D. Prabakar,
Naveena M.,
Deepika S.,
Pavithra K.,
- Professor & Head of the Department, Department of Computer Science and Engineering, Karpagam College of Engineering Coimbatore, Tamil Nadu, India
- UG Scholar, Department of Computer Science and Engineering, Karpagam College of Engineering Coimbatore, Tamil Nadu, India
- UG Scholar, Department of Computer Science and Engineering, Karpagam College of Engineering Coimbatore, Tamil Nadu, India
- UG Scholar, Department of Computer Science and Engineering, Karpagam College of Engineering Coimbatore, Tamil Nadu, India
Abstract
Intrusion detection is critical for protecting network security from emerging cyber threats. This study describes a unique intrusion detection system (IDS) based on the Random Forest algorithm. Random Forests are used as an effective classifier to identify patterns linked with malevolent behaviour. This technique uses Random Forests to improve the accuracy and efficiency of intrusion detection systems. The suggested methodology’s value is shown by its performance on the benchmark KDD Cup dataset, which shows significant gains in detection accuracy when compared to previous methodologies. This study improves intrusion detection technology by demonstrating Random Forests’ effectiveness in overcoming the hurdles presented by complex assaults. The system employs Random Forests as its primary classification method to accurately detect and analyze behavioral patterns linked to different types of cyberattacks, including denial-of-service (DoS), probing, remote-to-local (R2L), and user-to-root (U2R) intrusions. By generating numerous decision trees during the training phase and determining the final output based on the majority vote among these trees, Random Forests deliver improved performance, especially in managing noisy datasets and minimizing the risk of overfitting—issues that often challenge conventional intrusion detection methods.
Keywords: DDoS, intrusion detection, machine leaning, random forests, cloud environment
[This article belongs to International Journal of Wireless Security and Networks ]
D. Prabakar, Naveena M., Deepika S., Pavithra K.. DDoS Detection Using Cascade Correlation for Improving Network Resources in Cloud Environment. International Journal of Wireless Security and Networks. 2025; 03(02):17-22.
D. Prabakar, Naveena M., Deepika S., Pavithra K.. DDoS Detection Using Cascade Correlation for Improving Network Resources in Cloud Environment. International Journal of Wireless Security and Networks. 2025; 03(02):17-22. Available from: https://journals.stmjournals.com/ijwsn/article=2025/view=232822
References
- Kumar R, Malik A, Ranga V. An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks. Knowl-Based Syst. 2022 Nov 28; 256: 109762.
- Wang W, Jian S, Tan Y, Wu Q, Huang C. Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions. Comput Secur. 2022 Jan 1; 112: 102537.
- Oughton EJ, Lehr W, Katsaros K, Selinis I, Bubley D, Kusuma J. Revisiting wireless internet connectivity: 5G vs Wi-Fi 6. Telecommun Policy. 2021 Jun 1; 45(5): 102127.
- Benkeser D, Ju C, Lendle S, van der Laan M. Online cross‐validation‐based ensemble learning. Stat Med. 2018 Jan 30; 37(2): 249–60.
- Lei S, Xia C, Li Z, Li X, Wang T. HNN: A novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis. IEEE Trans Netw Sci Eng. 2021 Sep 2; 8(4): 3257–74.
- Cheng Y, Xu Y, Zhong H, Liu Y. Leveraging semisupervised hierarchical stacking temporal convolutional network for anomaly detection in IoT communication. IEEE Internet Things J. 2020 Jun 9; 8(1): 144–55.
- Li X, Zhu M, Yang LT, Xu M, Ma Z, Zhong C, Li H, Xiang Y. Sustainable ensemble learning driving intrusion detection model. IEEE Trans Dependable Secure Comput. 2021 Mar 17; 18(4): 1591–604.
- Alkanhel R, El-kenawy ES, Abdelhamid AA, Ibrahim A, Alohali MA, Abotaleb M, Khafaga DS. Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization. Comput Mater Contin. 2023 Feb 1; 74(2): 2677–2693.
- Kumar G, Thakur K, Ayyagari MR. MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review. J Supercomput. 2020 Nov; 76(11): 8938–71.
- Tama BA, Nkenyereye L, Islam SR, Kwak KS. An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access. 2020 Feb 4; 8: 24120–34.

International Journal of Wireless Security and Networks
| Volume | 03 |
| Issue | 02 |
| Received | 24/03/2025 |
| Accepted | 11/07/2025 |
| Published | 09/09/2025 |
| Publication Time | 169 Days |
Login
PlumX Metrics