Bouke et al., 2024 - Google Patents
An empirical assessment of ML models for 5G network intrusion detection: A data leakage-free approachBouke et al., 2024
View HTML- Document ID
- 6159942329706758990
- Author
- Bouke M
- Abdullah A
- Publication year
- Publication venue
- e-Prime-Advances in Electrical Engineering, Electronics and Energy
External Links
Snippet
This paper thoroughly compares thirteen unique Machine Learning (ML) models utilized for Intrusion detection systems (IDS) in a meticulously controlled environment. Unlike previous studies, we introduce a novel approach that meticulously avoids data leakage, enhancing …
- 238000001514 detection method 0 title abstract description 97
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
- G06K9/6284—Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6288—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
- G06K9/6292—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Disha et al. | Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique | |
Geetha et al. | A review on the effectiveness of machine learning and deep learning algorithms for cyber security | |
Charmet et al. | Explainable artificial intelligence for cybersecurity: a literature survey | |
Naik et al. | The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review | |
Chapaneri et al. | A comprehensive survey of machine learning-based network intrusion detection | |
Chakir et al. | An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0 | |
Kheddar et al. | Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review | |
Imran et al. | A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems | |
Abirami et al. | Building an ensemble learning based algorithm for improving intrusion detection system | |
Sethi et al. | Robust adaptive cloud intrusion detection system using advanced deep reinforcement learning | |
Srinivas et al. | A novel machine learning inspired algorithm to predict real-time network intrusions | |
Kuppa et al. | Learn to adapt: Robust drift detection in security domain | |
Mishra | Blockchain and machine learning-based hybrid IDS to protect smart networks and preserve privacy | |
Khan et al. | Performance evaluation of advanced machine learning algorithms for network intrusion detection system | |
Bouke et al. | An empirical assessment of ML models for 5G network intrusion detection: A data leakage-free approach | |
El-Sofany et al. | Using machine learning algorithms to enhance IoT system security | |
Al Nuaimi et al. | A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset | |
Hossain et al. | Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity | |
Mahmood et al. | Optimizing Network Security with Machine Learning and Multi-Factor Authentication for Enhanced Intrusion Detection | |
Alshaeaa et al. | Developing a hybrid feature selection method to detect botnet attacks in IoT devices | |
Prabhakaran et al. | mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system | |
Meganathan et al. | Security establishment using deep convolutional network model in cyber-physical systems | |
Yang et al. | Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis | |
Al Hwaitat et al. | Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning. | |
Kumari et al. | Leveraging blockchain and machine learning to counter DDoS attacks over IoT network |