Enhanced Intrusion Detection Framework: Integrating SMOTE-ENN with Random Forest and XGBoost

Sameer Tembhurney*, Rashmi Jain**, Khushi Barole***, Khushi Malik****, Rahul Raut*****, Prachi Joshi******
*-****** Department of Computer Science and Engineering, S. B. Jain Institute of Technology, Management and Research, Nagpur, India.
Periodicity:July - September'2024

Abstract

The growing sophistication of cyber-attacks necessitates advanced intrusion detection systems (IDS) capable of identifying both existing and emerging threats with high precision. This study proposes an innovative IDS framework that addresses class imbalance using SMOTE-ENN (Synthetic Minority Over-sampling Technique-Edited Nearest Neighbors), while leveraging the complementary strengths of Random Forest (RF) and XGBoost classifiers to enhance detection efficacy. Evaluated on the NSL-KDD dataset, the framework effectively mitigates the challenges posed by imbalanced data, ensuring improved detection of minority attack classes. Experimental analysis demonstrates significant improvements in accuracy, precision, recall, and F1-score compared to conventional methods. These findings highlight the framework's potential to strengthen cyber intrusion detection and enhance overall network defense mechanisms.

Keywords

Intrusion Detection System, Machine Learning, SMOTE-ENN, Random Forest, XGBoost, Cybersecurity.

How to Cite this Article?

Tembhurney, S., Jain, R., Barole, K., Malik, K., Raut, R., and Joshi, P. (2024). Enhanced Intrusion Detection Framework: Integrating SMOTE-ENN with Random Forest and XGBoost. i-manager’s Journal on Information Technology, 13(3), 19-36.

References

[2]. Balvir, S. U., Raghuwanshi, M. M., & Borkar, P. S. (2024). Node2Vec and machine learning: A powerful duo for link prediction in social network. Journal of Electrical Systems, 20(2s), 639-649.
[5]. Choudhary, R. K. (2015). Implementation of efficient search by integrating proximity ranking & instant fuzzy. International Journal of Advances in Computer Science and Cloud Computing (IJACSCC), 3(1), 25-35.
[7]. Choudhary, R. K., Botre, M., Narwre, M. H., Adase, M. A., Jichkar, M. A., Patekar, M. N., & Pradhan, M. J. (2023). Transforming domestic helper recruitment and management with deep learning: A web application. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 9 (6), 333-343.
[8]. Choudhary, R. K., Dubey, S. P., & Warbhe, A. (2015a). Efficient search engine using proximity ranking & instant fuzzy logic. International Journal, 5(7).
[9]. Choudhary, R. K., Muley, S., Chopade, S., Pokale, S., Thakur, R., & Dhakate, G. (2024b). Enhancing cybersecurity in IoT networks: Effective detection of cyber attacks. International Research Journal of Engineering and Technology (IRJET), 11(04), 1364-1375.
[10]. Choudhary, R. K., Warbhe, A., & Dubey, S. P. (2015b). Instant fuzzy-based efficient search engine using proximity ranking. International Journal of Advance Computational Engineering and Networking (IJACEN), 3(8), 59-65.
[17]. Gaidhane, R., Vaidya, C., & Raghuwanshi, M. (2014a). Survey: Learning techniques for intrusion detection system (ids). International Journal of Advance Foundation and Research in Computer (IJAFRC), 1(2), 21-28.
[18]. Gaidhane, R., Vaidya, C., & Raghuwanshi, M. (2014b). Intrusion detection and attack classification using back-propagation neural network. International Journal of Engineering Research & Technology (IJERT), 3(4), 1112-1115.
[28]. Rohankar, J. S., & Balvir, S. U. (2011). A Study of Content Based Image Retrieval (CBIR) system based on correlation, median filtering and edge extraction. International Journal of Electronics Communication and Engineering, 4(1), 251-256.
[30]. Tembhurney, S., & Arjariya, T. (2023). An efficient and secure decentralized electronic voting platform using ethereum blockchain technology. International Journal for Scientific Research & Development, 11 (3), 67-69.
[32]. Vaidya, C., Nampalliwar, A., Nampalliwar, K., Thakkar, R., & Bhagat, S. (2018). Statistical approach for load distribution in decentralized cloud computing. Helix, 8(5), 3884-3887.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.