
www.rsisinternational.org
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XV, Issue IV, April 2026
CONCLUSION AND FUTURE SCOPE
A hybrid structure RF-PGNN that consists of Random Forest and a Graph Attention Network was suggested to
identify multi-class network intrusion in this work. The main novelty is in that a proximity graph is built based
on the leaf-assignment vectors of a trained Random Forest, thus converting the decision boundaries trained by the
forest into a relational model that a Graph Attention Network can utilize. The GAT learns sample based
dependencies that are on top of the feature based predictions of the RF. The RF-PGNN that optimises validation
with an ensemble weight of 0.9 yields accuracy and macro F1-score of 98.94 per cent and 0.9894 on a balanced
subset of the CIC-IDS2017 dataset. These scores surpass the RF base score (98.86%), and statistical test using
McNemar demonstrates that difference is significant (p = 0.023) and hypothesis that the difference is due to
chance is rejected. Further examination of the lower standalone accuracy (78.34) of the GAT shows that graph-
scale constraints, over-smoothing between two layers of message passing, and constraints of the proximity edges
in encoding directed flow semantics all limit the independent ability of the GAT. Notably, it is these properties
that lead to the signal of the GAT being orthogonal to the RF that is the key factor as to why the ensemble is
always superior to the model itself.
Further testing in a constrained imbalanced environment showed that RF-PGNN restores around 1.4 percentage
points of macro F1 on the minority attack classes as compared to a standard RF, which is the reviewer concern
that aggressive undersampling might not be reflective of real-world environments. The computational analysis
shows that the full pipeline can be realised in under 12 minutes using a single graphics card and graph construction
and GAT training represent the biggest part of this expense and can be further optimised with approximate nearest-
neighbour and locality-sensitive hashing techniques. RF-PGNN achieves competitive or better macro F1
compared to recent transformer-based intrusion detection models, without pre-training, and with the
interpretability of Random Forest feature importances, providing a practical benefit in deploying in resource-
constrained security settings.
Future research will be in three directions. First, scalability: the graph construction will be scaled to the whole
CIC-IDS2017 dataset (2.5 million samples) with approximate nearest-neighbour indexing and tree-subsampling
of RF proximities, to reach realistic run-time performance. Second, interpretability: the edge-level attention scores
will be calculated as an indication of the best sample that affects GAT decisions to provide security analysts with
intelligible evidence of correlated attack patterns across flows. Third, imbalance resistance: the framework will
be applied to highly imbalanced benchmarks with SMOTE-based oversampling and cost-sensitive loss functions,
compared systematically to FT-Transformer and TabNet to the original unbalanced CIC-IDS2017 distribution to
fully benchmark its operation. The fact that the framework can be applied to the online learning environment
where the emergent threats should be adaptively detected is an open direction as well.
REFERENCES
1. M. M. Alani, A. I. Awad, and E. Barka, “A Hybrid Ensemble Learning-Based Intrusion Detection System
for the Internet of Things,” Proceedings of the 2024 IEEE International Conference on Cyber Security
and Resilience, CSR 2024, pp. 1–8, 2024, doi: 10.1109/CSR61664.2024.10679427.
2. H. Asgharzadeh, A. Ghaffari, M. Masdari, and F. S. Gharehchopogh, “An Intrusion Detection System
on The Internet of Things Using Deep Learning and Multi-objective Enhanced Gorilla Troops
Optimizer,” Journal of Bionic Engineering 2024 21:5, vol. 21, no. 5, pp. 2658–2684, Jul. 2024, doi:
10.1007/s42235-024-00575-7.
3. A. Elmasry and W. Abdullah, “A CNN-RF Hybrid Model for Intrusion Detection System: Analysis,
Improvements, and Application,” Artificial Intelligence in Cybersecurity, vol. 1, pp. 12–20, Jan. 2024,
doi: 10.61356/j.aics.2024.1212.
4. F. S. Gharehchopogh, B. Abdollahzadeh, S. Barshandeh, and B. Arasteh, “A multi-objective mutation-
based dynamic Harris Hawks optimization for botnet detection in IoT,” Internet of Things, vol. 24, p.
100952, Dec. 2023, doi: 10.1016/j.iot.2023.100952.
5. Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and M. Sheikhan, “Flow-based anomaly detection
using neural network optimized with GSA algorithm,” Proc. Int. Conf. Distrib. Comput. Syst., pp. 76–
81, 2013, doi: 10.1109/ICDCSW.2013.40.