Volume 2 Issue 2 | 2025 | View PDF
Paper Id:IJMSM-V2I2P101
doi: 10.71141/30485037/V2I2P101
Detecting Unbalanced Network Traffic : A Machine Learning Using Stacked Generalization
Vitthal B. Kamble, Kunal R. Jadhav, Tanesh M. Patil, Ayush D. More
Citation:
Vitthal B. Kamble, Kunal R. Jadhav, Tanesh M. Patil, Ayush D. More, "Detecting Unbalanced Network Traffic : A Machine Learning Using Stacked Generalization" International Journal of Multidisciplinary on Science and Management, Vol. 2, No. 2, pp. 1-16, 2025.
Abstract:
Cyber Threats are becoming more frequent and sophisticated, so we need better systems to detect malicious activities in network traffic. Detecting unbalanced network traffic is a critical challenge in cyber security, where malicious activities are often underrepresented in comparison to legitimate traffic. This study proposes a hybrid approach using XG- Boost, Random Forest, and an ensemble model to effectively identify anomalies in network traffic data. We also use dataset of IDS. Our approach improves the accuracy, efficiency, and reliability of intrusion detection, contributing to stronger defenses against cyber attacks and protecting important network systems.
Keywords:
Cyber security, Intrusion Detection System (IDS), XG-Boost, Random Forest, Ensemble Model, Anomaly Detection, Class Imbalance, Network Security, Machine Learning, Hybrid Model, Threat Detection, Data Preprocessing, Malicious Traffic Detection.
References:
[1] R.R. Kumar et al., “OPTCLOUD: An Optimal Cloud Service Selection Framework Using QoS Correlation Lens,” Computational Intelligence and Neuroscience, vol. 2022, pp. 1–16, 2022.
[2] R.R. Kumar, M. Shameem, and C. Kumar, “A Computational Framework for Ranking Prediction of Cloud Services Under Fuzzy Environment,” Enterprise Information Systems, vol. 16, no. 1, pp. 167–187, 2022.
[3] M. Bakro et al., “Performance Analysis Of Cloud Computing Encryption Algorithms,” Advances In Intelligent Computing And Communication, vol. 202, pp. 357–367, 2021.
[4] Cyber Security Market Share, Forecast, Growth Analysis, 2023.
[5] M. A. Akbar et al., “Prioritization-Based Taxonomy of Cloud-Based Outsource Software Development Challenges: Fuzzy AHP Analysis,” Applied Soft Computing, vol. 95, 2020.
[6] S. Lipsa, and R. K. Dash, “A Novel Dimensionality Reduction Strategy Based on Linear Regression with a Fine-Pruned Decision Tree Classifier For Detecting DDoS Attacks in Cloud Computing Environments,” Proceedings of the 1st International Symposium on Artificial Intelligence, pp. 15–25, 2022.
[7] N. Moustafa, and A. Jolfaei, “Autonomous Detection Of Malicious Events Using Machine Learning Models in Drone Networks,” in Proceedings of the 2nd ACM MobiCom Workshop on Drone-Assisted Wireless Communications for 5G and Beyond, pp. 61–66, 2020.
[8] R. Shrestha et al., “Machine Learning-Enabled Intrusion Detection System for Cellular-Connected UAV Networks,” Electronics, vol. 10, no. 13, p. 1549, Jun. 2021.
[9] O. Bouhamed et al., “Lightweight IDS for UAV Networks: A Periodic Deep Reinforcement Learning-Based Approach,” Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 1032–1037, 2021.
[10] J. Whelan, A. Almehmadi, and K. El-Khatib, “Artificial Intelligence for Intrusion Detection Systems in Unmanned Aerial Vehicles,” Computers and Electrical Engineering, vol. 99, 2022.
[11] Q. Abu Al-Haija, and A. Al Badawi, “High-Performance Intrusion Detection System for Networked UAVs Via Deep Learning,” Neural Computing and Applications, vol. 34, no. 13, pp. 10885–10900, 2022.
[12] E. Basan, A. Basan, A. Nekrasov, C. Fidge, E. Abramov, and A. Basyuk, “A Data Normalization Technique For Detecting Cyber Attacks On UAVs,” Drones, vol. 6, no. 9, p. 245, Sep. 2022.
[13] P. J. Sajith and G. Nagarajan, “Intrusion Detection System Using Deep Belief Network & Particle Swarm Optimization,” Wireless Personal Communications, vol. 125, no. 2, pp. 1385–1403, Jul. 2022.
[14] G. Sreelatha, A.V. Babu, and D. Midhunchakkaravarthy, “Improved Security In Cloud Using Sandpiper and Extended Equilibrium Deep Transfer Learning-Based Intrusion Detection,” Cluster Computing, vol. 25, no. 5, pp. 3129–3144, Oct. 2022.
[15] Q. Liu et al., “A Multi-Task Based Deep Learning Approach for Intrusion Detection,” Knowledge-Based Systems, vol. 238, 2022.
[16] M.A. Talukder et al., “A Dependable Hybrid Machine Learning Model for Network Intrusion Detection,” Journal of Information Security and Applications, vol. 72, 2023.
[17] V.B. Kamble, and N. J. Uke, Ethical Hacking, San International, 2024.
[18] V.B. Kamble et al., “Machine Learning In Fake News Detection And Social Innovation: Navigating Truth in the Digital Age,” Exploring Psychology, Social Innovation and Advanced Applications of Machine Learning, pp. 87–108, 2025.
[19] O. Dabade et al., “Developing An Intelligent Credit Card Fraud Detection System With Machine Learning,” Journal of Artificial Intelligence, Machine Learning and Neural Network (JAIMLNN), vol. 2022, ISSN 2799-1172.
[20] V. B. Kamble et al., “Wireless Networks And Cross-Layer Design: An Implementation Approach,” International Journal of Computer Science and Information Technology (IJCSIT), vol. 5, no. 4, pp. 5435–5440, 2014.
[21] V. B. Kamble, and N. J. Uke, “Image Tampering Detection: A Review of Multi-Technique Approach from Traditional to Deep Learning.” Journal of Dynamics and Control, vol. 8, no. 11, pp. 252-283, 2024.
[22] A. Alshammari et al., “Classification Approach For Intrusion Detection In Vehicle Systems,” Wireless Engineering and Technology, vol. 9, no. 4, pp. 79–94, 2018.
[23] J. Li et al., “Machine Learning Algorithms for Network Intrusion Detection,” AI in Cybersecurity, pp. 151–179, 2019.
[24] K. Park, Y. Song, and Y. G. Cheong, “Classification of Attack Types for Intrusion Detection Systems Using a Machine Learning Algorithm,” Proceedings of the 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), pp. 1-3, 2018.
[25] S. Bernard, L. Heutte, and S. Adam, “On the Selection of Decision Trees in Random Forests,” Proceedings of the International Joint Conference on Neural Networks, Atlanta, Georgia, USA, pp. 14–19, 2009.
[26] A. Tesfahun, and D. L. Bhaskari, “Intrusion Detection Using Random Forests Classifier with SMOTE and Feature Reduction,” Proceedings of the 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies.
[27] R. Patgiri et al., “An Investigation on Intrusion Detection System Using Machine Learning.”
[28] T. S. Yange, O. Onyekware, and Y. M. Abdulmuminu, “A Data Analytics System for Network Intrusion Detection Using Decision Tree,” Journal of Computer Science and Applications, vol. 8, pp. 21–29, 2020.
[29] E. Hassan, M. Saleh, and A. Ahmed, “Network Intrusion Detection Approach Using Machine Learning Based on Decision Tree Algorithm,” Journal of Engineering and Applied Science, vol. 7, pp. 1-10, 2020.
[30] B. S. Bhati, and C. S. Rai, “Analysis of Support Vector Machine-Based Intrusion Detection Techniques,” Arabian Journal for Science and Engineering, vol. 45, pp. 2371–2383, 2020.
[31] Q. Shi et al., “A Framework of Intrusion Detection System Based On Bayesian Network in IoT,” International Journal of Performability Engineering, vol. 14, pp. 2280–2288, 2018.
[32] M.K. Prasath and B. Perumal, “A Meta-Heuristic Bayesian Network Classification for Intrusion Detection,” International Journal of Network Management, vol. 29, 2019.
[33] G. Xu, “Research on K-Nearest Neighbor High-Speed Matching Algorithm in Network Intrusion Detection,” Netinfo Security, vol. 20, pp. 71–80, 2020.
[34] D. Chao, Z. Gang, Y. Liu, and D. L. Zhang, “The Detection of Network Intrusion Based on Improved AdaBoost Algorithm,” Journal of Sichuan University (Natural Science Edition), vol. 52, pp. 1225–1229, 2015.
[35] K. Zhang and G. Liao, “Network Intrusion Detection Method Based on Improving Bagging-SVM Integration Diversity,” Journal of Northeast Normal University (Natural Science Edition), vol. 52, pp. 53–59, 2020.
[36] B. Li and Y. Zhang, “Research on Self-Adaptive Intrusion Detection Based on Semi-Supervised Ensemble Learning,” Electrical Automation, vol. 43, pp. 101–104, 2021.
[37] F. Jiang et al., “Approximate Reducts-Based Ensemble Learning Algorithm and its Application in Intrusion Detection,” Journal of Beijing University of Technology, vol. 42, pp. 877–885, 2016.
[38] J. M. Xia et al., “Improved Random Forest Classifier Network Intrusion Detection Method,” Computer Engineering and Design, vol. 40, pp. 2146–2150, 2019.
[39] L. Zhang, J. Zhang, and Y. Sang, “Intrusion Detection Algorithm Based on Random Forest and Artificial Immunity,” Computer Engineering, vol. 46, pp. 146–152, 2020.
[40] J. Qiao et al., “Network Intrusion Detection Method Based on Random Forest,” Computer Engineering and Applications, vol. 56, pp. 82–88, 2020.
[41] V. B. Kamble et al., “Enhancing UPI Fraud Detection: A Machine Learning Approach Using Stacked Generalization,” International Journal of Management Science and Machine Learning (IJMSM), vol. 2, no. 1, pp. 69–83, 2025.