An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). Data leakage, also known as pattern leakage, occurs during data preprocessing when information from the testing set is used in tr...
| Main Authors: | Bouke, Mohamed Aly, Abdullah, Azizol |
|---|---|
| Format: | Article |
| Published: |
Elsevier B.V.
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/106552/ |
Similar Items
An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review
by: Abdullah, Azizol, et al.
Published: (2024)
by: Abdullah, Azizol, et al.
Published: (2024)
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
by: Bouke, Mohamed Aly, et al.
Published: (2022)
by: Bouke, Mohamed Aly, et al.
Published: (2022)
Credit Card Fraud Detection Using New Preprocessing And Hybrid Machine Learning Techniques
by: Gasim, Esraa Faisal Malik
Published: (2023)
by: Gasim, Esraa Faisal Malik
Published: (2023)
Preprocessing of fundus images for detection of diabetic retinopathy
by: Abd Aziz, Nurhakimah, et al.
Published: (2021)
by: Abd Aziz, Nurhakimah, et al.
Published: (2021)
Leakage detection in pipelines using empirical mode decomposition
by: Mohd Erman Fairuz, Zaidi
Published: (2013)
by: Mohd Erman Fairuz, Zaidi
Published: (2013)
An intrusion detection system for the internet of things based on machine learning: review and challenges
by: Adnan, Ahmed, et al.
Published: (2021)
by: Adnan, Ahmed, et al.
Published: (2021)
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
SMRD: a novel cyber warfare modeling framework for Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service based on a system of nonlinear differential equations
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Intrusion detection system (IDS) using machine learning
by: Tan, May May
Published: (2024)
by: Tan, May May
Published: (2024)
Leakage during seed imbibition
by: Simon, E. W., et al.
Published: (1972)
by: Simon, E. W., et al.
Published: (1972)
A novel approach for handling missing data to enhance network intrusion detection system
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Human posture recognition preprocessing techniques
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Preprocessing method for assistive listening system
by: Muhammad Nur Adri, Nawi
Published: (2021)
by: Muhammad Nur Adri, Nawi
Published: (2021)
Towards preprocessing on criminal chatting corpus.
by: Marjuni, Siti Hanom, et al.
Published: (2009)
by: Marjuni, Siti Hanom, et al.
Published: (2009)
Preprocessing method for assistive listening system
by: Muhammad Nur Adri, Nawi
Published: (2021)
by: Muhammad Nur Adri, Nawi
Published: (2021)
The effect of data preprocessing on the performance of artificial neural networks techniques for classification problems
by: Atomi, Walid Hasen
Published: (2012)
by: Atomi, Walid Hasen
Published: (2012)
Leakage Detection in Galvanized Iron Pipelines using Ensemble Empirical Mode Decomposition Analysis
by: Makeen, Mohd Amin, et al.
Published: (2015)
by: Makeen, Mohd Amin, et al.
Published: (2015)
The minimal preprocessing pipelines for the Human Connectome Project
by: Glasser, Matthew F., et al.
Published: (2013)
by: Glasser, Matthew F., et al.
Published: (2013)
Preprocessing Noise Reduction For Assistive Listening System
by: Nurul, Md Yunus, et al.
Published: (2021)
by: Nurul, Md Yunus, et al.
Published: (2021)
Preprocessing And Clustering Short Time-Series Microarray
by: Loh, Wei Ping
Published: (2008)
by: Loh, Wei Ping
Published: (2008)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
Cosmogenic radionuclide beryllium-7 skewed data preprocessing for Northeast Monsoon forecasting in Malaysia
by: Saaidi Ismail,, et al.
Published: (2024)
by: Saaidi Ismail,, et al.
Published: (2024)
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
by: Dalatu, Paul Inuwa
Published: (2018)
by: Dalatu, Paul Inuwa
Published: (2018)
IoT intrusion detection using auto-encoder and machine learning techniques
by: Khudhu, Ahmed Ridha, et al.
Published: (2022)
by: Khudhu, Ahmed Ridha, et al.
Published: (2022)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Preprocessing of fingerprint images captured with a digital camera
by: Hiew,, B. Y, et al.
Published: (2006)
by: Hiew,, B. Y, et al.
Published: (2006)
Wavelet based illumination invariant preprocessing in face recognition
by: Y. Z., Goh, et al.
Published: (2008)
by: Y. Z., Goh, et al.
Published: (2008)
Human posture recognition database and preprocessing simulation results
by: Htike, Kyaw Kyaw, et al.
Published: (2011)
by: Htike, Kyaw Kyaw, et al.
Published: (2011)
Preprocessing And Pretraining Of Multilayer Feed Forward Neural Network
by: Asadi, Roya
Published: (2009)
by: Asadi, Roya
Published: (2009)
Gonad ultrasonography image preprocessing for Mahseer (Tor Tombroides)
by: Abd Razak, Nurul Asmaa, et al.
Published: (2017)
by: Abd Razak, Nurul Asmaa, et al.
Published: (2017)
Leakage Detection in Galvanized Iron (GI) Pipelines Using
Ensemble Empirical Mode Decomposition Analysis (EEMD)
by: Makeen, Mohd Amin, et al.
Published: (2014)
by: Makeen, Mohd Amin, et al.
Published: (2014)
Supervised optimal decision machine learning approach to class- and method-level data preprocessing towards effective software defect prediction / Ebubeogu Amarachukwu Felix
by: Ebubeogu Amarachukwu , Felix
Published: (2020)
by: Ebubeogu Amarachukwu , Felix
Published: (2020)
Intrusion detection system with data mining approach: a review
by: Khalilian, Majdid, et al.
Published: (2011)
by: Khalilian, Majdid, et al.
Published: (2011)
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
by: Dehkordi, Iman Farhadian, et al.
Published: (2023)
by: Dehkordi, Iman Farhadian, et al.
Published: (2023)
A survey on supervised machine learning in intrusion detection systems for Internet of Things
by: Shakirah, Saidin, et al.
Published: (2023)
by: Shakirah, Saidin, et al.
Published: (2023)
Performance evaluation for different intrusion detection system algorithms using machine learning
by: Zarir, Mustafa Nadhim
Published: (2018)
by: Zarir, Mustafa Nadhim
Published: (2018)
Similar Items
-
An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
by: Bouke, Mohamed Aly, et al.
Published: (2024) -
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
by: Bouke, Mohamed Aly, et al.
Published: (2024) -
Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review
by: Abdullah, Azizol, et al.
Published: (2024) -
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
by: Bouke, Mohamed Aly, et al.
Published: (2024) -
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
by: Bouke, Mohamed Aly, et al.
Published: (2022)