Swarm-Optimized Ensemble Learning for Intrusion Detection using CICIDS2018 and UNSW-NB15
Abstract
This paper presents a comprehensive framework for enhancing the accuracy of intrusion detection systems (IDS) by combining multiple machine learning classifiers with swarm-based optimization algorithms. We use different classification models (Logistic Regression, Decision Tree, Extra Trees, Random Forest, and XGBoost) for evaluating the impact of the proposed approach on two benchmark cybersecurity datasets CICIDS2018 and UNSW-NB15. To address shortcomings pertaining to the detection precision and model stability, three metaheuristic optimization algorithms i.e., Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Bat Algorithm are employed for feature selection and hyperparameter optimization. Empirical results indicate that the proposed CRF-CAPS obtains significant performance improvements in all evaluation criteria and can achieve as large as 7.5% of accuracy improvement over baseline models. The best accuracy of 97.6% for the improved model based on UNSW-NB15 and 90.9% for the CICIDS2018. In addition, the optimization resulted in a decrease in the inference time of many models, which enables real-time operation. These findings demonstrate the efficacy of hybrid optimization to narrow the performance gaps observed in the recent IDSII literature. The proposed model achieves higher overall performance than recent IDS studies between 2020 and 2025, which showed accuracy in the range of 84–91%. In addition, the swarm-based optimization could reduce features by around 30%, which translated into significant improvement in inference speed and model efficiency.References
Haidar, D., & Husien, I. (2025, May). A review
of machine learning techniques and challenges in
online Botnet detection. In AIP Conference Proceedings (Vol. 3211, No. 1, p. 030010). AIP Publishing LLC.
Osman, I. N., & Husien, I. M. (2022). Comparison of Sentiment Analysis Techniques for Twitter
posts classification. In 2022 International Conference on Data Science and Intelligent Computing
(ICDSIC), IEEE, pp. 93–97.
Abdillah, A., Widianingsih, I., Buchari, R. A., &
Nurasa, H. (2024). Big data security & individual (psychological) resilience: A review of social
media risks and lessons learned from Indonesia.
Array, 21, 100336.
Ahmed, M., & Husien, I. (2024). Hybrid Machine Learning Approach for Accurate Heart Disease Prediction. International Journal of Intelligent Engineering & Systems, 17(4).
Shahid, J., Ahmad, R., Kiani, A. K., Ahmad, T.,
Saeed, S., & Almuhaideb, A. M. (2022). Data protection and privacy of the internet of healthcare
things (IoHTs). Applied Sciences, 12(4), 1927.
Alharbi, A., Seh, A. H., Alosaimi, W., Alyami, H.,
Agrawal, A., Kumar, R., & Khan, R. A. (2021).
Analyzing the impact of cyber security related attributes for intrusion detection systems. Sustainability, 13(22), 12337.
Ajibuwa, O., Hamdaoui, B., & Yavuz, A.
A. (2023). A survey on AI/ML-driven intrusion and misbehavior detection in networked autonomous systems. arXiv preprint.
https://arxiv.org/abs/2305.05040
DOI:
https://doi.org/10.31449/inf.v50i12.10444Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







