Table 7 SHAP and LIME percentage contributions for malicious node detection.

From: AI-Driven intrusion detection and prevention systems to safeguard 6G networks from cyber threats

Dataset

Top Feature 1 (SHAP and LIME %)

Top Feature 2 (SHAP and LIME %)

Top Feature 3 (SHAP and LIME %)

Top Feature 4 (SHAP and LIME %)

Top Feature 5 (SHAP and LIME %)

Malicious Node Likelihood (%)

CIDDS-001

Bytes (28%)

Flags (22%)

Src Port (18%)

Dest IP (17%)

Duration (15%)

82% (Brute Force/Malware)

KDD98

Protocol (25%)

Duration (23%)

Service (20%)

Src Bytes (17%)

Count (15%)

85% (Intrusion Detected)

CAIDA

Packets (30%)

Bytes (25%)

Src IP (20%)

Dest Port (15%)

Flags (10%)

88% (DDoS Attempt)

KYOTO

Duration (27%)

Src Port (25%)

ToS (18%)

Proto (16%)

Bytes (14%)

90% (Stealth DoS/Scan)