and log loss. The outcomes demonstrated that, for all attack types, the RF algorithm performed better in binary
classification than the other algorithms (Churcher et al., 2021). A comparative study was made among some
supervised machine learning models after implementation. The approaches based on machine learning (ML)
were effective in detecting intrusions with NSL-KDD CUP dataset and three individual models; CART, MLR
and KNN were validated. Furthermore, evaluation shows that KNN was the most effective and has the highest
accuracy of 99.38% (Okewale, Idowu, Alobalorun, & Alabi, 2023).
TON-IoT dataset was analyzed and developed four supervised machine learning intrusion detection techniques
in addition to a Stack Classifier. Numerical equivalents for categorical variables are converted, and missing values
are addressed. Metrics like recall, accuracy, precision, and F1-score are used to evaluate their effectiveness,
resulting in the identification of the best classifier for further examination. Each model adds a distinct advantage
to the ensemble model (Almotairi, Atawneh, Khasha & Khafajah, 2024) The inclusion of these conventional
models in the ensemble guaranteed and improved the ensemble approach's clarity for better intrusion detection.
Five Ensemble Learning models were developed and assessed with Boosting, Stacking, and voting mechanism
on a patient dataset that produced 24 predictors and a binary outcome; all sets were unbalanced with respect to
the number of alive and deceased patients, even though the models overestimate mortality risk and have
insufficient calibration (P > 0.05) (Rahmatinejad et al, 2024). Stacking also showed relatively good agreement
between predicted and actual mortality.
An ensemble learning frame work for Intrusion detection classification was proposed using voting and stacking
approaches for LR, DT, RF and KNN classifiers using Chi-square technique for feature selection for ToN-IoT
datasets. Though the stack ensemble approach outperformed the voting technique due to the meta classification
at a higher computational time (Alotaibi & Mohammad 2023).
A network intrusion detection system is introduced, employing feature selection through a hybrid of the Whale
Optimization Algorithm (WOA) and Genetic Algorithm (GA) along with sample-based classification. Utilizing
the KDDCUP1999 dataset, this study captures the characteristics of both healthy and malicious nodes based on
network attack types. The proposed method, combining WOA and GA-based feature selection with KNN
classification and evaluated based on accuracy criteria, outperforms prior approaches. This suggests the effective
extraction of class label-related features by the Whale Optimization Algorithm and Genetic Algorithm (Abualhaj
et al.,2025; Mojtahedi et al., 2022).
In order to facilitate computation, RNS depicts a large integer using a set of smaller integers. Its operation is
based on the forward conversion, a mathematical concept from the 4th century by Sun Tsu Suan-Ching (Danial,
moduli, also known as the set
Mohammad & Amer, 2024; Idowu, Asaju-Gbolagade, & Gbolagade,2024). The
of n integer constants {m , m , m , ..., m }, are used to explain RNS. Let M represent the least frequent number
1
2
3
n
among all the m , as described in the residue numeral system, any arbitrary number X lower than M can be
i
represented as a set of N smaller integers, {x , x , x , ..., x } with x = X designating the residue class
1 2 3 of X to
n
i
that modulus. However, the moduli must be efficient for representation and no modulus should have a common
factor with any other. Consequently, M is the sum of all the mi, the following factors must be taken into
consideration when implementing a RNS system (Torabi, & Barzegaran 2023; Sivagaminathan, Sharma &
Henge, 2023).
METHODOLOGY
To enhance the efficacy of network intrusion detection, we explored the application of hybrid Particle Swarm
Optimization (PSO-RNS). In order to increase power consumption and further improve time complexity, the
RNS effectively reduces datasets by turning large weighted numbers into several units called residues, because
RNS offers effective, highly parallelizable arithmetic operations, researchers working with computationally
4
demanding applications will find it interesting. In order to decrease over fitness and improve classification
accuracy while cutting down on training time, the Residue Number System was utilized to further extract
features from the dataset utilizing moduli set of {2(n+1) - 1, 2(n) - 1, 2(n)} following the optimal selection
of the best data subset. This is done in order to decrease over fitness and improve classification accuracy while
decreasing training time.
Page 4043