Table 8 Security attack analysis against the proposed method.

From: AI-Driven intrusion detection and prevention systems to safeguard 6G networks from cyber threats

Attack Type

Dataset

Accuracy (No Defense)

Accuracy (With Proposed Technique Defense)

Backdoor

CIDDS-001

70

79.4

KDD98

74

81.3

CAIDA

80

86.4

KYOTO

71

87.6

Data Poisoning

CIDDS-001

73

85.4

KDD98

87

88.2

CAIDA

73

86.1

KYOTO

80

84.9

Model Evasion

CIDDS-001

89

89.4

KDD98

81

87.6

CAIDA

84

88.9

KYOTO

97

98.2