{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:35:27Z","timestamp":1767771327100,"version":"build-2065373602"},"reference-count":46,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T00:00:00Z","timestamp":1645747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Norte Portugal Regional Operational Programme (NORTE 2020)","award":["NORTE-01-0145-FEDER-000044"],"award-info":[{"award-number":["NORTE-01-0145-FEDER-000044"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>An intrusion detection system (IDS) is an important tool to prevent potential threats to systems and data. Anomaly-based IDSs may deploy machine learning algorithms to classify events either as normal or anomalous and trigger the adequate response. When using supervised learning, these algorithms require classified, rich, and recent datasets. Thus, to foster the performance of these machine learning models, datasets can be generated from different sources in a collaborative approach, and trained with multiple algorithms. This paper proposes a vote-based architecture to generate classified datasets and improve the performance of supervised learning-based IDSs. On a regular basis, multiple IDSs in different locations send their logs to a central system that combines and classifies them using different machine learning models and a majority vote system. Then, it generates a new and classified dataset, which is trained to obtain the best updated model to be integrated into the IDS of the companies involved. The proposed architecture trains multiple times with several algorithms. To shorten the overall runtimes, the proposed architecture was deployed in Fed4FIRE+ with Ray to distribute the tasks by the available resources. A set of machine learning algorithms and the proposed architecture were assessed. When compared with a baseline scenario, the proposed architecture enabled to increase the accuracy by 11.5% and the precision by 11.2%.<\/jats:p>","DOI":"10.3390\/fi14030072","type":"journal-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T10:00:40Z","timestamp":1645783240000},"page":"72","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9487-8572","authenticated-orcid":false,"given":"Diogo","family":"Teixeira","sequence":"first","affiliation":[{"name":"Instituto Polit\u00e9cnico de Viana do Castelo, 4900-347 Viana do Castelo, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5274-3733","authenticated-orcid":false,"given":"Silvestre","family":"Malta","sequence":"additional","affiliation":[{"name":"Instituto Polit\u00e9cnico de Viana do Castelo, 4900-347 Viana do Castelo, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1856-6101","authenticated-orcid":false,"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[{"name":"Instituto Polit\u00e9cnico de Viana do Castelo, 4900-347 Viana do Castelo, Portugal"},{"name":"Instituto Universit\u00e1rio da Maia, 4475-690 Maia, Portugal"},{"name":"INESC TEC\u2014Institute for Systems and Computer Engineering, Technology and Science, 4200-465 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Grispos, G. (2019). Criminals: Cybercriminals. Encycl. Secur. Emerg. Manag., 1\u20137.","DOI":"10.1007\/978-3-319-69891-5_80-1"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Truong, T.C., Diep, Q.B., and Zelinka, I. (2020). Artificial Intelligence in the Cyber Domain: Offense and Defense. Symmetry, 12.","DOI":"10.3390\/sym12030410"},{"key":"ref_3","first-page":"41","article-title":"Analysis of Host-Based and Network-Based Intrusion Detection System","volume":"8","author":"Singh","year":"2014","journal-title":"Comput. Netw. Inf. Secur."},{"key":"ref_4","first-page":"26","article-title":"A review of anomaly based intrusion detection systems","volume":"28","author":"Jyothsna","year":"2011","journal-title":"Int. J. Comput. Appl."},{"key":"ref_5","unstructured":"(2022, January 10). Fed4FIRE+. About Fed4FIRE+. Available online: https:\/\/www.fed4fire.eu\/the-project\/."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Kumar Singh Gautam, R., and Doegar, E.A. (2018, January 11\u201312). An Ensemble Approach for Intrusion Detection System Using Machine Learning Algorithms. Proceedings of the 8th International Conference Confluence 2018 on Cloud Computing, Data Science and Engineering, Confluence 2018, Noida, India.","DOI":"10.1109\/CONFLUENCE.2018.8442693"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Tirumala, S.S., Sathu, H., and Sarrafzadeh, A. (2015;, January 12\u201315). Free and open source intrusion detection systems: A study. Proceedings of the 2015 International Conference on Machine Learning and Cybernetics (ICMLC), Guangzhou, China.","DOI":"10.1109\/ICMLC.2015.7340923"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Hussein, S.M. (2016, January 15\u201317). Performance Evaluation of Intrusion Detection System Using Anomaly and Signature Based Algorithms to Reduction False Alarm Rate and Detect Unknown Attacks. Proceedings of the 2016 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA.","DOI":"10.1109\/CSCI.2016.0203"},{"key":"ref_9","unstructured":"Ahmad, T., Anwar, M.A., and Haque, M. (2013). Machine Learning Techniques for Intrusion Detection, IGI Global."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Khosravifar, B., and Bentahar, J. (2008, January 25\u201328). An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot. Proceedings of the 22nd International Conference on Advanced Information Networking and Applications (AINA 2008), Gino-wan, Japan.","DOI":"10.1109\/AINA.2008.44"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Venkatesan, R., Devi, D.R., Keerthana, R., and Kumar, A.A. (2018, January 6\u20137). A Novel Approach for Detecting Ddos Attack in H-IDS Using Association Rule. Proceedings of the 2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA), Pondicherry, India.","DOI":"10.1109\/ICSCAN.2018.8541174"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Teixeira, D., Assun\u00e7\u00e3o, L., Pereira, T., Malta, S., and Pinto, P. (2019). OSSEC IDS Extension to Improve Log Analysis and Override False Positive or Negative Detections. J. Sens. Actuator Netw., 8.","DOI":"10.3390\/jsan8030046"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","article-title":"An Adaptive Ensemble Machine Learning Model for Intrusion Detection","volume":"7","author":"Gao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_14","first-page":"8","article-title":"Ensemble voting system for anomaly based network intrusion detection","volume":"2","author":"Panda","year":"2009","journal-title":"Full Pap. Int. J. Recent Trends Eng."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Raykar, V.C., Yu, S., Zhao, L.H., Jerebko, A., Florin, C., Valadez, G.H., Bogoni, L., and Moy, L. (2009, January 14\u201318). Supervised Learning from Multiple Experts: Whom to Trust When Everyone Lies a Bit. Proceedings of the 26th Annual International Conference on Machine Learning. Association for Computing Machinery, Montreal, QC, Canada.","DOI":"10.1145\/1553374.1553488"},{"key":"ref_16","first-page":"85","article-title":"Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection","volume":"38","author":"Mauro","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Mahfouz, A., Abuhussein, A., Venugopal, D., and Shiva, S. (2020). Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset. Future Internet, 12.","DOI":"10.3390\/fi12110180"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"484","DOI":"10.26599\/TST.2020.9010022","article-title":"Intrusion detection system using voting-based neural network","volume":"26","author":"Haghighat","year":"2021","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Gulla, K.K., Viswanath, P., Veluru, S.B., and Kumar, R.R. (2019). Machine learning based intrusion detection techniques. Handbook of Computer Networks and Cyber Security: Principles and Paradigms, Springer.","DOI":"10.1007\/978-3-030-22277-2_35"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Haripriya, L., and Jabbar, M.A. (2018, January 29\u201331). Role of Machine Learning in Intrusion Detection System: Review. Proceedings of the 2nd International Conference on Electronics, Communication and Aerospace Technology, ICECA 2018, Coimbatore, India.","DOI":"10.1109\/ICECA.2018.8474576"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Shin, I., Choi, Y., Kwon, T., Lee, H., and Song, J. (2019, January 1\u20132). Platform design and implementation for flexible data processing and building ML models of IDS alerts. Proceedings of the 2019 14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan.","DOI":"10.1109\/AsiaJCIS.2019.000-4"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Vikram, A. (2020, January 10\u201312). Anomaly detection in Network Traffic Using Unsupervised Machine learning Approach. Proceedings of the 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India.","DOI":"10.1109\/ICCES48766.2020.9137987"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","article-title":"A Supervised Intrusion Detection System for Smart Home IoT Devices","volume":"6","author":"Anthi","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Taher, K.A., Mohammed Yasin Jisan, B., and Rahman, M.M. (2019, January 10\u201312). Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection. Proceedings of the 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), Dhaka, Bangladesh.","DOI":"10.1109\/ICREST.2019.8644161"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ahanger, A.S., Khan, S.M., and Masoodi, F. (2021, January 8\u201310). An Effective Intrusion Detection System using Supervised Machine Learning Techniques. Proceedings of the 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India.","DOI":"10.1109\/ICCMC51019.2021.9418291"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Rani, D., and Kaushal, N.C. (2020, January 1\u20133). Supervised Machine Learning Based Network Intrusion Detection System for Internet of Things. Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India.","DOI":"10.1109\/ICCCNT49239.2020.9225340"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Shi, G., and He, G. (2021, January 17\u201319). Collaborative Multi-agent Reinforcement Learning for Intrusion Detection. Proceedings of the 2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC), Beijing, China.","DOI":"10.1109\/IC-NIDC54101.2021.9660402"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Latif, S., Huma, Z.E., Jamal, S.S., Ahmed, F., Ahmad, J., Zahid, A., Dashtipour, K., Umar Aftab, M., Ahmad, M., and Abbasi, Q.H. (2021). Intrusion Detection Framework for the Internet of Things using a Dense Random Neural Network. IEEE Trans. Ind. Informatics, 1.","DOI":"10.1109\/TII.2021.3130248"},{"key":"ref_29","unstructured":"and Dua, M. (2019, January 12\u201314). Machine Learning Approach to IDS: A Comprehensive Review. Proceedings of the 3rd International Conference on Electronics and Communication and Aerospace Technology, ICECA 2019, Coimbatore, India."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"D1","DOI":"10.1364\/JOCN.10.0000D1","article-title":"Deep-neural-network-based wavelength selection and switching in ROADM systems","volume":"10","author":"Mo","year":"2018","journal-title":"J. Opt. Commun. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3377454","article-title":"A Survey on Distributed Machine Learning","volume":"53","author":"Verbraeken","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"ref_32","unstructured":"Global Environment for Network Innovations (GENI) (2022, January 10). What Is GENI?. Available online: https:\/\/www.geni.net\/about-geni\/what-is-geni\/."},{"key":"ref_33","unstructured":"(2022, January 10). Smart Applications on Virtual Infrastructure (SAVI). Available online: https:\/\/www.savinetwork.ca\/."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Kim, T., Cha, Y., Shin, B., and Cha, B. (2020, January 23). Survey and Performance Test of Python-Based Libraries for Parallel Processing. Proceedings of the 9th International Conference on Smart Media and Applications. Association for Computing Machinery, New York, NY, USA.","DOI":"10.1145\/3426020.3426057"},{"key":"ref_35","unstructured":"Ray Team (2022, January 12). What Is Ray?. Available online: https:\/\/docs.ray.io\/en\/master\/."},{"key":"ref_36","unstructured":"(2022, January 12). Using IPython for Parallel Computing. Available online: https:\/\/ipython.org\/ipython-doc\/3\/parallel\/."},{"key":"ref_37","unstructured":"(2022, January 12). Dispy: Distributed and Parallel Computing with\/for Python\u2014Dispy 4.12.0 Documentation. Available online: https:\/\/dispy.org\/."},{"key":"ref_38","unstructured":"(2022, January 12). Pandaral lel. Available online: https:\/\/github.com\/nalepae\/pandarallel\/tree\/v1.5.4."},{"key":"ref_39","unstructured":"Dask (2022, January 12). Dask\u2014Documentation. Available online: https:\/\/docs.dask.org\/en\/stable\/."},{"key":"ref_40","unstructured":"Joblib (2022, January 12). Joblib: Running Python Functions as Pipeline Jobs. Available online: https:\/\/joblib.readthedocs.io\/en\/latest\/."},{"key":"ref_41","unstructured":"Moritz, P., Nishihara, R., Wang, S., Tumanov, A., Liaw, R., Liang, E., Elibol, M., Yang, Z., Paul, W., and Jordan, M.I. (2018, January 8\u201310). Ray: A Distributed Framework for Emerging AI Applications. Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association, Carlsbad, CA, USA."},{"key":"ref_42","first-page":"795","article-title":"Distributed Big Data Analysis for Mobility Estimation in Intelligent Transportation Systems","volume":"6","author":"Fabbiani","year":"2019","journal-title":"Transp. Rev."},{"key":"ref_43","unstructured":"(2021, December 21). Nsl-kdd Dataset. Available online: https:\/\/www.unb.ca\/cic\/datasets\/nsl.html."},{"key":"ref_44","unstructured":"(2021, December 21). KDD Cup 1999. Available online: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"ref_45","unstructured":"(2021, December 21). The UNSW-NB15 Dataset Description. Available online: https:\/\/research.unsw.edu.au\/projects\/unsw-nb15-dataset."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., and Ghorbani, A.A. (2019, January 1\u20133). Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. Proceedings of the International Carnahan Conference on Security Technology, Chennai, India.","DOI":"10.1109\/CCST.2019.8888419"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/3\/72\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:27:11Z","timestamp":1760135231000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/3\/72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,25]]},"references-count":46,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["fi14030072"],"URL":"https:\/\/doi.org\/10.3390\/fi14030072","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2022,2,25]]}}}