Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/26642
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOleiwi, HW-
dc.contributor.authorMhawi, DN-
dc.contributor.authorAl-Raweshidy, H-
dc.date.accessioned2023-06-13T07:19:29Z-
dc.date.available2023-01-28-
dc.date.available2023-06-13T07:19:29Z-
dc.date.issued2023-01-28-
dc.identifierORCID iDs: Haider W. Oleiwi https://orcid.org/0000-0001-8967-9037; Doaa N. Mhawi https://orcid.org/0000-0002-0892-8765; Hamed Al-Raweshidy https://orcid.org/0000-0002-3702-8192.-
dc.identifier643-
dc.identifier.citationOleiwi, H.W., Mhawi, D.N. and Al-Raweshidy, H. (2023) 'A Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication Networks', Electronics (Switzerland), 12 (3), 643, pp. 1 - 15. doi: 10.3390/electronics12030643.en_US
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/26642-
dc.descriptionData Availability Statement: NSL_KDD, and UNSW_NB15 Dataset free downloaded from the link: http://www.di.uniba.it/~andresini/datasets.html, accessed on 18 February 2022. CICIDS2017 Dataset free downloaded from the link: http://205.174.165.80/CICDataset/CIC-IDS-2017/Dataset/, accessed on 24 June 2022, and SCE_CIC_IDS18Dataset free downloaded from the link: https://www.unb.ca/cic/datasets/ids-2018.html, accessed on 12 January 2022.en_US
dc.description.abstractCopyright © 2023 by the authors. The rapid leap in wireless communication systems incorporated a plethora of new features and challenges that accompany the era of 6G and beyond being investigated and developed. Recently, machine learning techniques were widely deployed in many fields, especially wireless communications. It was used to improve network traffic performance regarding resource management, frequency spectrum optimization, latency, and security. The studies of modern wireless communications and anticipated features of ultra-densified ubiquitous wireless networks exposed a risky vulnerability and showed a necessity for developing a trustworthy intrusion detection system (IDS) with certain efficiency/standards that have not yet been achieved by current systems. IDSs lack acceptable immunity against repetitive, updatable, and intelligent attacks on wireless communication networks, significantly concerning the modern infrastructure of 6G communications, resulting in low accuracies/detection rates and high false-alarm/false-negative rates. For this objective principle, IDS system complexity was reduced by applying a unique meta-machine learning model for anomaly detection networks was developed in this paper. The five main stages of the proposed meta-model are as follows: the accumulated datasets (NSL KDD, UNSW NB15, CIC IDS17, and SCE CIC IDS18) comprise the initial stage. The second stage is preprocessing and feature selection, where preprocessing involves replacing missing values and eliminating duplicate values, leading to dimensionality minimization. The best-affected subset feature from datasets is selected using feature selection (i.e., Chi-Square). The third step is represented by the meta-model. In the training dataset, many classifiers are utilized (i.e., random forest, AdaBoosting, GradientBoost, XGBoost, CATBoost, and LightGBM). All the classifiers undergo the meta-model classifier (i.e., decision tree as the voting technique classifier) to select the best-predicted result. Finally, the classification and evaluation stage involves the experimental results of testing the meta-model on different datasets using binary-class and multi-class forms for classification. The results proved the proposed work’s high efficiency and outperformance compared to existing IDSs.en_US
dc.description.sponsorshipThis research received no external funding.en_US
dc.format.extent1 - 15-
dc.languageEnglish-
dc.language.isoen_USen_US
dc.publisherMDPIen_US
dc.rightsCopyright © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).-
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/-
dc.subject6G wireless communicationsen_US
dc.subjectchi-squareen_US
dc.subjectcybersecurityen_US
dc.subjectintrusion detection systemen_US
dc.subjectmachine learning techniquesen_US
dc.subjectmeta-modelen_US
dc.subjectstacking ensemble learningen_US
dc.subjectvoting techniquesen_US
dc.titleA Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication Networksen_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.3390/electronics12030643-
dc.relation.isPartOfElectronics (Switzerland)-
pubs.issue3-
pubs.publication-statusPublished-
pubs.volume12-
dc.identifier.eissn2079-9292-
dc.rights.holderThe authors-
Appears in Collections:Dept of Electronic and Electrical Engineering Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).3.08 MBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons