Adaptive Shields for Network Intrusion Detection via Gradient Boosting

Authors

  • Bhanuprakash Gowra
  • Deepak V

DOI:

https://doi.org/10.63682/jns.v14i16S.4319

Keywords:

Detection Systems(NIDS), Network Intrusion, Cyber Security, Machine Learning, Network Security, Gradient Boosting Decision Tree(GBDT), Intrusion Detection

Abstract

Network Intrusion Detection Systems (NIDS) are essential for protecting computer networks because they keep an eye on traffic and spot harmful activity. The HC-DTTSVM (Hierarchical Clustering Decision Tree Twin Support Vector Machine) technique and Gradient Boosting Decision Tree (GBDT) technology are combined in this study to present a novel way to improve NIDS accuracy. To improve the speed of the HC-DTTSVM method, GBDT is used as a feature extractor to automatically find important patterns in network traffic. The suggested approach uses a step-by-step training procedure that begins with GBDT and progresses to Artificial Neural Networks (ANNs) and Twin Support Vector Machines (TWSVMs). Using metrics like accuracy, precision, recall, false positive rate (FAR), F1-score, and G-mean, a thorough analysis shows that this combination strategy performs better than a number of deep learning-based methods. The outcomes demonstrate how well GBDT and HC-DTTSVM operate together to categorize network intrusions, indicating that this combination has the potential to be a reliable NIDS solution. In addition to demonstrating the suggested method's ability to increase detection accuracy, this study makes recommendations for future research directions, such as investigating sophisticated ensemble methods, utilizing deep learning models, improving feature engineering techniques, and validating the approach across a variety of datasets to guarantee generalization and robustness.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Zou, L., Luo, X., Zhang, Y., Yang, X., & Wang, X. (2023). HC-DTTSVM: a network intrusion detection method based on decision tree twin support vector machine and hierarchical clustering. IEEE Access, 11, 21404-21416.

Zuberi, A. H., & Ahmad, S. (2023). IoT Based Smart Alert Network Security System Using Machine Learning. International Journal of Innovative Research in Computer Science & Technology, 11(4), 15-22.

Ferdiana, R. (2020, November). A systematic literature review of intrusion detection system for network security: Research trends, datasets, and methods. In 2020 4th International Conference on Informatics and Computational Sciences (ICICoS) (pp. 1-6). IEEE.

Bagheri, A., & Shameli-Sendi, A. (2023). Automating the Translation of Cloud Users' High-Level Security Needs to an Optimal Placement Model in the Cloud Infrastructure. IEEE Transactions on Services Computing.

Siddiqi, M. A., & Pak, W. (2022). Tier-based optimization for synthesized network intrusion detection system. IEEE Access, 10, 108530-108544.

Farid, G., Warraich, N. F., & Iftikhar, S. (2023). Digital information security management policy in academic libraries: A systematic review (2010–2022). Journal of Information Science, 01655515231160026.

Said, R. B., Sabir, Z., & Askerzade, I. (2023). CNN-BiLSTM: A Hybrid Deep Learning Approach for Network Intrusion Detection System in Software Defined Networking with Hybrid Feature Selection. IEEE Access..

Li, X., Jiang, J., Wang, H., Han, C., Chen, G., Du, J., ... & Mumtaz, S. (2023). Physical layer security for wireless-powered ambient backscatter cooperative communication networks. IEEE transactions on cognitive communications and networking.

Wei, H., Ai, Q., Zhao, W., & Zhang, Y. (2023). Real-time security warning and ecu identification for in-vehicle networks. IEEE Sensors Journal.

Wisanwanichthan, T., & Thammawichai, M. (2021). A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM. Ieee Access, 9, 138432-138450.

M. H. Haghighat and J. Li, Intrusion detection system using voting based neural network, Tsinghua Sci. Technol., vol. 26, no. 4, pp. 484–495, Aug. 2021.

Y. Yang et al., ASTREAM: Data-stream-driven scalable anomaly detection with accuracy guarantee in IoT environment, IEEE Trans. New. Sci. Eng., early access, Mar. 8, 2022, Doi: 10.1109/TNSE.2022.3157730.

F. T. Liu, K. M. Ting, and Z.-H. Zhou, Isolation-based anomaly detection, ACM Trans. Know. Discov. Data, vol. 6, no. 1, pp. 1–39, Mar. 2012.

X. Zhang et al., LSHiForest: A generic framework for fast tree isolation based ensemble anomaly analysis, in Proc. IEEE 33rd Int. Conf. Data Eng. (ICDE), Apr. 2017, pp. 983–994.

R. Magán-Carrión, D. Urda, I. Díaz-Cano, and B. Dorronsoro, Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches, Appl. Sci., vol. 10, no. 5, p. 1775, Mar. 2020.

Downloads

Published

2025-04-22

How to Cite

1.
Gowra B, V D. Adaptive Shields for Network Intrusion Detection via Gradient Boosting. J Neonatal Surg [Internet]. 2025Apr.22 [cited 2025Oct.6];14(16S):456-68. Available from: https://www.jneonatalsurg.com/index.php/jns/article/view/4319