Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Volume 17 , Issue 1 , PP: 67-77, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

A Proposed Ensemble Model of Network Intrusion Detection System for binary and Multiclassification

Amrita Bhatnagar 1 , Arun Giri 2 , Aditi Sharma 3 *

  • 1 Shobhit Institute of Eng. & technology, Meerut, India - (amritapsaxena@gmail.com)
  • 2 Shobhit Institute of Eng. & technology, Meerut, India - (arungiri@shobhitunivesity.ac.in)
  • 3 Department of Computer Science and Engineering, Symbiosis Institute of Technology, Symbiosis International University, Pune, India - (aditi.sharma@ieee.org)
  • Doi: https://doi.org/10.54216/FPA.170105

    Received: November 19, 2023 Revised: March 07, 2024 Accepted: July 02, 2024
    Abstract

    A network Intrusion detection system is a system that can find out different types of attacks. ANIDS is used to find out the noble type of attack by using machine learning and deep learning techniques. These techniques are very useful to find out those attacks whose patterns are not stored in the database. Therefore, these types of systems need more research to improve their accuracy and reduce the false alarm rate. In this paper, we are going to propose an ensemble framework for NIDS using different ML and DL techniques. In this paper, we have used the XGBOOST algorithm for feature extraction and for classification, CNN and RNN deep learning techniques are used. This ensemble model is used for the binary and multiclassification of attacks. Our model was checked on the dataset CICIDS-2018 which gives a better accuracy and low false alarm rate.

    Keywords :

    Network Intrusion detection system , Denial of service attack , CNN , RNN , XGOBoost

    References

    [1]      Manimaran, A., Chandramohan, D., Shrinivas, S., & Arulkumar, N. (2020). A comprehensive novel model for network speech anomaly detection system using deep learning approach. International Journal of Speech Technology, 23, 305-313. https://doi.org/10.1007/s10772-020-09693-z.

    [2]      Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2. https://doi.org/10.1186/s42400-019-0038-7.

    [3]      Rawat, W., & Wang, Z. (2017). Deep Convolutional Neural Networks for Image Classification: A Comprehensive Review. Neural Computation, 29, 2352-2449.  https://doi.org/10.1162/neco_a_00990.

    [4]      Leevy, J., & Khoshgoftaar, T. (2020). A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 Big Data. J. Big Data, 7, 104. https://doi.org/10.1186/s40537-020-00382-x.

    [5]      Mohammed, Mohssen. , Abdalla, Mohamed. , Elhoseny, Mohamed. Detecting Zero-day Polymorphic Worms Using Honeywall. Journal of Journal of Cybersecurity and Information Management, vol. 15, no. 1, 2025, pp. 34-49. DOI: https://doi.org/10.54216/JCIM.150104

    [6]      Gopalakrishnan, Mahalakshmi & Elangovan, Uma & M, Aroosiya & M, Vinitha. (2021). Intrusion Detection System Using Convolutional Neural Network on UNSW NB15 Dataset. 10.3233/APC210116.

    [7]      Kottapalle, Prasanna. (2020). A CNN-LSTM Model for Intrusion Detection System from High Dimensional Data. 10. 1362-1370. 10.5281/zenodo.7911821.

    [8]      Shreeya Jain, Pranav M. Pawar, Raja Muthalagu,Hybrid intelligent intrusion detection system for internet of things,Telematics and Informatics Reports,Volume 8,2022,100030,ISSN 2772-5030, https://doi.org/10.1016/j.teler.2022.100030.

    [9]      Arun Kumar Silivery, Ram Mohan Rao Kovvur, Ramana Solleti, LK Suresh Kumar, Bhukya Madhu,A model for multi-attack classification to improve intrusion detection performance using deep learning approaches, Measurement: Sensors, Volume 30,2023,100924,ISSN 2665-9174, https://doi.org/10.1016/j.measen.2023.100924.

    [10]   Pritom Biswas Udas, Md. Ebtidaul Karim, Kowshik Sankar Roy,SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks,Journal of King Saud University - Computer and Information Sciences,Volume 34, Issue 10, Part B,2022, Pages 10246-10272,ISSN 1319-1578, https://doi.org/10.1016/j.jksuci.2022.10.019.

    [11]   Bhatnagar, Amrita. , Giri, Arun. , Sharma, Aditi. A Hybrid Intrusion Detection Approach for Cyber Attacks. Journal of Journal of Cybersecurity and Information Management, vol. 13, no. 2, 2024, pp. 08-18. DOI: https://doi.org/10.54216/JCIM.130201

    [12]   B., Jorge. , Mauricio, Kevin. , Marks, Adam. Fusion of Forensic Analysis of Mobile Devices: Integrating Multi-Criteria Decision Methods and Case Study Insights. Journal of Fusion: Practice and Applications, vol. 16, no. 2, 2024, pp. 32-42. DOI: https://doi.org/10.54216/FPA.160203

    [13]   Boukhalfa, A., Abdellaoui, A., Hmina, N., & Chaoui, H. (2019)  LSTM   deep learning method for network intrusion detection system. International Journal of Electrical and Computer Engineering  (IJECE). https://doi.org/10.36478/jeasci.2020.227.232.

    [14]   Laghrissi, F., Douzi, S., Douzi, K., & Hssina, B. (2021). Intrusion detection systems using long short-term     memory (LSTM). Journal of Big Data, 8(1), 65. https://doi.org/10.1186/s40537‑021‑00448‑4

    [15]   Dixit, Ashish. , P., R.. , K., B.. , Sharma, Aditi. Safeguarding Digital Essence: A Sub-band DCT Neural Watermarking Paradigm Leveraging GRNN and CNN for Unyielding Image Protection and Identification. Journal of Journal of Intelligent Systems and Internet of Things, vol. 10, no. 1, 2023, pp. 33-47. DOI: https://doi.org/10.54216/JISIoT.100103

    [16]   Fu, Yanfang & Du, Yishuai & Cao, Zijian & Li, Qiang &  Xiang,   Wei. (2022). A Deep Learning Model for  Network Intrusion Detection  with Imbalanced Data. Electronics. 11. 898. 10.3390/electronics11060898.

    [17]   Aldallal A. Toward Efficient Intrusion Detection System Using  Hybrid  Deep Learning Approach. Symmetry.. 2022; 14(9):1916  https://doi.org/10.3390/sym14091916

    [18]   C. Yin, Y. Zhu, J. Fei, and X. He, "A Deep Learning Approach for   Intrusion Detection Using Recurrent  Neural Networks," in IEEE   Access, vol-5.pp. 21954-21961, 2017,   doi:   10.1109/ACCESS.2017.2762418.

    [19]   Samha, A.K., Malik, N., Sharma, D. et al. Intrusion Detection System   Using Hybrid Convolutional Neural  Network. Mobile Netw Appl (2023). https://doi.org/10.1007/s11036-023-02223-6

    [20]   J. K. Samriya, C. Chakraborty, A. Sharma, M. Kumar and S. K. Ramakuri, "Adversarial ML-Based Secured Cloud Architecture for Consumer Internet of Things of Smart Healthcare," in IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 2058-2065, Feb. 2024, doi: 10.1109/TCE.2023.3341696.

    [21]   X. Zhang, J. Ran and J. Mi, "An Intrusion Detection System Based on   Convolutional Neural Network for Imbalanced Network  Traffic," 2019 IEEE 7th International Conference on Computer   Science and Network  Technology (ICCSNT), Dalian, China, 2019, pp. 456-460, doi: 10.1109/ICCSNT47585.2019.8962490.

    [22]   G. Sonowal, A. Sharma and L. Kharb, "Spear-phishing emails verification method based on verifiable secret sharing scheme", Journal of Information Assurance & Security, vol. 16, no. 3, pp. 117-124, 2021.

    [23]   Vanlalruata Hnamte, Jamal Hussain, Dependable intrusion detection    system using deep convolutional neural network: A Novel    framework   and  performance evaluation approach,Telematics and Informatics ,    Reports,Volume 11,2023,100077,ISSN 2772-5030  https://doi.org/10.1016/j.teler.2023.100077.

    [24]   Anand, Nishant. , Parwekar, Pritee. , Sharma, Aditi. Optimized LoRaWAN Architectures: Enhancing Energy Efficiency and Long-Range Connectivity in IoT Networks for Sustainable, Low-Power Solutions and Future Integrations with Edge Computing and 5G. Journal of Journal of Intelligent Systems and Internet of Things, vol. 13, no. 2, 2024, pp. 78-90. DOI: https://doi.org/10.54216/JISIoT.130206

    [25]   L. Heng and T. Weise, "Intrusion Detection System Using   Convolutional Neuronal Networks: A Cognitive Computing Approach  For       Anomaly Detection based on Deep Learning," 2019 IEEE 18th  International  Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC), Milan, Italy, 2019, pp. 34-40,     doi:10.1109/ICCICC46617.2019.9146088.

    [26]   Sydney Mambwe Kasongo,A deep learning technique for intrusion    detection system using a Recurrent Neural Networks-based framework  Computer Communications, Volume 199,2023, Pages 113-125, ISSN     0140-3664, https://doi.org/10.1016/j.comcom.2022.12.010.

    [27] Halbouni, A., Gunawan, T. S., Habaebi, M. H., Halbouni, M.,   Kartiwi, M., & Ahmad, R. (2022). CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access, 10, 99837-99849.

    Cite This Article As :
    Bhatnagar, Amrita. , Giri, Arun. , Sharma, Aditi. A Proposed Ensemble Model of Network Intrusion Detection System for binary and Multiclassification. Fusion: Practice and Applications, vol. , no. , 2025, pp. 67-77. DOI: https://doi.org/10.54216/FPA.170105
    Bhatnagar, A. Giri, A. Sharma, A. (2025). A Proposed Ensemble Model of Network Intrusion Detection System for binary and Multiclassification. Fusion: Practice and Applications, (), 67-77. DOI: https://doi.org/10.54216/FPA.170105
    Bhatnagar, Amrita. Giri, Arun. Sharma, Aditi. A Proposed Ensemble Model of Network Intrusion Detection System for binary and Multiclassification. Fusion: Practice and Applications , no. (2025): 67-77. DOI: https://doi.org/10.54216/FPA.170105
    Bhatnagar, A. , Giri, A. , Sharma, A. (2025) . A Proposed Ensemble Model of Network Intrusion Detection System for binary and Multiclassification. Fusion: Practice and Applications , () , 67-77 . DOI: https://doi.org/10.54216/FPA.170105
    Bhatnagar A. , Giri A. , Sharma A. [2025]. A Proposed Ensemble Model of Network Intrusion Detection System for binary and Multiclassification. Fusion: Practice and Applications. (): 67-77. DOI: https://doi.org/10.54216/FPA.170105
    Bhatnagar, A. Giri, A. Sharma, A. "A Proposed Ensemble Model of Network Intrusion Detection System for binary and Multiclassification," Fusion: Practice and Applications, vol. , no. , pp. 67-77, 2025. DOI: https://doi.org/10.54216/FPA.170105