Ajou University repository

Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model
  • Iftikhar, Noveela ;
  • Rehman, Mujeeb Ur ;
  • Shah, Mumtaz Ali ;
  • Alenazi, Mohammed J.F. ;
  • Ali, Jehad
Citations

SCOPUS

4

Citation Export

DC Field Value Language
dc.contributor.authorIftikhar, Noveela-
dc.contributor.authorRehman, Mujeeb Ur-
dc.contributor.authorShah, Mumtaz Ali-
dc.contributor.authorAlenazi, Mohammed J.F.-
dc.contributor.authorAli, Jehad-
dc.date.issued2025-01-01-
dc.identifier.issn1526-1506-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/38268-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=105003220209&origin=inward-
dc.description.abstractIntrusion attempts against Internet of Things (IoT) devices have significantly increased in the last few years. These devices are now easy targets for hackers because of their built-in security flaws. Combining a Self-Organizing Map (SOM) hybrid anomaly detection system for dimensionality reduction with the inherited nature of clustering and Extreme Gradient Boosting (XGBoost) for multi-class classification can improve network traffic intrusion detection. The proposed model is evaluated on the NSL-KDD dataset. The hybrid approach outperforms the baseline line models, Multilayer perceptron model, and SOM-KNN (k-nearest neighbors) model in precision, recall, and F1-score, highlighting the proposed approach’s scalability, potential, adaptability, and real-world applicability. Therefore, this paper proposes a highly efficient deployment strategy for resource-constrained network edges. The results reveal that Precision, Recall, and F1-scores rise 10%–30% for the benign, probing, and Denial of Service (DoS) classes. In particular, the DoS, probe, and benign classes improved their F1-scores by 7.91%, 32.62%, and 12.45%, respectively.-
dc.description.sponsorshipAuthors are thankful for the support from Project number (RSPD2025R582), King Saud University, Riyadh, Saudi Arabia. The authors extend their appreciation to Researcher Supporting Project number (RSPD2025R582), King Saud University, Riyadh, Saudi Arabia.-
dc.language.isoeng-
dc.publisherTech Science Press-
dc.subject.meshAnomaly detection systems-
dc.subject.meshClusterings-
dc.subject.meshDenial of Service-
dc.subject.meshDimensionality reduction-
dc.subject.meshF1 scores-
dc.subject.meshGradient boosting-
dc.subject.meshIntrusion-Detection-
dc.subject.meshNSL-KDD dataset-
dc.subject.meshSecurity flaws-
dc.subject.meshSelf-organizing-maps-
dc.titleIntrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model-
dc.typeArticle-
dc.citation.endPage671-
dc.citation.number1-
dc.citation.startPage639-
dc.citation.titleCMES - Computer Modeling in Engineering and Sciences-
dc.citation.volume143-
dc.identifier.bibliographicCitationCMES - Computer Modeling in Engineering and Sciences, Vol.143 No.1, pp.639-671-
dc.identifier.doi10.32604/cmes.2025.062788-
dc.identifier.scopusid2-s2.0-105003220209-
dc.identifier.urlhttps://www.techscience.com/CMES/v143n1/60475-
dc.subject.keyworddimensionality reduction-
dc.subject.keywordInternet of Things-
dc.subject.keywordIntrusion detection-
dc.subject.keywordself-organizing map-
dc.type.otherArticle-
dc.identifier.pissn15261492-
dc.subject.subareaSoftware-
dc.subject.subareaModeling and Simulation-
dc.subject.subareaComputer Science Applications-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

JEHAD, ALI Image
JEHAD, ALIALI JEHAD
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.