Table 7 SHAP and LIME percentage contributions for malicious node detection.
From: AI-Driven intrusion detection and prevention systems to safeguard 6G networks from cyber threats
Dataset | Top Feature 1 (SHAP and LIME %) | Top Feature 2 (SHAP and LIME %) | Top Feature 3 (SHAP and LIME %) | Top Feature 4 (SHAP and LIME %) | Top Feature 5 (SHAP and LIME %) | Malicious Node Likelihood (%) |
|---|---|---|---|---|---|---|
CIDDS-001 | Bytes (28%) | Flags (22%) | Src Port (18%) | Dest IP (17%) | Duration (15%) | 82% (Brute Force/Malware) |
KDD98 | Protocol (25%) | Duration (23%) | Service (20%) | Src Bytes (17%) | Count (15%) | 85% (Intrusion Detected) |
CAIDA | Packets (30%) | Bytes (25%) | Src IP (20%) | Dest Port (15%) | Flags (10%) | 88% (DDoS Attempt) |
KYOTO | Duration (27%) | Src Port (25%) | ToS (18%) | Proto (16%) | Bytes (14%) | 90% (Stealth DoS/Scan) |