UPM Institutional Repository

An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach


Citation

Bouke, Mohamed Aly and Abdullah, Azizol (2024) An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach. e-Prime - Advances in Electrical Engineering, Electronics and Energy, 8. art. no. 100590. pp. 1-12. ISSN 2772-6711; eISSN: 2772-6711

Abstract

This paper thoroughly compares thirteen unique Machine Learning (ML) models utilized for Intrusion detection systems (IDS) in a meticulously controlled environment. Unlike previous studies, we introduce a novel approach that meticulously avoids data leakage, enhancing the reliability of our findings. The study draws upon a comprehensively labeled 5G-NIDD dataset covering a broad spectrum of network behaviors, from benign real-user traffic to various attack scenarios. Our data preprocessing and experimental design have been carefully structured to eradicate any data leakage, a standout feature of our methodology that significantly improves the robustness and dependability of our results compared to prior studies. The ML models are evaluated using various performance metrics, including accuracy, precision, recall, F1-score, ROC AUC, and execution time. Our results reveal that the K-Nearest Neighbors model is superior in accuracy and ROC AUC, while the Voting Classifier stands out in precision and F1-score. Decision Tree, Bagging, and Extra Trees models exhibit strong recall scores. In contrast, the AdaBoost model falls short across all assessed metrics. Despite displaying only modest performance on other metrics, the Naive Bayes model excels in computational efficiency, offering the quickest execution time. This paper emphasizes the importance of understanding various ML models' distinct strengths, drawbacks, and trade-offs for network intrusion detection. It highlights that no single model is universally superior, and the choice hinges on the nature of the dataset, specific application requirements, and the computational resources available.


Download File

[img] Text
113366.pdf - Published Version
Available under License Creative Commons Attribution.

Download (2MB)

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
DOI Number: https://doi.org/10.1016/j.prime.2024.100590
Publisher: Elsevier
Keywords: Computational efficiency; Machine learning models; Network intrusion detection; Security; Wireless networks
Depositing User: Mr. Mohamad Syahrul Nizam Md Ishak
Date Deposited: 22 Nov 2024 02:59
Last Modified: 22 Nov 2024 02:59
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.1016/j.prime.2024.100590
URI: http://psasir.upm.edu.my/id/eprint/113366
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item