Development of an Intrusion Detection System using an Ensemble Voting Machine Learning Technique
Received: 1 March 2025 | Revised: 19 March 2025 and 6 April 2025 | Accepted: 9 April 2025 | Online: 13 May 2025
Corresponding author: Ahmed Najm Abdullah
Abstract
Intrusion Detection Systems (IDSs) are essential for identifying unauthorized access and malicious activities in network environments. The current study presents the development of an IDS utilizing a voting-based ensemble Machine Learning (ML) approach. Utilizing the advantages of individual ML models, the voting classifier is a well-known ML model that may enhance overall prediction performance. This study provides a unique classification method that combines the benefits of the Naive Bayes (NB), K-Nearest Neighbors (KNN), and Adaptive Boosting (AdaBoost) algorithms into a voting ensemble approach. This ensemble voting classifier greatly improves network IDS accuracy. The experiments were conducted using the KDD99 dataset. The findings reveal that the voting ensemble technique outperforms individual classifiers, achieving a higher accuracy of 99.79%.
Keywords:
intrusion detection systems, ML, voting classifierDownloads
References
R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024.
D. E. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222–232, Oct. 1987.
J. Xu and C. R. Shelton, "Intrusion Detection using Continuous Time Bayesian Networks," Journal of Artificial Intelligence Research, vol. 39, pp. 745–774, Dec. 2010.
O. H. Abdulganiyu, T. Ait Tchakoucht, and Y. K. Saheed, "A systematic literature review for network intrusion detection system (IDS)," International Journal of Information Security, vol. 22, no. 5, pp. 1125–1162, Oct. 2023.
Amarudin, R. Ferdiana, and Widyawan, "A Systematic Literature Review of Intrusion Detection System for Network Security: Research Trends, Datasets and Methods," in 2020 4th International Conference on Informatics and Computational Sciences (ICICoS), Semarang, Indonesia, Nov. 2020, pp. 1–6.
V. Jyothsna and V. V. R. Prasad, "A Review of Anomaly based Intrusion Detection Systems," International Journal of Computer Applications, vol. 28, no. 7, pp. 26–35, Aug. 2011.
E. M. Maseno, Z. Wang, and H. Xing, "A Systematic Review on Hybrid Intrusion Detection System," Security and Communication Networks, vol. 2022, no. 1, 2022, Art. no. 9663052.
S. Kumar, S. Gupta, and S. Arora, "Research Trends in Network-Based Intrusion Detection Systems: A Review," IEEE Access, vol. 9, pp. 157761–157779, 2021.
H. Satilmiş, S. Akleylek, and Z. Y. Tok, "A Systematic Literature Review on Host-Based Intrusion Detection Systems," IEEE Access, vol. 12, pp. 27237–27266, 2024.
H. Alavizadeh and H. Alavizadeh, "Cloud-Based Intrusion Detection System Using a Deep Neural Network and Human-in-the-Loop Decision Making," in Deep Learning for Multimedia Processing Applications, pp. 270-284, CRC Press, 2024.
W. T. Yue and M. Çakanyıldırım, "A cost-based analysis of intrusion detection system configuration under active or passive response," Decision Support Systems, vol. 50, no. 1, pp. 21–31, Sep. 2010.
Q.-V. Dang, "Active Learning for Intrusion Detection Systems," in 2020 RIVF International Conference on Computing and Communication Technologies (RIVF), Ho Chi Minh City, Vietnam, Oct. 2020, pp. 1–3.
S. Mukherjee and N. Sharma, "Intrusion Detection using Naive Bayes Classifier with Feature Reduction," Procedia Technology, vol. 4, pp. 119–128, Jan. 2012.
S. S. Sivatha Sindhu, S. Geetha, and A. Kannan, "Decision tree based light weight intrusion detection using a wrapper approach," Expert Systems with Applications, vol. 39, no. 1, pp. 129–141, Jan. 2012.
Y. Zhang, Q. Yang, S. Lambotharan, K. Kyriakopoulos, I. Ghafir, and B. AsSadhan, "Anomaly-Based Network Intrusion Detection Using SVM," in 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi'an, China, Oct. 2019, pp. 1–6.
P. Negandhi, Y. Trivedi, and R. Mangrulkar, "Intrusion Detection System Using Random Forest on the NSL-KDD Dataset," in Emerging Research in Computing, Information, Communication and Applications, Singapore, 2019, pp. 519–531.
S. Waskle, L. Parashar, and U. Singh, "Intrusion Detection System Using PCA with Random Forest Approach," in 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, Jul. 2020, pp. 803–808.
J. Kim, J. Kim, H. Kim, M. Shim, and E. Choi, "CNN-Based Network Intrusion Detection against Denial-of-Service Attacks," Electronics, vol. 9, no. 6, Jun. 2020, Art. no. 916.
M. Maithem and G. A. Al-sultany, "Network intrusion detection system using deep neural networks," Journal of Physics: Conference Series, vol. 1804, no. 1, Oct. 2021, Art. no. 012138.
L. Ashiku and C. Dagli, "Network Intrusion Detection System using Deep Learning," Procedia Computer Science, vol. 185, pp. 239–247, Jan. 2021.
H. Jia, J. Liu, M. Zhang, X. He, and W. Sun, "Network intrusion detection based on IE-DBN model," Computer Communications, vol. 178, pp. 131–140, Oct. 2021.
T. Jamal, “KDD99 dataset.” kaggle, [Online]. Available: https://www.kaggle.com/datasets/toobajamal/kdd99-dataset.
K. Taunk, S. De, S. Verma, and A. Swetapadma, "A Brief Review of Nearest Neighbor Algorithm for Learning and Classification," in 2019 International Conference on Intelligent Computing and Control Systems (ICCS), Madurai, India, May 2019, pp. 1255–1260.
Y. Cao, Q.-G. Miao, J.-C. Liu, and L. Gao, "Advance and Prospects of AdaBoost Algorithm," Acta Automatica Sinica, vol. 39, no. 6, pp. 745–758, Jun. 2013.
S. Chen, G. I. Webb, L. Liu, and X. Ma, "A novel selective naïve Bayes algorithm," Knowledge-Based Systems, vol. 192, Mar. 2020, Art. no. 105361.
H. G. Jabbar, "Advanced Threat Detection Using Soft and Hard Voting Techniques in Ensemble Learning," Journal of Robotics and Control (JRC), vol. 5, no. 4, pp. 1104–1116, Jun. 2024.
C. J. Needham and R. D. Boyle,"Performance Evaluation Metrics and Statistics for Positional Tracker Evaluation," in Computer Vision Systems, Berlin, Heidelberg, 2003, pp. 278–289.
O. Aydemir, "A New Performance Evaluation Metric for Classifiers: Polygon Area Metric," Journal of Classification, vol. 38, no. 1, pp. 16–26, Apr. 2021.
L. Dhanabal and S. P. Shantharaja, "A study on NSL-KDD dataset for intrusion detection system based on classification algorithms." International journal of advanced research in computer and communication engineering, vol. 4, no. 6, pp. 446-452, Jun 2015, https://doi.org/10.17148/IJARCCE.2015.4696.
A. K. Samha, N. Malik, D. Sharma, K. S, and P. Dutta, "Intrusion Detection System Using Hybrid Convolutional Neural Network," Mobile Networks and Applications, Aug. 2023.
“Intrusion detection evaluation dataset (CIC-IDS2017).” Canadian Institute for Cybersecurity, 2017, 2025. [Online]. Available: https://www.unb.ca/cic/datasets/ids-2017.html.
M. Alotaibi et al., "Hybrid GWQBBA model for optimized classification of attacks in Intrusion Detection System," Alexandria Engineering Journal, vol. 116, pp. 9–19, Mar. 2025.
Downloads
How to Cite
License
Copyright (c) 2025 Ahmed Najm Abdullah

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.