Optimizing cloud-based intrusion detection systems through hybrid data sampling and feature selection for enhanced anomaly detection
DOI:
https://doi.org/10.6977/IJoSI.202504_9(2).0007Keywords:
Anomaly Detection, Data Optimization, Intrusion Detection System, Machine LearningAbstract
To enhance detection accuracy in network intrusion scenarios, this study proposes an optimized intrusion detection system (IDS) framework that integrates advanced data sampling, feature selection, and anomaly detection techniques. Leveraging random forest (RF) and genetic algorithm, the framework optimizes sampling ratios and identifies critical features. In contrast, the isolation forest algorithm detects and excludes outliers, refining dataset quality and classification performance. Evaluated on the UNSW-NB15 dataset, comprising over 2.5 million records and 42 diverse features, the proposed framework demonstrates significant improvements in anomaly detection, including reduced false alarm rates and enhanced identification of rare threats, such as shellcode, worms, and backdoors. Experimental results reveal that the RF-based model achieves an F1 score of 91.8% and an area under the curve (AUC) of 96%, outperforming traditional machine learning models and standalone RF classifiers. The integration of extreme gradient boosting (XGB) and its optimized variant, XGBGA, further enhances the framework, with XGBGA achieving the highest performance metrics, including an F1 score of 92.8% and an AUC of 97%. These findings underscore the importance of data optimization strategies in improving the accuracy and reliability of IDSs, particularly in handling imbalanced datasets and diverse network traffic. Future work will focus on real-time processing capabilities to handle streaming data and expanding the framework’s applicability to domains such as fraud detection and cybersecurity, where precise anomaly detection is essential.
Downloads
Published
Issue
Section
License
Copyright in a work is a bundle of rights. IJoSI's, copyright covers what may be done with the work in terms of making copies, making derivative works, abstracting parts of it for citation or quotation elsewhere and so on. IJoSI requires authors to sign over rights when their article is ready for publication so that the publisher from then on owns the work. Until that point, all rights belong to the creator(s) of the work. The format of IJoSI copy right form can be found at the IJoSI web site.The issues of International Journal of Systematic Innovation (IJoSI) are published in electronic format and in print. Our website, journal papers, and manuscripts etc. are stored on one server. Readers can have free online access to our journal papers. Authors transfer copyright to the publisher as part of a journal publishing agreement, but have the right to:
1. Share their article for personal use, internal institutional use and scholarly sharing purposes, with a DOI link to the version of record on our server.
2. Retain patent, trademark and other intellectual property rights (including research data).
3. Proper attribution and credit for the published work.