Ensemble Windows Intrusion Detection System using XGBoost and Deep Learning
Abstract
: Intrusion detection systems (IDS) are critical for preserving the Windows environment from an ever-changing collection of cyber threats. This paper introduces XGBNN, a new ensemble model that combines the benefits of deep learning (DL) and machine learning (ML) techniques to identify and mitigate attacks against Windows machines effectively. The various ML methods are trained on the publicly available dataset to classify eight types of attacks in a Windows environment. Additionally, deep neural networks (DNNs) are proposed by optimizing the layers and hyperparameters to achieve the best optimal accuracy. Then, the DNN model and XGboost model are integrated to detect intrusions by utilizing the feature extraction ability of DNN and providing the intermediate features extracted from the last second layer of the DNN to the XGBoost for classification. The Ensemble model XGBNN optimizes features and offers better decisions. The proposed model achieves exceptional accuracy of 100%, as demonstrated by the empirical results, and outperforms the benchmark models. The purpose of this study is to highlight the effectiveness of hybrid architectures in intrusion detection. These architectures offer a more robust, scalable, and effective method to improve the security of the Windows system against more sophisticated attacks.
Keywords
Full Text:
PDFReferences
B Priyanka, ‘Enhanced CNN and SVM with Adaptive Modality Switching and Audio-Based Video Summarization for Real-Time Agricultural Intrusion Detection’, Journal of Information Systems Engineering and Management, vol. 10, no. 33s, pp. 880–896, Apr. 2025, doi: 10.52783/jisem.v10i33s.5668.
Z. Azam, Md. M. Islam, and M. N. Huda, ‘Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree’, IEEE Access, vol. 11, pp. 80348–80391, 2023, doi: 10.1109/ACCESS.2023.3296444.
R. A. Al Hasan and E. K. Hamza, ‘An Improved Intrusion Detection System Using Machine Learning with Singular Value Decomposition and Principal Component Analysis.’, International Journal of Intelligent Engineering & Systems, vol. 16, no. 4, 2023, doi: 10.22266/ijies2023.0831.03.
A. Alagarsamy, T. Elumalai, S. P. Ramesh, T. Karuppiah, P. Kaliyaperumal, and R. Perumal, ‘A hybrid framework for enhanced intrusion detection in cloud environments leveraging autoencoder’, International Journal of Informatics and Communication Technology (IJ-ICT), vol. 14, no. 2, p. 555, Aug. 2025, doi: 10.11591/ijict.v14i2.pp555-564.
S. Kumar, S. Gupta, and S. Arora, ‘Research Trends in Network-Based Intrusion Detection Systems: A Review’, IEEE Access, vol. 9, pp. 157761–157779, 2021, doi: 10.1109/ACCESS.2021.3129775.
Z. Ahmad, A. Shahid Khan, C. Wai Shiang, J. Abdullah, and F. Ahmad, ‘Network intrusion detection system: A systematic study of machine learning and deep learning approaches’, Transactions on Emerging Telecommunications Technologies, vol. 32, no. 1, Jan. 2021, doi: 10.1002/ett.4150.
I. Martins, J. S. Resende, P. R. Sousa, S. Silva, L. Antunes, and J. Gama, ‘Host-based IDS: A review and open issues of an anomaly detection system in IoT’, Future Generation Computer Systems, vol. 133, pp. 95–113, Aug. 2022, doi: 10.1016/j.future.2022.03.001.
Z. T. Sworna, Z. Mousavi, and M. A. Babar, ‘NLP methods in host-based intrusion detection systems: A systematic review and future directions’, Journal of Network and Computer Applications, vol. 220, p. 103761, Nov. 2023, doi: 10.1016/j.jnca.2023.103761.
F. Khan and S. K. Billahalli Shivabasappa, ‘Detecting Evolving Cyber Threats in IoT Environments Using Machine Learning’, International Journal of Intelligent Engineering and Systems, vol. 17, no. 6, pp. 12–23, Dec. 2024, doi: 10.22266/ijies2024.1231.02.
W. Thirumaran Valavan and N. Joseph, ‘Intrusion Detection System Using K-means SMOTE Algorithm with Multi-dense Layer Bidirectional Long Short-term Memory’, International Journal of Intelligent Engineering and Systems, vol. 17, no. 6, pp. 59–68, Dec. 2024, doi: 10.22266/ijies2024.1231.06.
Mahendra S Dalvi, ‘Machine Learning Based Intrusion Detection System’, Journal of Information Systems Engineering and Management, vol. 10, no. 36s, pp. 550–555, Apr. 2025, doi: 10.52783/jisem.v10i36s.6528.
S. Singh, S. V. Fernandes, V. Padmanabha, and P. Rubini, ‘MCIDS-Multi Classifier Intrusion Detection system for IoT Cyber Attack using Deep Learning algorithm’, in 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), IEEE, Feb. 2021, pp. 354–360. doi: 10.1109/ICICV50876.2021.9388579.
J. Figueiredo, C. Serrão, and A. M. de Almeida, ‘Deep Learning Model Transposition for Network Intrusion Detection Systems’, Electronics (Basel), vol. 12, no. 2, p. 293, Jan. 2023, doi: 10.3390/electronics12020293.
N. W. Khan et al., ‘A hybrid deep learning-based intrusion detection system for IoT networks’, Mathematical Biosciences and Engineering, vol. 20, no. 8, pp. 13491–13520, 2023, doi: 10.3934/mbe.2023602.
U. K. Lilhore et al., ‘HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning’, Sensors, vol. 23, no. 18, p. 7856, Sep. 2023, doi: 10.3390/s23187856.
J. B. Awotunde et al., ‘An Ensemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks’, Applied Sciences, vol. 13, no. 4, p. 2479, Feb. 2023, doi: 10.3390/app13042479.
S. Chalichalamala, N. Govindan, and R. Kasarapu, ‘Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things’, Sensors, vol. 23, no. 23, p. 9583, Dec. 2023, doi: 10.3390/s23239583.
S. Singh, S. V. Fernandes, V. Padmanabha, and P. Rubini, ‘MCIDS-Multi Classifier Intrusion Detection system for IoT Cyber Attack using Deep Learning algorithm’, in 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), IEEE, Feb. 2021, pp. 354–360. doi: 10.1109/ICICV50876.2021.9388579.
N. Moustafa, M. Keshky, E. Debiez, and H. Janicke, ‘Federated TON_IoT Windows Datasets for Evaluating AI-Based Security Applications’, in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, Dec. 2020, pp. 848–855. doi: 10.1109/TrustCom50675.2020.00114.
N. Moustafa, ‘TON_IoT Datasets’, UNSW, Sydney. Accessed: Apr. 27, 2025. [Online]. Available: https://research.unsw.edu.au/projects/toniot-datasets
S. Cherfi, A. Boulaiche, and A. Lemouari, ‘Enhancing IoT Security: A Deep Learning Approach with Autoencoder-DNN Intrusion Detection Model’, in 2024 6th International Conference on Pattern Analysis and Intelligent Systems (PAIS), IEEE, Apr. 2024, pp. 1–7. doi: 10.1109/PAIS62114.2024.10541183.
W. Ding, M. Abdel-Basset, and R. Mohamed, ‘DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks’, Inf Sci (N Y), vol. 634, pp. 157–171, Jul. 2023, doi: 10.1016/j.ins.2023.03.052.
D. Singh and B. Singh, ‘Investigating the impact of data normalization on classification performance’, Appl Soft Comput, vol. 97, p. 105524, Dec. 2020, doi: 10.1016/j.asoc.2019.105524.
D. Micci-Barreca, ‘A preprocessing scheme for high-cardinality categorical attributes in classification and prediction problems’, ACM SIGKDD Explorations Newsletter, vol. 3, no. 1, pp. 27–32, Jul. 2001, doi: 10.1145/507533.507538.
S. Mittal, ‘A survey on modeling and improving reliability of DNN algorithms and accelerators’, Journal of Systems Architecture, vol. 104, p. 101689, 2020.
I. H. Sarker, ‘Machine Learning: Algorithms, Real-World Applications and Research Directions’, SN Comput Sci, vol. 2, no. 3, p. 160, May 2021, doi: 10.1007/s42979-021-00592-x.
S. A. Sushma and K. K. TG, ‘Comparative Study of Naive Bayes, Gaussian Naive Bayes Classifier and Decision Tree Algorithms for Prediction of Heart Diseases’, Int J Res Appl Sci Eng Technol, vol. 9, no. 3, pp. 475–486, 2021.
S. Sperandei, ‘Understanding logistic regression analysis’, Biochem Med (Zagreb), vol. 24, no. 1, pp. 12–18, 2014.
O. Kramer and O. Kramer, ‘K-nearest neighbors’, Dimensionality reduction with unsupervised nearest neighbors, pp. 13–23, 2013.
Y.-Y. Song and L. U. Ying, ‘Decision tree methods: applications for classification and prediction’, Shanghai Arch Psychiatry, vol. 27, no. 2, p. 130, 2015.
G. Biau and E. Scornet, ‘A random forest guided tour’, Test, vol. 25, pp. 197–227, 2016.
T. Chen and C. Guestrin, ‘Xgboost: A scalable tree boosting system’, in Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining, 2016, pp. 785–794.
P. Israni, ‘Breast Cancer Diagnosis (BCD) Model Using Machine Learning’, International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 10, pp. 4456–4463, Aug. 2019, doi: 10.35940/ijitee.J9973.0881019.
DOI: http://doi.org/10.11591/ijict.v15i2.pp565-577
Refbacks
- There are currently no refbacks.
Copyright (c) 2026 Pranitha Kedambady Shiva, Pushparaj D Shetty

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The International Journal of Informatics and Communication Technology (IJ-ICT)
p-ISSN 2252-8776, e-ISSN 2722-2616
This journal is published by the Intelektual Pustaka Media Utama (IPMU).