An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
This paper thoroughly compares thirteen unique Machine Learning (ML) models utilized for Intrusion detection systems (IDS) in a meticulously controlled environment. Unlike previous studies, we introduce a novel approach that meticulously avoids data leakage, enhancing the reliability of our findings...
| Main Authors: | Bouke, Mohamed Aly, Abdullah, Azizol |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/113366/ http://psasir.upm.edu.my/id/eprint/113366/1/113366.pdf |
Similar Items
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review
by: Abdullah, Azizol, et al.
Published: (2024)
by: Abdullah, Azizol, et al.
Published: (2024)
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
by: Dehkordi, Iman Farhadian, et al.
Published: (2023)
by: Dehkordi, Iman Farhadian, et al.
Published: (2023)
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
by: Bouke, Mohamed Aly, et al.
Published: (2022)
by: Bouke, Mohamed Aly, et al.
Published: (2022)
A novel approach for handling missing data to enhance network intrusion detection system
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Leakage detection in pipelines using empirical mode decomposition
by: Mohd Erman Fairuz, Zaidi
Published: (2013)
by: Mohd Erman Fairuz, Zaidi
Published: (2013)
ML restructuring workshop
by: Wan Jumani, Fauzi
Published: (2012)
by: Wan Jumani, Fauzi
Published: (2012)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
SMRD: a novel cyber warfare modeling framework for Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service based on a system of nonlinear differential equations
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Network intrusion detection and alert system
by: To, Jin Yi
Published: (2024)
by: To, Jin Yi
Published: (2024)
A study on analysis of fetal heart rate abnormalities comparing epidural analgesia ropivacaine 0.2% plus fentanyl 2 μg/ml with bupivacaine 0.1% plus fentanyl 2 μg/ml during labour
by: Angeline Peter, Mary
Published: (2014)
by: Angeline Peter, Mary
Published: (2014)
MlNED LAND REHABILITATION - IS IT SUSTAINABLE?
by: Collins, B.
Published: (1984)
by: Collins, B.
Published: (1984)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
An intrusion detection system (IDS) for internet network
by: Safiee, Mohd. Fauzan
Published: (2007)
by: Safiee, Mohd. Fauzan
Published: (2007)
Leakage Detection in Galvanized Iron Pipelines using Ensemble Empirical Mode Decomposition Analysis
by: Makeen, Mohd Amin, et al.
Published: (2015)
by: Makeen, Mohd Amin, et al.
Published: (2015)
A review on water leakage detection method in the water distribution network
by: Al Qahtani, Turki, et al.
Published: (2020)
by: Al Qahtani, Turki, et al.
Published: (2020)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Deployments Scenarios of 5G Networks
by: Oudah, Ali A.
Published: (2017)
by: Oudah, Ali A.
Published: (2017)
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
Energy-efficient intrusion detection in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2012)
by: Salehian, Solmaz, et al.
Published: (2012)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Implementing Smart College Chatbot using Ml And Python
by: Sangamesh, R.K., et al.
Published: (2024)
by: Sangamesh, R.K., et al.
Published: (2024)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Mitigating Unbalanced And Overlapped Problems Of Large Network Intrusion Data Using Multiplelevel Detection Techniques
by: Ho, Yan Bing
Published: (2022)
by: Ho, Yan Bing
Published: (2022)
Network intrusions classification using data mining approaches
by: Slamet, Slamet, et al.
Published: (2021)
by: Slamet, Slamet, et al.
Published: (2021)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Leakage Detection in Galvanized Iron (GI) Pipelines Using
Ensemble Empirical Mode Decomposition Analysis (EEMD)
by: Makeen, Mohd Amin, et al.
Published: (2014)
by: Makeen, Mohd Amin, et al.
Published: (2014)
Intrusion detection system with data mining approach: a review
by: Khalilian, Majdid, et al.
Published: (2011)
by: Khalilian, Majdid, et al.
Published: (2011)
Development of a technique for real-time leakage detection and location in water distribution networks
by: Aburawe, Salah Muamer
Published: (2014)
by: Aburawe, Salah Muamer
Published: (2014)
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009)
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)
by: Ahmad, Iftikhar
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Similar Items
-
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
by: Bouke, Mohamed Aly, et al.
Published: (2023) -
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
by: Bouke, Mohamed Aly, et al.
Published: (2024) -
Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review
by: Abdullah, Azizol, et al.
Published: (2024) -
Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review
by: Dehkordi, Iman Farhadian, et al.
Published: (2023) -
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
by: Bouke, Mohamed Aly, et al.
Published: (2024)