Scholar 

  2. Zhang, Y. & Malacaria, P. Dealing with uncertainty in cybersecurity decision support. Comput. Secur. 148, 1–11. https://doi.org/10.1016/j.cose.2024.104153 (2025).

    Google Scholar 

  3. Abdel-Basset, M. et al. An optimization model for appraising intrusion-detection systems for network security communications: Applications, challenges, and solutions. Sensors 22(11), 1–26. https://doi.org/10.3390/s22114123 (2022).

    Google Scholar 

  4. Ahmed, U. et al. Explainable AI-based innovative hybrid ensemble model for intrusion detection. J. Cloud Comput. 13(1), 1–34. https://doi.org/10.1186/s13677-024-00712-x (2024) (Springer Berlin Heidelberg.).

    Google Scholar 

  5. Haghighat, M. H. & Li, J. Intrusion detection system using voting-based neural network. Tsinghua Sci. Technol. 26(4), 484–495. https://doi.org/10.26599/TST.2020.9010022 (2021).

    Google Scholar 

  6. Sayadi, H., He, Z., Miari, T., & Aliasgari, M. (2024). Redefining Trust: Assessing Reliability of Machine Learning Algorithms in Intrusion Detection Systems. In Proceedings—IEEE International Symposium on Circuits and Systems, 1–5. https://doi.org/10.1109/ISCAS58744.2024.10558202

  7. Alharbi, A. et al. Analyzing the impact of cyber security related attributes for intrusion detection systems. Sustainability 13(22), 1–19. https://doi.org/10.3390/su132212337 (2021).

    Google Scholar 

  8. Kandhro, I. A. et al. Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures. IEEE Access 11, 9136–9148. https://doi.org/10.1109/ACCESS.2023.3238664 (2023).

    Google Scholar 

  9. Albalwy, F. & Almohaimeed, M. Advancing artificial intelligence of things security: Integrating feature selection and deep learning for real-time intrusion detection. Systems 13(4), 1–17. https://doi.org/10.3390/systems13040231 (2025).

    Google Scholar 

  10. Almotiri, S. H. Improving network resilience against DDoS attacks: A fuzzy TOPSIS-based quantitative assessment approach. Heliyon 10(22), 1–15. https://doi.org/10.1016/j.heliyon.2024.e40413 (2024).

    Google Scholar 

  11. Muneer, S. et al. A critical review of artificial intelligence based approaches in intrusion detection: A comprehensive analysis. J. Eng. 2024, 1–16. https://doi.org/10.1155/2024/3909173 (2024).

    Google Scholar 

  12. Al-masri, E. (2025). Deciding When Not to Decide : Indeterminacy-Aware Intrusion Detection with NeutroSENSE. In 2025 IEEE World AI IoT Congress, 1–7. https://arxiv.org/pdf/2507.00003.

  13. Bouramdane, A. A. Cyberattacks in smart grids: Challenges and solving the multi-criteria decision-making for cybersecurity options, including ones that incorporate artificial intelligence, using an analytical hierarchy process. J. Cybersecur. Privacy 3(4), 662–705. https://doi.org/10.3390/jcp3040031 (2023).

    Google Scholar 

  14. Li, X. et al. Open set recognition for malware traffic via predictive uncertainty. Electronics 12(2), 1–16. https://doi.org/10.3390/electronics12020323 (2023).

    Google Scholar 

  15. Zheng, X., Yang, S., & Wang, X. (2023). SF-IDS: An Imbalanced Semi-Supervised Learning Framework for Fine-Grained Intrusion Detection. In IEEE International Conference on Communications, 1–6. https://doi.org/10.1109/ICC45041.2023.10279032

  16. Talpini, J., Sartori, F. & Savi, M. Enhancing trustworthiness in ML-based network intrusion detection with uncertainty quantification. J. Reliab. Intell. Environ. 10(4), 501–520. https://doi.org/10.1007/s40860-024-00238-8 (2024).

    Google Scholar 

  17. Yang, T., Qiao, Y. & Lee, B. Explaining probabilistic Bayesian neural networks for cybersecurity intrusion detection. IEEE Access 12, 97004–97016. https://doi.org/10.1109/ACCESS.2024.3421330 (2024).

    Google Scholar 

  18. Dong, C., Feng, Y. & Shang, W. A new method of dynamic network security analysis based on dynamic uncertain causality graph. J. Cloud Comput. 13(1), 1–17. https://doi.org/10.1186/s13677-023-00568-7 (2024).

    Google Scholar 

  19. Alsaadi, H. I. H., ALmuttari, R. M., Ucan, O. N. & Bayat, O. An adapting soft computing model for intrusion detection system. Comput. Intell. 38(3), 1–21. https://doi.org/10.1111/coin.12433 (2021).

    Google Scholar 

  20. Atitallah, S. B., Driss, M., Boulila, W. & Koubaa, A. Securing industrial IoT environments: A fuzzy graph attention network for robust intrusion detection. IEEE Open J. Comput. Soc. 6, 1065–1076. https://doi.org/10.1109/OJCS.2025.3587486 (2025).

    Google Scholar 

  21. Leiva, M. A., García, A. J., Shakarian, P. & Simari, G. I. Argumentation-based query answering under uncertainty with application to cybersecurity. Big Data Cogn. Comput. 6(3), 1–17. https://doi.org/10.3390/bdcc6030091 (2022).

    Google Scholar 

  22. Kukliansky, A., Orescanin, M., Bollmann, C. & Huffmire, T. Network anomaly detection using quantum neural networks on noisy quantum computers. IEEE Trans. Quantum Eng. 5, 1–11. https://doi.org/10.1109/TQE.2024.3359574 (2024).

    Google Scholar 

  23. Masakuna, J. F. et al. Streamlined and resource-efficient estimation of epistemic uncertainty in deep ensemble classification decision via regression. IEEE Trans. Emerg. Top. Comput. Intell. https://doi.org/10.1109/TETCI.2024.3508846 (2025).

    Google Scholar 

  24. Yadav, N., Pande, S., Khamparia, A. & Gupta, D. Intrusion detection system on IoT with 5G network using deep learning. Wirel. Commun. Mob. Comput. 2022, 1–13. https://doi.org/10.1155/2022/9304689 (2022).

    Google Scholar 

  25. Remya, S., Pillai, M. J., Arjun, C., Ramasubbareddy, S. & Cho, Y. Enhancing security in LLNs using a hybrid trust-based intrusion detection system for RPL. IEEE Access 12, 58836–58850. https://doi.org/10.1109/ACCESS.2024.3391918 (2024).

    Google Scholar 

  26. Ghosh, S., Goyal, R. K. & Chowdhury, K. Explainable AI-driven intrusion detection system for DoS attack classification using deep learning and optimization techniques. IEEE Access 14, 5618–5642. https://doi.org/10.1109/ACCESS.2026.3651187 (2026).

    Google Scholar 

  27. Wu, Y. & Wan, L. SGMT-IDS: A dual-branch semi-supervised intrusion detection model based on graphs and transformers. Electronics 15(2), 1–19. https://doi.org/10.3390/electronics15020348 (2026).

    Google Scholar 

  28. Alsubai, S., Ayari, M., Kryvinska, N., Almadhor, A., Baili, J., Al Hejaili, A., & Abbas, S. Quantum transfer learning for cross-domain cybersecurity threat detection and categorization. Sci. Rep.1–29. (2026). https://www.nature.com/articles/s41598-026-40634-z_reference.pdf.

  29. Jablaoui, R., Cheikhrouhou, O., Hamdi, M. & Liouane, N. Deep learning enabled intrusion detection system for IoT security: R. Jablaoui et al.. EURASIP J. Wirel. Commun. Netw. 2025(1), 1–21 (2025).

    Google Scholar 

  30. Martins, G. E., Guimaraes Marques, T., Souza da Silva, W. & Celestino, J. Edge‐oriented DoS/DDoS intrusion detection and supervision platform. Secur. Priv. 9(2), 1–19. https://doi.org/10.1002/spy2.70193 (2026).

    Google Scholar 

  31. Guarascio, M., Cassavia, N., Pisani, F. S. & Manco, G. Boosting cyber-threat intelligence via collaborative intrusion detection. Future Gener. Comput. Syst. 135, 30–43. https://doi.org/10.1016/j.future.2022.04.028 (2022).

    Google Scholar 

  32. Williams, B. & Qian, L. Semi-supervised learning for intrusion detection in large computer networks. Appl. Sci. 15(11), 1–28. https://doi.org/10.3390/app15115930 (2025).

    Google Scholar 

  33. Yousefnezhad, M., Hamidzadeh, J. & Aliannejadi, M. Ensemble classification for intrusion detection via feature extraction based on deep learning. Soft Comput. 25(20), 12667–12683. https://doi.org/10.1007/s00500-021-06067-8 (2021).

    Google Scholar 

  34. Gazzan, M. & Sheldon, F. T. Novel ransomware detection exploiting uncertainty and calibration quality measures using deep learning. Information 15(5), 1–20. https://doi.org/10.3390/info15050262 (2024).

    Google Scholar 

  35. Ishaque, M., Johar, M. G. M., Khatibi, A. & Yamin, M. A novel hybrid technique using fuzzy logic, neural networks and genetic algorithm for intrusion detection system. Meas. Sens. 30, 1–12. https://doi.org/10.1016/j.measen.2023.100933 (2023).

    Google Scholar 

  36. Qazi, E. U. H., Faheem, M. H. & Zia, T. HDLNIDS: Hybrid deep-learning-based network intrusion detection system. Appl. Sci. 13(8), 1–16. https://doi.org/10.3390/app13084921 (2023).

    Google Scholar 

  37. Du, J., Yang, K., Hu, Y. & Jiang, L. NIDS-CNNLSTM: Network intrusion detection classification model based on deep learning. IEEE Access 11, 24808–24821. https://doi.org/10.1109/ACCESS.2023.3254915 (2023).

    Google Scholar 

  38. Rameshkumar, S., Ganesan, R. & Merline, A. Progressive transfer learning-based deep Q network for DDOS defence in WSN. Comput. Syst. Sci. Eng. 44(3), 1–16. https://doi.org/10.32604/csse.2023.027910 (2023).

    Google Scholar 

  39. Miyamoto, K., Han, C., Ban, T., Takahashi, T., & Takeuchi, J. I. (2024). Intrusion Detection Simplified: A Feature-free Approach to Traffic Classification Using Transformers. In 2024 Annual Computer Security Applications Conference Workshops (ACSAC Workshops), 20–29. https://www.researchgate.net/profile/Chansu-Han-2/publication/389970359_Intrusion_Detection_Simplified_A_Feature-free_Approach_to_Traffic_Classification_Using_Transformers/links/68400eb3d1054b0207f98270/Intrusion-Detection-Simplified-A-Feature-free-Approach-to-Traffic-Classification-Using-Transformers.pdf

  40. Xu, H., Sun, L., Fan, G., Li, W. & Kuang, G. A hierarchical intrusion detection model combining multiple deep learning models with attention mechanism. IEEE Access 11, 66212–66226. https://doi.org/10.1109/ACCESS.2023.3290613 (2023).

    Google Scholar 

Download references

Funding

Open access funding provided by Manipal Academy of Higher Education, Manipal. No funding was received for conducting this study.

Author information

Authors and Affiliations

  1. Department of Mathematics, K.S.Rangasamy College of Technology, Tiruchengode, Namakkal, Tamil Nadu, 637 215, India

    K. Kiruthika

  2. Department of Computational Intelligence, Faculty of Engineering and Technology, SRM Institute of Science and Technology, SRM Nagar, Kattankulathur, Chennai, Tamil Nadu, 603203, India

    M. Karpagam

  3. Department of CSE, School of Engineering, Dayananda Sagar University, Devarakaggalahalli, Harohalli, Kanakapura Road, Bengaluru South Dt., 562112, India

    Tanvir H. Sardar

  4. Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, Karnataka, 576104, India

    Sk Mahmudul Hassan

Authors
  1. K. Kiruthika
    View author publications

    Search author on:PubMed Google Scholar

  2. M. Karpagam
    View author publications

    Search author on:PubMed Google Scholar

  3. Tanvir H. Sardar
    View author publications

    Search author on:PubMed Google Scholar

  4. Sk Mahmudul Hassan
    View author publications

    Search author on:PubMed Google Scholar

Contributions

KK: Writing-original draft, Data collection, model development and evaluation. KM: model development and evaluation, and manuscript writing. THS: manuscript review and data analysis review. SKM: model evaluation, data analysis, and manuscript review.

Corresponding authors

Correspondence to M. Karpagam or Sk Mahmudul Hassan.

Ethics declarations

Competing interests

The authors declare no competing interests.

Consent for Publication

The authors consent for the publication of this manuscript.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kiruthika, K., Karpagam, M., Sardar, T.H. et al. Epistemic uncertain computing for intrusion detection with explainability & multi-criteria optimization using AA-NLS and GRUSO-GRU. Sci Rep (2026). https://doi.org/10.1038/s41598-026-44214-z

Download citation

  • Received: 18 November 2025

  • Accepted: 10 March 2026

  • Published: 18 March 2026

  • DOI: https://doi.org/10.1038/s41598-026-44214-z

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Uncertainty in intrusion detection
  • Neutrosophic algebra
  • eXplainable artificial intelligence (XAI)
  • Uncertain computing
  • Intelligent decision support
  • Multi-criteria optimization
  • Behaviour analysis
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com footer links

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics