Ajou University repository

Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model
  • Iftikhar, Noveela ;
  • Rehman, Mujeeb Ur ;
  • Shah, Mumtaz Ali ;
  • Alenazi, Mohammed J.F. ;
  • Ali, Jehad
Citations

SCOPUS

4

Citation Export

Publication Year
2025-01-01
Journal
CMES - Computer Modeling in Engineering and Sciences
Publisher
Tech Science Press
Citation
CMES - Computer Modeling in Engineering and Sciences, Vol.143 No.1, pp.639-671
Keyword
dimensionality reductionInternet of ThingsIntrusion detectionself-organizing map
Mesh Keyword
Anomaly detection systemsClusteringsDenial of ServiceDimensionality reductionF1 scoresGradient boostingIntrusion-DetectionNSL-KDD datasetSecurity flawsSelf-organizing-maps
All Science Classification Codes (ASJC)
SoftwareModeling and SimulationComputer Science Applications
Abstract
Intrusion attempts against Internet of Things (IoT) devices have significantly increased in the last few years. These devices are now easy targets for hackers because of their built-in security flaws. Combining a Self-Organizing Map (SOM) hybrid anomaly detection system for dimensionality reduction with the inherited nature of clustering and Extreme Gradient Boosting (XGBoost) for multi-class classification can improve network traffic intrusion detection. The proposed model is evaluated on the NSL-KDD dataset. The hybrid approach outperforms the baseline line models, Multilayer perceptron model, and SOM-KNN (k-nearest neighbors) model in precision, recall, and F1-score, highlighting the proposed approach’s scalability, potential, adaptability, and real-world applicability. Therefore, this paper proposes a highly efficient deployment strategy for resource-constrained network edges. The results reveal that Precision, Recall, and F1-scores rise 10%–30% for the benign, probing, and Denial of Service (DoS) classes. In particular, the DoS, probe, and benign classes improved their F1-scores by 7.91%, 32.62%, and 12.45%, respectively.
ISSN
1526-1506
Language
eng
URI
https://aurora.ajou.ac.kr/handle/2018.oak/38268
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=105003220209&origin=inward
DOI
https://doi.org/10.32604/cmes.2025.062788
Journal URL
https://www.techscience.com/CMES/v143n1/60475
Type
Article
Funding
Authors are thankful for the support from Project number (RSPD2025R582), King Saud University, Riyadh, Saudi Arabia. The authors extend their appreciation to Researcher Supporting Project number (RSPD2025R582), King Saud University, Riyadh, Saudi Arabia.
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

JEHAD, ALI Image
JEHAD, ALIALI JEHAD
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.