Citation Export
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Iftikhar, Noveela | - |
| dc.contributor.author | Rehman, Mujeeb Ur | - |
| dc.contributor.author | Shah, Mumtaz Ali | - |
| dc.contributor.author | Alenazi, Mohammed J.F. | - |
| dc.contributor.author | Ali, Jehad | - |
| dc.date.issued | 2025-01-01 | - |
| dc.identifier.issn | 1526-1506 | - |
| dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/38268 | - |
| dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=105003220209&origin=inward | - |
| dc.description.abstract | Intrusion attempts against Internet of Things (IoT) devices have significantly increased in the last few years. These devices are now easy targets for hackers because of their built-in security flaws. Combining a Self-Organizing Map (SOM) hybrid anomaly detection system for dimensionality reduction with the inherited nature of clustering and Extreme Gradient Boosting (XGBoost) for multi-class classification can improve network traffic intrusion detection. The proposed model is evaluated on the NSL-KDD dataset. The hybrid approach outperforms the baseline line models, Multilayer perceptron model, and SOM-KNN (k-nearest neighbors) model in precision, recall, and F1-score, highlighting the proposed approach’s scalability, potential, adaptability, and real-world applicability. Therefore, this paper proposes a highly efficient deployment strategy for resource-constrained network edges. The results reveal that Precision, Recall, and F1-scores rise 10%–30% for the benign, probing, and Denial of Service (DoS) classes. In particular, the DoS, probe, and benign classes improved their F1-scores by 7.91%, 32.62%, and 12.45%, respectively. | - |
| dc.description.sponsorship | Authors are thankful for the support from Project number (RSPD2025R582), King Saud University, Riyadh, Saudi Arabia. The authors extend their appreciation to Researcher Supporting Project number (RSPD2025R582), King Saud University, Riyadh, Saudi Arabia. | - |
| dc.language.iso | eng | - |
| dc.publisher | Tech Science Press | - |
| dc.subject.mesh | Anomaly detection systems | - |
| dc.subject.mesh | Clusterings | - |
| dc.subject.mesh | Denial of Service | - |
| dc.subject.mesh | Dimensionality reduction | - |
| dc.subject.mesh | F1 scores | - |
| dc.subject.mesh | Gradient boosting | - |
| dc.subject.mesh | Intrusion-Detection | - |
| dc.subject.mesh | NSL-KDD dataset | - |
| dc.subject.mesh | Security flaws | - |
| dc.subject.mesh | Self-organizing-maps | - |
| dc.title | Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model | - |
| dc.type | Article | - |
| dc.citation.endPage | 671 | - |
| dc.citation.number | 1 | - |
| dc.citation.startPage | 639 | - |
| dc.citation.title | CMES - Computer Modeling in Engineering and Sciences | - |
| dc.citation.volume | 143 | - |
| dc.identifier.bibliographicCitation | CMES - Computer Modeling in Engineering and Sciences, Vol.143 No.1, pp.639-671 | - |
| dc.identifier.doi | 10.32604/cmes.2025.062788 | - |
| dc.identifier.scopusid | 2-s2.0-105003220209 | - |
| dc.identifier.url | https://www.techscience.com/CMES/v143n1/60475 | - |
| dc.subject.keyword | dimensionality reduction | - |
| dc.subject.keyword | Internet of Things | - |
| dc.subject.keyword | Intrusion detection | - |
| dc.subject.keyword | self-organizing map | - |
| dc.type.other | Article | - |
| dc.identifier.pissn | 15261492 | - |
| dc.subject.subarea | Software | - |
| dc.subject.subarea | Modeling and Simulation | - |
| dc.subject.subarea | Computer Science Applications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.