Table 8 Security attack analysis against the proposed method.
From: AI-Driven intrusion detection and prevention systems to safeguard 6G networks from cyber threats
Attack Type | Dataset | Accuracy (No Defense) | Accuracy (With Proposed Technique Defense) |
|---|---|---|---|
Backdoor | CIDDS-001 | 70 | 79.4 |
KDD98 | 74 | 81.3 | |
CAIDA | 80 | 86.4 | |
KYOTO | 71 | 87.6 | |
Data Poisoning | CIDDS-001 | 73 | 85.4 |
KDD98 | 87 | 88.2 | |
CAIDA | 73 | 86.1 | |
KYOTO | 80 | 84.9 | |
Model Evasion | CIDDS-001 | 89 | 89.4 |
KDD98 | 81 | 87.6 | |
CAIDA | 84 | 88.9 | |
KYOTO | 97 | 98.2 |