Development of an Intrusion Detection System using an Ensemble Voting Machine Learning Technique

Authors

  • Ahmed Najm Abdullah Arts, Sciences and Technology University, Lebanon
Volume: 15 | Issue: 3 | Pages: 23917-23922 | June 2025 | https://doi.org/10.48084/etasr.10764

Abstract

Intrusion Detection Systems (IDSs) are essential for identifying unauthorized access and malicious activities in network environments. The current study presents the development of an IDS utilizing a voting-based ensemble Machine Learning (ML) approach. Utilizing the advantages of individual ML models, the voting classifier is a well-known ML model that may enhance overall prediction performance.  This study provides a unique classification method that combines the benefits of the Naive Bayes (NB), K-Nearest Neighbors (KNN), and Adaptive Boosting (AdaBoost) algorithms into a voting ensemble approach.  This ensemble voting classifier greatly improves network IDS accuracy. The experiments were conducted using the KDD99 dataset. The findings reveal that the voting ensemble technique outperforms individual classifiers, achieving a higher accuracy of 99.79%.

Keywords:

intrusion detection systems, ML, voting classifier

Downloads

Download data is not yet available.

References

R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024.

D. E. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222–232, Oct. 1987.

J. Xu and C. R. Shelton, "Intrusion Detection using Continuous Time Bayesian Networks," Journal of Artificial Intelligence Research, vol. 39, pp. 745–774, Dec. 2010.

O. H. Abdulganiyu, T. Ait Tchakoucht, and Y. K. Saheed, "A systematic literature review for network intrusion detection system (IDS)," International Journal of Information Security, vol. 22, no. 5, pp. 1125–1162, Oct. 2023.

Amarudin, R. Ferdiana, and Widyawan, "A Systematic Literature Review of Intrusion Detection System for Network Security: Research Trends, Datasets and Methods," in 2020 4th International Conference on Informatics and Computational Sciences (ICICoS), Semarang, Indonesia, Nov. 2020, pp. 1–6.

V. Jyothsna and V. V. R. Prasad, "A Review of Anomaly based Intrusion Detection Systems," International Journal of Computer Applications, vol. 28, no. 7, pp. 26–35, Aug. 2011.

E. M. Maseno, Z. Wang, and H. Xing, "A Systematic Review on Hybrid Intrusion Detection System," Security and Communication Networks, vol. 2022, no. 1, 2022, Art. no. 9663052.

S. Kumar, S. Gupta, and S. Arora, "Research Trends in Network-Based Intrusion Detection Systems: A Review," IEEE Access, vol. 9, pp. 157761–157779, 2021.

H. Satilmiş, S. Akleylek, and Z. Y. Tok, "A Systematic Literature Review on Host-Based Intrusion Detection Systems," IEEE Access, vol. 12, pp. 27237–27266, 2024.

H. Alavizadeh and H. Alavizadeh, "Cloud-Based Intrusion Detection System Using a Deep Neural Network and Human-in-the-Loop Decision Making," in Deep Learning for Multimedia Processing Applications, pp. 270-284, CRC Press, 2024.

W. T. Yue and M. Çakanyıldırım, "A cost-based analysis of intrusion detection system configuration under active or passive response," Decision Support Systems, vol. 50, no. 1, pp. 21–31, Sep. 2010.

Q.-V. Dang, "Active Learning for Intrusion Detection Systems," in 2020 RIVF International Conference on Computing and Communication Technologies (RIVF), Ho Chi Minh City, Vietnam, Oct. 2020, pp. 1–3.

S. Mukherjee and N. Sharma, "Intrusion Detection using Naive Bayes Classifier with Feature Reduction," Procedia Technology, vol. 4, pp. 119–128, Jan. 2012.

S. S. Sivatha Sindhu, S. Geetha, and A. Kannan, "Decision tree based light weight intrusion detection using a wrapper approach," Expert Systems with Applications, vol. 39, no. 1, pp. 129–141, Jan. 2012.

Y. Zhang, Q. Yang, S. Lambotharan, K. Kyriakopoulos, I. Ghafir, and B. AsSadhan, "Anomaly-Based Network Intrusion Detection Using SVM," in 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi'an, China, Oct. 2019, pp. 1–6.

P. Negandhi, Y. Trivedi, and R. Mangrulkar, "Intrusion Detection System Using Random Forest on the NSL-KDD Dataset," in Emerging Research in Computing, Information, Communication and Applications, Singapore, 2019, pp. 519–531.

S. Waskle, L. Parashar, and U. Singh, "Intrusion Detection System Using PCA with Random Forest Approach," in 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, Jul. 2020, pp. 803–808.

J. Kim, J. Kim, H. Kim, M. Shim, and E. Choi, "CNN-Based Network Intrusion Detection against Denial-of-Service Attacks," Electronics, vol. 9, no. 6, Jun. 2020, Art. no. 916.

M. Maithem and G. A. Al-sultany, "Network intrusion detection system using deep neural networks," Journal of Physics: Conference Series, vol. 1804, no. 1, Oct. 2021, Art. no. 012138.

L. Ashiku and C. Dagli, "Network Intrusion Detection System using Deep Learning," Procedia Computer Science, vol. 185, pp. 239–247, Jan. 2021.

H. Jia, J. Liu, M. Zhang, X. He, and W. Sun, "Network intrusion detection based on IE-DBN model," Computer Communications, vol. 178, pp. 131–140, Oct. 2021.

T. Jamal, “KDD99 dataset.” kaggle, [Online]. Available: https://www.kaggle.com/datasets/toobajamal/kdd99-dataset.

K. Taunk, S. De, S. Verma, and A. Swetapadma, "A Brief Review of Nearest Neighbor Algorithm for Learning and Classification," in 2019 International Conference on Intelligent Computing and Control Systems (ICCS), Madurai, India, May 2019, pp. 1255–1260.

Y. Cao, Q.-G. Miao, J.-C. Liu, and L. Gao, "Advance and Prospects of AdaBoost Algorithm," Acta Automatica Sinica, vol. 39, no. 6, pp. 745–758, Jun. 2013.

S. Chen, G. I. Webb, L. Liu, and X. Ma, "A novel selective naïve Bayes algorithm," Knowledge-Based Systems, vol. 192, Mar. 2020, Art. no. 105361.

H. G. Jabbar, "Advanced Threat Detection Using Soft and Hard Voting Techniques in Ensemble Learning," Journal of Robotics and Control (JRC), vol. 5, no. 4, pp. 1104–1116, Jun. 2024.

C. J. Needham and R. D. Boyle,"Performance Evaluation Metrics and Statistics for Positional Tracker Evaluation," in Computer Vision Systems, Berlin, Heidelberg, 2003, pp. 278–289.

O. Aydemir, "A New Performance Evaluation Metric for Classifiers: Polygon Area Metric," Journal of Classification, vol. 38, no. 1, pp. 16–26, Apr. 2021.

L. Dhanabal and S. P. Shantharaja, "A study on NSL-KDD dataset for intrusion detection system based on classification algorithms." International journal of advanced research in computer and communication engineering, vol. 4, no. 6, pp. 446-452, Jun 2015, https://doi.org/10.17148/IJARCCE.2015.4696.

A. K. Samha, N. Malik, D. Sharma, K. S, and P. Dutta, "Intrusion Detection System Using Hybrid Convolutional Neural Network," Mobile Networks and Applications, Aug. 2023.

“Intrusion detection evaluation dataset (CIC-IDS2017).” Canadian Institute for Cybersecurity, 2017, 2025. [Online]. Available: https://www.unb.ca/cic/datasets/ids-2017.html.

M. Alotaibi et al., "Hybrid GWQBBA model for optimized classification of attacks in Intrusion Detection System," Alexandria Engineering Journal, vol. 116, pp. 9–19, Mar. 2025.

Downloads

How to Cite

[1]
Abdullah, A.N. 2025. Development of an Intrusion Detection System using an Ensemble Voting Machine Learning Technique. Engineering, Technology & Applied Science Research. 15, 3 (Jun. 2025), 23917–23922. DOI:https://doi.org/10.48084/etasr.10764.

Metrics

Abstract Views: 62
PDF Downloads: 36

Metrics Information