Performance Evaluation of Neighbor-Based Learning Methods for Network Intrusion Detection System
Main Article Content
Abstract
The rapid advancement of computer networks offers substantial benefits but also introduces growing cybersecurity risks. Cyber-attacks are increasing in both frequency and sophistication, demanding continuous improvements in security systems. Consequently, intrusion detection technologies are being actively researched and optimized to enhance threat detection and prevention capabilities. In particular, Machine Learning (ML) and Artificial Intelligence (AI) have become important tools in enhancing cyber-attack detection capabilities. One of the effective approaches in this field is Neighbor-Based Learning models, a group of ML algorithms that have proven useful in identifying malicious behavior in network traffic. In this study, we apply data preprocessing techniques such as Random Under Sampling to balance the dataset and Robust Scaler to reduce the effect of outliers, thereby improving model performance. Three classification algorithms are implemented, including k-Nearest Neighbors (k-NN), Radius Nearest Classifier (RNC), and Nearest Centroid Classifier (NCC), with the goal of evaluating their effectiveness in detecting cyber-attacks. Experimental results show that after hyperparameter tuning, the RNC model achieves the highest performance with an accuracy of 83.59%, demonstrating strong potential for building efficient and reliable intrusion detection systems. The findings not only contribute to improving detection performance but also suggest new research directions, particularly the integration of Neighbor-Based Learning with Deep Learning or Ensemble techniques to further enhance adaptability in real-time cybersecurity environments.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
Abdulhameed, A. A., Alazawi, S. A. H., & Hassan, G. M. (2024). An optimized model for network intrusion detection in the network operating system environment. Mesopotamian Journal of CyberSecurity, 4 (3), 75–85.
Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32 (1), e4150.
Ahmadzadeh, A., & Angryk, R. A. (2022). Measuring class-imbalance sensitivity of deterministic performance evaluation metrics. In 2022 ieee international conference on image processing (icip) (pp. 51–55).
Alhayali, R. A. I., Aljanabi, M., Ali, A. H., Mohammed, M. A., & Sutikno, T. (2021). Optimized machine learning algorithm for intrusion detection. Indonesian Journal of Electrical Engineering and Computer Science, 24 (1), 590–599.
Al-Sayed, A., Khayyat, M. M., & Zamzami, N. (2023). Predicting heart disease using collaborative clustering and ensemble learning techniques. Applied Sciences, 13 (24), 13278.
Assegie, T. A., Suresh, T., Purushothaman, R., Ganesan, S., & Kumar, N. K. (2023). Early prediction of gestational diabetes with parameter-tuned k-nearest neighbor classifier. Journal of Robotics and Control (JRC), 4 (4), 452–457.
Bace, R. G. (2000). Intrusion detection. Sams Publishing.
Begum, N., Rahman, M. M., & Omar Faruk, M. (2024). Machine learning prediction of nutritional status among pregnant women in bangladesh: Evidence from bangladesh demographic and health survey 2017–18. Plos one, 19 (5), e0304389.
Cenggoro, T. W., et al. (2018). Deep learning for imbalance data classification using class expert generative adversarial network. Procedia Computer Science, 135 , 60–67.
Das, T., Abu Hamdan, O., Shukla, R., Sengupta, S., & Arslan, E. (2022). Unridd: intrusion detection dataset using network port statistics. techrxiv. Preprint. https://doi. org/10.36227/techrxiv, 198 (77311), v3.
Gascon, H., Orfila, A., & Blasco, J. (2011). Analysis of update delays in signature-based network intrusion detection systems. Computers & Security, 30 (8), 613–624.
Güney, H. (2023). Awc-nids: Attack-wise customized network intrusion detection system using machine learning, concurrency, and distributed systems. Concurrency and Computation: Practice and Experience, 35 (26), e7832.
Gupta, S., Jhunjhunwalla, M., Bhardwaj, A., & Shukla, D. (2020). Data imbalance in landslide susceptibility zonation: Under-sampling for class-imbalance learning. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 42 , 51–57.
Hammood, B. A. K., & Sadiq, A. T. (2023). Ensemble machine learning approach for iot intrusion detection systems. Iraqi Journal for Computers and Informatics, 49 (2), 93–99.
Hayaty, M., Muthmainah, S., & Ghufran, S. M. (2020). Random and synthetic over-sampling approach to resolve data imbalance in classification. International Journal of Artificial Intelligence Research, 4 (2), 86–94.
Hou, R., Lo, J. Y., Marks, J. R., Hwang, E. S., & Grimm, L. J. (2024). Classification performance bias between training and test sets in a limited mammography dataset. Plos one, 19 (2), e0282402.
Ibraheem, I. K. (2022). Enhancing intrusion detection systems using ensemble machine learning techniques. Data and Metadata, 1, 33–33.
Jeon, H., & Oh, S. (2020). Hybrid-recursive feature elimination for efficient feature selection. Applied Sciences, 10 (9), 3211.
Karakatič, S. (2020). Evopreprocess—data preprocessing framework with nature-inspired optimization algorithms. Mathematics, 8 (6), 900.
Khushi, M., Shaukat, K., Alam, T. M., Hameed, I. A., Uddin, S., Luo, S., . . . Reyes, M. C. (2021). A comparative performance analysis of data resampling methods on imbalance medical data. IEEE Access, 9 , 109960–109975.
Kim, T., & Pak, W. (2023). Integrated feature-based network intrusion detection system using incremental feature generation. Electronics, 12 (7), 1657.
Kramer, O. (2013). K-nearest neighbors. In Dimensionality reduction with unsupervised nearest neighbors (pp. 13–23). Berlin, Heidelberg: Springer Berlin Heidelberg. Retrieved from https://doi.org/10.1007/978-3-642-38652-72 doi: 10.1007/978-3642-38652-72
Kumar, G., & Alqahtani, H. (2023). Machine learning techniques for intrusion detection systems in sdn-recent advances, challenges and future directions. CMES-Computer Modeling in Engineering & Sciences, 134 (1).
Ling, J., & Wu, C. (2019). Feature selection and deep learning based approach for network intrusion detection. In 3rd international conference on mechatronics engineering and information technology (icmeit 2019) (pp.764–770).
Maseer, Z. K., Yusof, R., Bahaman, N., Mostafa, S. A., & Foozy, C. F. M. (2021). Benchmarking of machine learning for anomaly based intrusion detection systems in the cicids2017 dataset. IEEE access, 9 , 22351–22370.
Rumala, D. J. (2023). How you split matters: data leakage and subject characteristics studies in longitudinal brain mri analysis. In Workshop on clinical image-based procedures (pp. 235–245).
Ruzgar, N. S., & Chua, C. (2020). Data level approach for multiclass imbalance financial data. WSEAS Transactions on Computers, ISSN/E-ISSN , 1109–2750.
Sari, R. E., Stiawan, D., Afifah, N., Idris, M. Y., & Budiarto, R. (2024). Classification of darknet traffic using the adaboost classifier method. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 12 (2), 384–396.
Tibshirani, R., Hastie, T., Narasimhan, B., & Chu, G. (2002). Diagnosis of multiple cancer types by shrunken centroids of gene expression. Proceedings of the National Academy of Sciences, 99 (10), 6567–6572.
Vanin, P., Newe, T., Dhirani, L. L., O’Connell, E., O’Shea, D., Lee, B., & Rao, M. (2022). A study of network intrusion detection systems using artificial intelligence/machine learning. Applied Sciences, 12 (22), 11752.
Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE access, 7 , 41525–41550.
Wong, G. Y., Leung, F. H., & Ling, S.-H. (2013). A novel evolutionary preprocessing method based on over-sampling and under-sampling for imbalanced datasets. In Iecon 2013-39th annual conference of the ieee industrial electronics society (pp. 2354–2359).
Zeng, Z., Peng, W., & Zhao, B. (2021). Improving the accuracy of network intrusion detection with causal machine learning. Security and Communication Networks, 2021 (1), 8986243.