Intrusion Detection Utilizing an Ant Colony Optimization-Based Feature Selection and the XGBoost Classifier
Received: 6 September 2025 | Revised: 15 October 2025 and 29 October 2025 | Accepted: 1 November 2025 | Online: 10 February 2026
Corresponding author: Seema Rawat
Abstract
The Internet of Things (IoT) continues to expand dramatically, connecting a growing number of smart devices such as home automation systems and wearables. However, this growth also introduces significant cybersecurity risks, as attackers increasingly exploit vulnerabilities in these interconnected devices. Protecting IoT networks requires comprehensive Intrusion Detection Systems (IDSs) that can intelligently identify and mitigate malicious activities. The proposed approach integrates dimensionality reduction through Principal Component Analysis (PCA) to streamline data, feature selection using Ant Colony Optimization (ACO) to identify relevant indicators, and classification through the Extreme Gradient Boosting (XGBoost) algorithm for accurate threat detection. The proposed approach achieved far superior results compared to existing IDS methods on three different datasets: 99.2% accuracy, 99.6% precision, 98.8% recall, and 99.2% F1- score on NSL-KDD, 99.3% accuracy, 92.8% precision, 99% recall and 95.8% F1-score on UNSW- NB15, and 99.9% accuracy, 99.5% precision, 99.8% recall, and 99.7% F1-score on CIC-IDS.
Keywords:
internet of things, intrusion detection system, XGBoost, NSL-KDD, UNSW-NB15, CIC-IDS, ACODownloads
References
H. Liu and B. Lang, ''Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey,'' Applied Sciences, vol. 9, no. 20, Oct. 2019, Art. no. 4396.
A. Aldweesh, A. Derhab, and A. Z. Emam, ''Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,'' Knowledge-Based Systems, vol. 189, Feb. 2020, Art. no. 105124.
S. Rawat, A. Srinivasan, V. Ravi, and U. Ghosh, ''Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network,'' Internet Technology Letters, vol. 5, no. 1, Jan. 2022, Art. no. e232.
F. Samson and S. Iseal, "Machine Learning Techniques for Enhancing Intrusion Detection Systems (IDS)," ResearchGate, 2025.
L. Diana, P. Dini, and D. Paolini, ''Overview on Intrusion Detection Systems for Computers Networking Security,'' Computers, vol. 14, no. 3, Mar. 2025.
H. Dong and I. Kotenko, ''Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection,'' Knowledge and Information Systems, vol. 67, no. 5, pp. 3915–3966, May 2025.
S. K. R. Mallidi and R. R. Ramisetty, ''Optimizing Intrusion Detection for IoT: A Systematic Review of Machine Learning and Deep Learning Approaches With Feature Selection and Data Balancing,'' WIREs Data Mining and Knowledge Discovery, vol. 15, no. 2, 2025, Art. no. e70008.
B. Alwasel, A. Aldribi, M. Alreshoodi, I. S. Alsukayti, and M. Alsuhaibani, ''Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection,'' Applied Sciences, vol. 13, no. 13, June 2023.
A. Thakkar and R. Lohiya, ''Role of swarm and evolutionary algorithms for intrusion detection system: A survey,'' Swarm and Evolutionary Computation, vol. 53, Mar. 2020, Art. no. 100631.
V. Pai, Devidas, and N. D. Adesh, ''Comparative analysis of Machine Learning algorithms for Intrusion Detection,'' IOP Conference Series: Materials Science and Engineering, vol. 1013, no. 1, Jan. 2021, Art. no. 012038.
J. Lansky et al., ''Deep Learning-Based Intrusion Detection Systems: A Systematic Review,'' IEEE Access, vol. 9, pp. 101574–101599, 2021.
M. M. Issa, M. Aljanabi, and H. M. Muhialdeen, ''Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations,'' Journal of Intelligent Systems, vol. 33, no. 1, Jan. 2024.
A. H. Ali et al., ''Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey,'' Frontiers in Computer Science, vol. 6, June 2024.
A. Momand, S. U. Jan, and N. Ramzan, ''A Systematic and Comprehensive Survey of Recent Advances in Intrusion Detection Systems Using Machine Learning: Deep Learning, Datasets, and Attack Taxonomy,'' Journal of Sensors, vol. 2023, no. 1, 2023, Art. no. 6048087.
"NSL-KDD." Canadian Institute for Cybersecurity - UNB, [Online]. Available: https://www.unb.ca/cic/datasets/nsl.html.
N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), Nov. 2015, pp. 1–6.
N. Moustafa and J. Slay, "The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set," Information Security Journal: A Global Perspective, vol. 25, no. 1–3, pp. 18–31, Apr. 2016.
N. Moustafa, J. Slay, and G. Creech, "Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks," IEEE Transactions on Big Data, vol. 5, no. 4, pp. 481–494, Sept. 2019.
N. Moustafa, G. Creech, and J. Slay, "Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models," in Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, I. Palomares Carrascosa, H. K. Kalutarage, and Y. Huang, Eds. Springer International Publishing, 2017, pp. 127–156.
M. Sarhan, S. Layeghy, N. Moustafa, and M. Portmann, "NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems," in Big Data Technologies and Applications, vol. 371, Z. Deze, H. Huang, R. Hou, S. Rho, and N. Chilamkurti, Eds. Springer International Publishing, 2021, pp. 117–135.
"CIC-IDS 2017." Canadian Institute for Cybersecurity - UNB, [Online]. Available: https://www.unb.ca/cic/datasets/ids-2017.html.
Downloads
How to Cite
License
Copyright (c) 2026 Shweta Bhardwaj, Seema Rawat, Hima Bindu Maringanti

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
