﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle>
      <ISSN>2322-1437</ISSN>
      <Volume>13</Volume>
      <Issue>52</Issue>
      <PubDate PubStatus="epublish">
        <Year>2026</Year>
        <Month>2</Month>
        <Day>3</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>A Comprehensive Framework for Enhancing Intrusion Detection Systems through Advanced Analytical Techniques</ArticleTitle>
    <VernacularTitle>A Comprehensive Framework for Enhancing Intrusion Detection Systems through Advanced Analytical Techniques</VernacularTitle>
    <FirstPage>289</FirstPage>
    <LastPage>299</LastPage>
    <ELocationID EIdType="doi">10.66224/jist.49054.13.52.289</ELocationID>
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Chetan</FirstName>
        <LastName>Gupta</LastName>
        <Affiliation>Jaypee University of Engineering and Technology, Guna, India</Affiliation>
      </Author>
      <Author>
        <FirstName>Amit</FirstName>
        <LastName>Kumar</LastName>
        <Affiliation>Jaypee University of Engineering and Technology, Guna, India</Affiliation>
      </Author>
      <Author>
        <FirstName>Neelesh Kumar</FirstName>
        <LastName>Jain</LastName>
        <Affiliation>Jaypee University of Engineering and Technology, Guna, India</Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2025</Year>
      <Month>1</Month>
      <Day>1</Day>
    </History>
    <Abstract>&lt;p&gt;Intrusion detection systems (IDS) are security technologies that monitor system activity, network traffic, and settings to detect potential threats. IDS provide proactive security management, detecting anomalies and ensuring continuous monitoring. It protects critical assets, such as sensitive data and intellectual property, from unauthorized access or data breaches, preventing downtime and disruption to business operations. In this paper we present a hybrid model based on Principal Component Analysis (PCA) and XGBoost algorithms. To show the effectiveness of the proposed system, various parameters are evaluated on the standard NSL-KDD dataset. First we trained the model using trained dataset and then evaluate the performance the model using testing dataset. In proposed work the we store the data into two-dimensional structure then we standardized and take a most significance features of the data then calculate the covariance matrix, after that calculate the eigenvalues and eigenvectors of the matrix and short in the descending order and using principal component identify the new features and remove the insignificant features. The proposed model outperforms and produces 97.76% accuracy and 94.51% precision; the recall rate is 93.44% and 93.97% F1-Score, which is much better than the previous proposed models. This hybrid approach is better to handle the categorical data and able to find the pattern well and the outcome of the model clearly shows the effectiveness of the proposed system.&lt;/p&gt;</Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">IDS</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">DOS</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">XGBOOST</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">PCA</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">HIDS</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">NIDS</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/49054</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>