This is a preview and has not been published. View submission

Intrusion Detection Utilizing an Ant Colony Optimization-Based Feature Selection and the XGBoost Classifier

Authors

  • Shweta Bhardwaj Department of Computer Science & Engineering, Amity University, Uttar Pradesh, Noida, India
  • Seema Rawat School of AI and Data Science, Astana IT University, Kazakhstan
  • Hima Bindu Maringanti Department of Computer Science & Applications, MSCB University, Baripada, India
Volume: 16 | Issue: 2 | Pages: 32989-32994 | April 2026 | https://doi.org/10.48084/etasr.14572

Abstract

The Internet of Things (IoT) continues to expand dramatically, connecting a growing number of smart devices such as home automation systems and wearables. However, this growth also introduces significant cybersecurity risks, as attackers increasingly exploit vulnerabilities in these interconnected devices. Protecting IoT networks requires comprehensive Intrusion Detection Systems (IDSs) that can intelligently identify and mitigate malicious activities. The proposed approach integrates dimensionality reduction through Principal Component Analysis (PCA) to streamline data, feature selection using Ant Colony Optimization (ACO) to identify relevant indicators, and classification through the Extreme Gradient Boosting (XGBoost) algorithm for accurate threat detection. The proposed approach achieved far superior results compared to existing IDS methods on three different datasets: 99.2% accuracy, 99.6% precision, 98.8% recall, and 99.2% F1- score on NSL-KDD, 99.3% accuracy, 92.8% precision, 99% recall and 95.8% F1-score on UNSW- NB15, and 99.9% accuracy, 99.5% precision, 99.8% recall, and 99.7% F1-score on CIC-IDS.

Keywords:

internet of things, intrusion detection system, XGBoost, NSL-KDD, UNSW-NB15, CIC-IDS, ACO

Downloads

Download data is not yet available.

References

H. Liu and B. Lang, ''Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey,'' Applied Sciences, vol. 9, no. 20, Oct. 2019, Art. no. 4396.

A. Aldweesh, A. Derhab, and A. Z. Emam, ''Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,'' Knowledge-Based Systems, vol. 189, Feb. 2020, Art. no. 105124.

S. Rawat, A. Srinivasan, V. Ravi, and U. Ghosh, ''Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network,'' Internet Technology Letters, vol. 5, no. 1, Jan. 2022, Art. no. e232.

F. Samson and S. Iseal, "Machine Learning Techniques for Enhancing Intrusion Detection Systems (IDS)," ResearchGate, 2025.

L. Diana, P. Dini, and D. Paolini, ''Overview on Intrusion Detection Systems for Computers Networking Security,'' Computers, vol. 14, no. 3, Mar. 2025.

H. Dong and I. Kotenko, ''Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection,'' Knowledge and Information Systems, vol. 67, no. 5, pp. 3915–3966, May 2025.

S. K. R. Mallidi and R. R. Ramisetty, ''Optimizing Intrusion Detection for IoT: A Systematic Review of Machine Learning and Deep Learning Approaches With Feature Selection and Data Balancing,'' WIREs Data Mining and Knowledge Discovery, vol. 15, no. 2, 2025, Art. no. e70008.

B. Alwasel, A. Aldribi, M. Alreshoodi, I. S. Alsukayti, and M. Alsuhaibani, ''Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection,'' Applied Sciences, vol. 13, no. 13, June 2023.

A. Thakkar and R. Lohiya, ''Role of swarm and evolutionary algorithms for intrusion detection system: A survey,'' Swarm and Evolutionary Computation, vol. 53, Mar. 2020, Art. no. 100631.

V. Pai, Devidas, and N. D. Adesh, ''Comparative analysis of Machine Learning algorithms for Intrusion Detection,'' IOP Conference Series: Materials Science and Engineering, vol. 1013, no. 1, Jan. 2021, Art. no. 012038.

J. Lansky et al., ''Deep Learning-Based Intrusion Detection Systems: A Systematic Review,'' IEEE Access, vol. 9, pp. 101574–101599, 2021.

M. M. Issa, M. Aljanabi, and H. M. Muhialdeen, ''Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations,'' Journal of Intelligent Systems, vol. 33, no. 1, Jan. 2024.

A. H. Ali et al., ''Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey,'' Frontiers in Computer Science, vol. 6, June 2024.

A. Momand, S. U. Jan, and N. Ramzan, ''A Systematic and Comprehensive Survey of Recent Advances in Intrusion Detection Systems Using Machine Learning: Deep Learning, Datasets, and Attack Taxonomy,'' Journal of Sensors, vol. 2023, no. 1, 2023, Art. no. 6048087.

"NSL-KDD." Canadian Institute for Cybersecurity - UNB, [Online]. Available: https://www.unb.ca/cic/datasets/nsl.html.

N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), Nov. 2015, pp. 1–6.

N. Moustafa and J. Slay, "The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set," Information Security Journal: A Global Perspective, vol. 25, no. 1–3, pp. 18–31, Apr. 2016.

N. Moustafa, J. Slay, and G. Creech, "Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks," IEEE Transactions on Big Data, vol. 5, no. 4, pp. 481–494, Sept. 2019.

N. Moustafa, G. Creech, and J. Slay, "Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models," in Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, I. Palomares Carrascosa, H. K. Kalutarage, and Y. Huang, Eds. Springer International Publishing, 2017, pp. 127–156.

M. Sarhan, S. Layeghy, N. Moustafa, and M. Portmann, "NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems," in Big Data Technologies and Applications, vol. 371, Z. Deze, H. Huang, R. Hou, S. Rho, and N. Chilamkurti, Eds. Springer International Publishing, 2021, pp. 117–135.

"CIC-IDS 2017." Canadian Institute for Cybersecurity - UNB, [Online]. Available: https://www.unb.ca/cic/datasets/ids-2017.html.

Downloads

How to Cite

[1]
S. Bhardwaj, S. Rawat, and H. B. Maringanti, “Intrusion Detection Utilizing an Ant Colony Optimization-Based Feature Selection and the XGBoost Classifier”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 2, pp. 32989–32994, Apr. 2026.

Metrics

Abstract Views: 78
PDF Downloads: 42

Metrics Information