{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T00:32:17Z","timestamp":1762043537507,"version":"build-2065373602"},"reference-count":36,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,26]]},"abstract":"<p>In this work, homogeneous ensemble techniques, namely bagging and boosting were employed for intrusion detection to determine the intrusive activities in network by monitoring the network traffic. Simultaneously, model diversity was enhanced as numerous algorithms were taken into account, thereby leading to an increase in the detection rate Several classifiers, i.e., SVM, KNN, RF, ETC and MLP)  were used in case of bagging approach. Likewise, tree-based classifiers have been employed for boosting. The proposed model was tested on NSL-KDD dataset that was initially subjected to preprocessing. Accordingly, ten most significant features were identified using decision tree and recursive feature elimination method. Furthermore, the dataset was divided into five subsets, each one them being subjected to training, and the final results were obtained based on majority voting. Experimental results proved that the model was effective for detecting intrusive activities. Bagged ETC and boosted RF outperformed all the other classifiers with an accuracy of 99.123% and 99.309%, respectively.<\/p>","DOI":"10.4018\/ijisp.2022010112","type":"journal-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T20:56:56Z","timestamp":1635368216000},"page":"1-18","source":"Crossref","is-referenced-by-count":9,"title":["An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques"],"prefix":"10.4018","volume":"16","author":[{"given":"Faheem Syeed","family":"Masoodi","sequence":"first","affiliation":[{"name":"University of Kashmir, India"}]},{"given":"Iram","family":"Abrar","sequence":"additional","affiliation":[{"name":"University of Kashmir, India"}]},{"given":"Alwi M.","family":"Bamhdi","sequence":"additional","affiliation":[{"name":"Umm Al Qura University, Saudi Arabia"}]}],"member":"2432","reference":[{"key":"IJISP.2022010112-0","first-page":"185","article-title":"Current trends and future scope for internet of things","author":"I.Abrar","year":"2020","journal-title":"Internet of things in bussiness transformation: Developing an industry and bussiness strategy for industry 5.0"},{"key":"IJISP.2022010112-1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC49089.2020.9215232"},{"key":"IJISP.2022010112-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.10.011"},{"key":"IJISP.2022010112-3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841987"},{"key":"IJISP.2022010112-4","doi-asserted-by":"crossref","unstructured":"Bamhdi, A., Abrar, I., & Masoodi, F. (2021). An ensemble based approach for effective intrusion detection using majority voting. Telekomnika, 19(2), 664-671.","DOI":"10.12928\/telkomnika.v19i2.18325"},{"key":"IJISP.2022010112-5","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"key":"IJISP.2022010112-6","unstructured":"Chae, H., Jo, B., Choi, S., & Park, T. (2013). Feature selection for intrusion detection using NSL-KDD. Recent Advances in Computer Science, 184-187."},{"key":"IJISP.2022010112-7","doi-asserted-by":"publisher","DOI":"10.1145\/3093241.3093262"},{"key":"IJISP.2022010112-8","doi-asserted-by":"crossref","unstructured":"Engen, V. (2010). Machine Learning for network based intrusion detection: An investigation into discrepancies in findings with the KDD Cup \u201999 data set and multi-objective evolution of neural network classifier ensembles for imbalanced data. Academic Press.","DOI":"10.1109\/ICMLC.2009.5212485"},{"key":"IJISP.2022010112-9","first-page":"5514","article-title":"An intrusion detection system for packet and flow based networks using deep neural network approach.","volume":"10","author":"K.Farnaha","year":"2020","journal-title":"Iranian Journal of Electrical and Computer Engineering"},{"key":"IJISP.2022010112-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.231"},{"key":"IJISP.2022010112-11","doi-asserted-by":"crossref","unstructured":"Galar, M., Fernandez, A., Barrenechea, E., Bustince, H., & Herrera, F. (2012). A review on ensembles for the class imbalance problem: bagging, boosting, and hybrid-based approaches. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications Rev 2012), 42, 463-484.","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"IJISP.2022010112-12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2010.5640375"},{"key":"IJISP.2022010112-13","doi-asserted-by":"publisher","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"IJISP.2022010112-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.129"},{"key":"IJISP.2022010112-15","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2695-6_45"},{"key":"IJISP.2022010112-16","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03035-w"},{"key":"IJISP.2022010112-17","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2503-6"},{"key":"IJISP.2022010112-18","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i3.pp2701-2709"},{"key":"IJISP.2022010112-19","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/240217"},{"key":"IJISP.2022010112-20","doi-asserted-by":"crossref","unstructured":"Liu, H., & Motoda, H. (1998). Feature extraction, construction and selection: A data mining perspective. Security and Cryptology.","DOI":"10.1007\/978-1-4615-5725-8"},{"key":"IJISP.2022010112-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105648"},{"key":"IJISP.2022010112-22","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0971-8"},{"key":"IJISP.2022010112-23","doi-asserted-by":"publisher","DOI":"10.3390\/info11060315"},{"key":"IJISP.2022010112-24","unstructured":"Peddabachigari, S., Abraham, A., & Thomas, J. (2004). Intrusion Detection Systems Using Decision Trees and Support Vector Machines. International Journal of Applied Science and Computations, 11, 1-16."},{"key":"IJISP.2022010112-25","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12198"},{"key":"IJISP.2022010112-26","doi-asserted-by":"publisher","DOI":"10.1145\/3167918.3167951"},{"key":"IJISP.2022010112-27","doi-asserted-by":"crossref","unstructured":"Rai, A. (2020). Optimizing a new intrusion detection system using ensemble methods and deep neural network. Fourth international conference on trends in electronics and informatics (ICOEI 2020), 527-532.","DOI":"10.1109\/ICOEI48184.2020.9143028"},{"key":"IJISP.2022010112-28","first-page":"2734","article-title":"A predictive model for network intrusion detection using stacking approac.","volume":"10","author":"S.Rajagopal","year":"2020","journal-title":"Iranian Journal of Electrical and Computer Engineering"},{"key":"IJISP.2022010112-29","doi-asserted-by":"publisher","DOI":"10.5220\/0006893801410148"},{"key":"IJISP.2022010112-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.11.017"},{"key":"IJISP.2022010112-31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0758-8_5"},{"key":"IJISP.2022010112-32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2017.8116977"},{"key":"IJISP.2022010112-33","first-page":"83","article-title":"Novel intrusion detection using probabilistic neural network and adaptive boosting.","volume":"6","author":"T. P.Tran","year":"2009","journal-title":"International Journal of Computer Science and Information Security"},{"key":"IJISP.2022010112-34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978035"},{"key":"IJISP.2022010112-35","doi-asserted-by":"crossref","unstructured":"Yihunie, F., Abdelfattah, E., & Regmi, A. (2019). Applying machine learning to anomaly-based intrusion detection systems. IEEE long island systems, Applications and technology conference (LISAT), 1-5.","DOI":"10.1109\/LISAT.2019.8817340"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=285018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T21:51:12Z","timestamp":1673905872000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2022010112"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2021,11,26]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2022010112","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"type":"print","value":"1930-1650"},{"type":"electronic","value":"1930-1669"}],"subject":[],"published":{"date-parts":[[2021,11,26]]}}}