{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:37:35Z","timestamp":1771519055780,"version":"3.50.1"},"reference-count":84,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"AI-NET-ANTILLAS project"},{"name":"Business Finland"},{"name":"ERCIM"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network"],"abstract":"<jats:p>Machine learning (ML) promises advances in automation and threat detection for the future generations of communication networks. However, new threats are introduced, as adversaries target ML systems with malicious data. Adversarial attacks on tree-based ML models involve crafting input perturbations that exploit non-smooth decision boundaries, causing misclassifications. These so-called evasion attacks are imperceptible, as they do not significantly alter the input data distribution and have been shown to degrade the performance of tree-based models across various tasks. Adversarial training and genetic algorithms have been proposed as potential defenses against these attacks. In this paper, we explore the robustness of tree-based models for network intrusion detection systems. This study evaluates an optimization approach inspired by genetic algorithms to generate adversarial samples and studies the impact of adversarial training on the accuracy of attack detection. This paper exposed random forest and extreme gradient boosting classifiers to various adversarial samples generated from communication network-related CIC-IDS2019 and 5G-NIDD datasets. The results indicate that the improvements of robustness to adversarial attacks come with a cost to the accuracy of the network intrusion detection models. These costs can be optimized with intelligent, use case-specific feature engineering.<\/jats:p>","DOI":"10.3390\/network5010006","type":"journal-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T11:31:17Z","timestamp":1739791877000},"page":"6","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["GAOR: Genetic Algorithm-Based Optimization for Machine Learning Robustness in Communication Networks"],"prefix":"10.3390","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2182-1505","authenticated-orcid":false,"given":"Aderonke","family":"Thompson","sequence":"first","affiliation":[{"name":"VTT Technical Research Centre of Finland, 02044 Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7921-8667","authenticated-orcid":false,"given":"Jani","family":"Suomalainen","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland, 02044 Espoo, Finland"}]}],"member":"1968","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"ref_1","first-page":"18","article-title":"Causal Interpretability for ML\u2014Problems, Methods, and Evaluation","volume":"22","author":"Moraffah","year":"2020","journal-title":"ACM Spec. Interest Group Knowl. Discov. Data"},{"key":"ref_2","unstructured":"(2025, February 01). EU AI Act. Available online: https:\/\/artificialintelligenceact.eu\/."},{"key":"ref_3","unstructured":"Mucs\u00e1nyi, B., Kirchhof, M., Nguyen, E., Rubinstein, A., and Joon Oh, S. (2023). Trustworthy Machine Learning. Theory, Applications, Intuitions. arXiv."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MS.2024.3414317","article-title":"ML Lineage for trustworthy ML systems","volume":"42","author":"Raatikainen","year":"2024","journal-title":"IEEE Softw."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Toreini, E., Aitken, M., Coopamootoo, K., Elliott, K., Zelaya, C.G., and Van Moorsel, A. (2020, January 27\u201330). The relationship between trust in AI and trustworthy ML technologies. Proceedings of the Conference on Fairness, Accountability, and Transparency 2020, New York, NY, USA.","DOI":"10.1145\/3351095.3372834"},{"key":"ref_6","first-page":"1","article-title":"Trustworthy AI: A Computational Perspective","volume":"14","author":"Liu","year":"2022","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_7","unstructured":"Xu, F., Uszkoreit, H., Du, Y., Fan, W., Zhao, D., and Zhu, J. (2019, January 9\u201314). Explainable AI: A brief survey on history, research areas, approaches and challenges. Proceedings of the Natural Language Processing and Chinese Computing: 8th cCF International Conference, NLPCC 2019, Dunhuang, China. Proceedings, Part II 8."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3197","DOI":"10.1007\/s10115-022-01756-8","article-title":"Interpretable deep learning: Interpretation, interpretability, trustworthiness, and beyond","volume":"64","author":"Li","year":"2022","journal-title":"Knowl. Inf. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., and Guestrin, C. (2016). \u201cWhy Should I Trust You?\u201d: Explaining the Predictions of Any Classifier. arXiv.","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref_10","first-page":"13","article-title":"A Survey on Model Robustness under Adversarial Example","volume":"5","author":"Wang","year":"2020","journal-title":"J. Inf. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Huster, T., Chiang, C.-Y.J., Chadha, R., and Swami, A. (2018, January 29\u201331). Towards the Development of Robust Deep Neural Networks in Adversarial Settings. Proceedings of the Military Communications Conference, Los Angeles, CA, USA.","DOI":"10.1109\/MILCOM.2018.8599814"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Dang, L., Hapuarachchi, T., Xiong, K.Y., and Li, J. (2023, January 24\u201327). Improving Machine Learning Robustness via Adversarial Training. Proceedings of the 2023 32nd International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA.","DOI":"10.1109\/ICCCN58024.2023.10230138"},{"key":"ref_13","unstructured":"Kurochkin, A., Misko, O., Onyshchak, O., Veseliak, V., Nair, B., Katz, R., Himmelfarb, J., Bansal, N., and Lee, S.-I. (2019). Fairness audit for Random Forest model. Ukr. Cathol. Univ. Tech. Rep."},{"key":"ref_14","first-page":"103121","article-title":"Towards a robust and trustworthy ML system development: An engineering perspective","volume":"65","author":"Xiong","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_15","unstructured":"Chen, H., Zhang, H., Boning, D., and Hsieh, C.-J. (2019, January 9\u201315). Robust Decision Trees Against Adversarial Examples. Proceedings of the 36th International Conference on ML, Long Beach, CA, USA. Available online: https:\/\/proceedings.mlr.press\/v97\/chen19m.html."},{"key":"ref_16","unstructured":"Chen, Y., Wang, S., Jiang, W., Cidon, A., and Jana, S. (2021, January 11\u201313). Cost-aware robust tree ensembles for security applications. Proceedings of the 30th USENIX Security Symposium, Online. Available online: https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/chen-yizheng."},{"key":"ref_17","unstructured":"Moshkovitz, M., Yang, Y.-Y., and Chaudhuri, K. (2021). Connecting Interpretability and Robustness in Decision Trees through Separation. arXiv."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"22359","DOI":"10.1109\/ACCESS.2022.3151670","article-title":"Differential Privacy for Deep and Federated Learning: A Survey","volume":"10","author":"Ouadrhiri","year":"2022","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hossain, T., Islam, S., Badsha, S., and Shen, H. (2021). DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning. Cryptography and Security. arXiv.","DOI":"10.1109\/MSN53354.2021.00038"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Wang, W., Xu, H., Wan, Y., Ren, J., and Tang, J. (2022, January 14\u201318). Towards Adversarial Learning: From Evasion Attacks to Poisoning Attacks. Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD\u201922), New York, NY, USA.","DOI":"10.1145\/3534678.3542608"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Wei, K., Li, J., Ma, C., Ding, M., and Poor, H.V. (2021). Differentially Private Federated Learning: Algorithm, Analysis and Optimization, Springer.","DOI":"10.1007\/978-3-030-70604-3_3"},{"key":"ref_22","unstructured":"Dutta, S., Long, J., Mishra, S., Tilli, C., and Magazzeni, D. (2022, January 17\u201323). Robust Counterfactual Explanations for Tree-Based Ensembles. Proceedings of the 39th International Conference on Machine Learning, Baltimore, MD, USA. Available online: https:\/\/proceedings.mlr.press\/v162\/dutta22a.html."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ranzato, F., and Zanella, M. (2021, January 10\u201314). Genetic adversarial training of decision trees. Proceedings of the Genetic and Evolutionary Computation Conference, Lille, France.","DOI":"10.1145\/3449639.3459286"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Wu, C., Luo, W., Zhou, N., Xu, P., and Zhu, T. (July, January 28). Genetic algorithm with multiple fitness functions for generating adversarial examples. Proceedings of the 2021 IEEE Congress on Evolutionary Computation (CEC), Krak\u00f3w, Poland.","DOI":"10.1109\/CEC45853.2021.9504790"},{"key":"ref_25","unstructured":"(2025, February 01). Adversarial Robustness Toolbox. art.attacks.evasion. Available online: https:\/\/adversarial-robustness-toolbox.readthedocs.io\/en\/latest\/modules\/attacks\/evasion.html."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"107311","DOI":"10.1016\/j.asoc.2021.107311","article-title":"Robustness analysis of classical and fuzzy decision trees under adversarial evasion attack","volume":"107","author":"Chan","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"ref_27","unstructured":"Vitorino, J. (2025, February 01). Adaptative Perturbation Pattern Method. GitHub Project. Available online: https:\/\/github.com\/vitorinojoao\/a2pm."},{"key":"ref_28","unstructured":"Agarwal, A., Tan, Y.S., Ronen, O., Singh, C., and Yu, B. (2022, January 17\u201323). Hierarchical Shrinkage: Improving the accuracy and interpretability of tree-based models. Proceedings of the 39th International Conference on Machine Learning, Baltimore, MD, USA. Available online: https:\/\/proceedings.mlr.press\/v162\/agarwal22b.html."},{"key":"ref_29","unstructured":"European Union Agency for Cybersecurity, Malatras, A., Agrafiotis, I., and Adamczyk, M. (2025, January 29). Securing ML Algorithms. Available online: https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/c7c844fd-7f1e-11ec-8c40-01aa75ed71a1\/language-en."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Tao, Y., Jia, Y., Wang, N., and Wang, H. (2019, January 21\u201325). The FacT: Taming Latent Factor Models for Explainability with Factorization Trees. Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, New York, NY, USA.","DOI":"10.1145\/3331184.3331244"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Vitorino, J., Oliveira, N., and Pra\u00e7a, I. (2022). Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection. Future Internet, 14.","DOI":"10.3390\/fi14040108"},{"key":"ref_32","unstructured":"Malatras, A., and Dede, G. (2025, January 29). AI Cybersecurity Challenges: Threat Landscape for Artificial Intelligence. A Report from European Union Agency for Cybersecurity. Available online: https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/e52bf2d7-4017-11eb-b27b-01aa75ed71a1\/language-en."},{"key":"ref_33","unstructured":"Kantchelian, A., Tygar, J.D., and Joseph, A.D. (2016, January 20\u201322). Evasion and hardening of tree ensemble classifiers. Proceedings of the 33rd International Conference on ML, New York, NY, USA."},{"key":"ref_34","unstructured":"Vos, D., and Verwer, S. (2021, January 18\u201324). Efficient Training of Robust Decision Trees Against Adversarial Examples. Proceedings of the 38th International Conference on Machine Learning, Virtual. Available online: https:\/\/proceedings.mlr.press\/v139\/vos21a.html."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"35403","DOI":"10.1109\/ACCESS.2020.2974752","article-title":"Adversarial ML Applied to Intrusion and Malware Scenarios: A Systematic Review","volume":"8","author":"Martins","year":"2020","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.inffus.2021.11.011","article-title":"Tabular data: Deep learning is not all you need","volume":"81","author":"Armon","year":"2022","journal-title":"Inf. Fusion"},{"key":"ref_37","unstructured":"Merilinna, J. (2025, February 01). Advanced Uncertainty Quantification and Novelty Detection for Random Forest Models, Available online: https:\/\/aircconline.com\/csit\/papers\/vol13\/csit131920.pdf."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"102471","DOI":"10.1016\/j.artmed.2022.102471","article-title":"Why did AI get this one wrong?\u2014Tree-based explanations of ML model predictions","volume":"135","author":"Parimbelli","year":"2023","journal-title":"Artif. Intell. Med."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-3-031-06746-4_28","article-title":"Towards explainability of tree-based ensemble models. A critical overview","volume":"Volume 484","author":"Zamojski","year":"2022","journal-title":"New Advances in Dependability of Networks and Systems"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/52.663793","article-title":"Analyzing and improving reliability: A tree-based approach","volume":"15","author":"Tian","year":"1998","journal-title":"IEEE Softw."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Guidotti, R., and Ruggieri, S. (2019, January 14\u201319). On The Stability of Interpretable Models. Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary.","DOI":"10.1109\/IJCNN.2019.8852158"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Izza, Y., and Marques-Silva, J. (2021, January 19\u201327). On Explaining Random Forests with SAT. Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence Main Track, Montreal, QC, Canada.","DOI":"10.24963\/ijcai.2021\/356"},{"key":"ref_43","unstructured":"Grinsztajn, L., Oyallon, E., and Varoquaux, G. (2022). Why do tree-based models still outperform deep learning on tabular data?. arXiv."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3523273","article-title":"Membership Inference Attacks on ML: A Survey","volume":"54","author":"Hu","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Parisot, M.P.M., Pejo, B., and Spagnuelo, D. (2021). Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model\u2019s Complexity. arXiv.","DOI":"10.5220\/0010555600002998"},{"key":"ref_46","unstructured":"Zhang, J., Das, D., Kamath, G., and Tram\u00e8r, F. (2024). Membership Inference Attacks Cannot Prove that a Model Was Trained on Your Data. arXiv."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3551636","article-title":"A Comprehensive Survey on Poisoning Attacks and Countermeasures in ML","volume":"55","author":"Tian","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Roy, H., and Anand, S. (2024). Defending the Integrity of ML Models in the Face of Adversarial Threats. Res. Sq.","DOI":"10.21203\/rs.3.rs-3871878\/v1"},{"key":"ref_49","first-page":"1316","article-title":"Safeguarding Station Data Integrity: A Comprehensive Study On Detecting And Mitigating False Data Injection Through Advanced ML Techniques","volume":"30","author":"Shirini","year":"2024","journal-title":"Archives"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Wang, C., Ma, C., Li, M., Gao, N., Zhang, Y., and Shen, Z. (2021). Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption, Springer.","DOI":"10.1007\/978-3-030-89137-4_7"},{"key":"ref_51","unstructured":"Kang, M., Song, D., and Li, B. (2023). DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification. arXiv."},{"key":"ref_52","unstructured":"Guliani, R. (2024). Enhancing Robustness of ML Models Against Adversarial Attacks. [Bachelor\u2019s Thesis, Portland State University]."},{"key":"ref_53","unstructured":"Ahmed, A.A., and Neeru, N. (2024). A comprehensive review of adversarial attacks in ML. Indian Sci. J. Res. Eng. Manag., 8."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"4470","DOI":"10.1109\/TAI.2024.3384337","article-title":"Building a Robust and Efficient Defensive System Using Hybrid Adversarial Attack","volume":"5","author":"Dhanaraj","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"11627","DOI":"10.1007\/s10586-024-04513-4","article-title":"Deep learning adversarial attacks and defenses on license plate recognition systems","volume":"27","author":"Vizcarra","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Mehta, R., and Jhajharia, K. (2024, January 1\u20133). Layered Distillation Training: A Study of Adversarial Attacks and Defenses. Proceedings of the 2024 3rd International Conference for Innovation in Technology (INOCON), Bangalore, India.","DOI":"10.1109\/INOCON60754.2024.10511920"},{"key":"ref_57","unstructured":"Nicolae, M.-I., Sinn, M., Tran, M.N., Buesser, B., Rawat, A., Wistuba, M., Zantedeschi, V., Baracaldo, N., Chen, B., and Ludwig, H. (2019). Adversarial Robustness Toolbox v1.0.0. arXiv."},{"key":"ref_58","unstructured":"Kumar, R.S.S. (2024, October 02). AI Security Risk Assessment Using Counterfit|Microsoft Security Blog. Available online: https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/03\/ai-security-risk-assessment-using-counterfit\/."},{"key":"ref_59","unstructured":"Papernot, N., Faghri, F., Carlini, N., Goodfellow, I., Feinman, R., Kurakin, A., Xie, C., Sharma, Y., Brown, T., and Roy, A. (2025, February 01). Technical Report on the Cleverhans v2.1.0 Adversarial Examples Library. Available online: https:\/\/ar5iv.labs.arxiv.org\/html\/1610.00768."},{"key":"ref_60","unstructured":"Li, Y., Jin, W., Xu, H., and Tang, J. (2021, January 2\u20139). DeepRobust: A Platform for Adversarial Attacks and Defenses. Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI-21), Vancouver, BC, Canada."},{"key":"ref_61","unstructured":"Rauber, J., Brendel, W., and Bethge, M. (2018). Foolbox: A Python toolbox to benchmark the robustness of ML models. arXiv."},{"key":"ref_62","unstructured":"Pintor, M., Demetrio, L., Sotgiu, A., Melis, M., Demontis, A., and Biggio, B. (2022). secml: A Python Library for Secure and Explainable ML. arXiv."},{"key":"ref_63","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., and Frossard, P. (2016, January 27\u201330). Deepfool: A simple and accurate method to fool deep neural networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2016, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref_65","unstructured":"Madry, A. (2017). Towards deep learning models resistant to adversarial attacks. arXiv."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Alzantot, M., Sharma, Y., Elgohary, A., Ho, B.J., Srivastava, M., and Chang, K.W. (2018). Generating natural language adversarial examples. arXiv.","DOI":"10.18653\/v1\/D18-1316"},{"key":"ref_67","unstructured":"Lundberg, S. (2024, September 14). Topical Overviews\u2014SHAP Latest Documentation. the SHAP Documentation. Available online: https:\/\/shap.readthedocs.io\/en\/latest\/overviews.html."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1038\/s42256-019-0138-9","article-title":"From local explanations to global understanding with explainable AI for trees","volume":"2","author":"Lundberg","year":"2020","journal-title":"Nat. Mach. Intell."},{"key":"ref_69","first-page":"349","article-title":"Developing the sensitivity of LIME for better machine learning explanation","volume":"Volume 11006","author":"Lee","year":"2019","journal-title":"Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1109\/TSUSC.2023.3293269","article-title":"On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach","volume":"8","author":"Anisetti","year":"2023","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_71","unstructured":"Ruan, Y., Lan, X., Ma, J., Dong, Y., He, K., and Feng, M. (2024). Language Modeling on Tabular Data: A Survey of Foundations, Techniques and Evolution. Computation and Language. arXiv."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"7499","DOI":"10.1109\/TNNLS.2022.3229161","article-title":"Deep Neural Networks and Tabular Data: A Surve","volume":"35","author":"Borisov","year":"2024","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_73","first-page":"134","article-title":"A Review of Genetic Algorithm: Operations and Applications","volume":"40","author":"Isa","year":"2024","journal-title":"J. Adv. Res. Appl. Sci. Eng. Technol."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Sohrabi, M., Fathollahi-Fard, A.M., and Gromov, V.A. (2023). Genetic Engineering Algorithm (GEA): An Efficient Metaheuristic Algorithm for Solving Combinatorial Optimization Problems. arXiv.","DOI":"10.31857\/S0005231024030027"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","article-title":"Machine Learning and Deep Learning Methods for Cybersecurity","volume":"6","author":"Xin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2808691","article-title":"Evaluating computer intrusion detection systems: A survey of common practices","volume":"48","author":"Milenkoski","year":"2015","journal-title":"ACM Comput. Surv."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","article-title":"Random forest modeling for network intrusion detection systems","volume":"89","author":"Farnaaz","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_78","first-page":"4375","article-title":"Feature selection using ML in intrusion detection system: A comprehensive literature review","volume":"53","author":"Aziz","year":"2020","journal-title":"Artif. Intell. Rev."},{"key":"ref_79","unstructured":"Samarakoon, S., Siriwardhana, Y., Porambage, P., Liyanage, M., Chang, S.-Y., Kim, J., Kim, J., and Ylianttila, M. (2022). 5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network. arXiv."},{"key":"ref_80","first-page":"117","article-title":"An approach for fault detection based on multibody simulations and feature selection algorithm","volume":"Volume 12049","author":"Bono","year":"2022","journal-title":"NDE 4.0, Predictive Maintenance, and Communication and Energy Systems in a Globally Networked World"},{"key":"ref_81","unstructured":"Calzolari, M. (2025, February 01). Sklearn-Genetic 0.6.0. Project Description. Available online: https:\/\/pypi.org\/project\/sklearn-genetic\/."},{"key":"ref_82","unstructured":"Canadian Institute for Cybersecurity (2024, September 14). Datasets Research IDS 2017. University of New Brunswick. Available online: https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html."},{"key":"ref_83","unstructured":"(2025, February 01). 5GTN. Available online: https:\/\/5gtnf.fi\/."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Piri, E., Ruuska, P., Kanstren, T., M\u00e4kel\u00e4, J., Korva, J., Hekkala, A., Pouttu, A., Liinamaa, O., Latva-Aho, M., and Vierimaa, K. (2016, January 27\u201330). 5GTN: A Test Network for 5G Application Development and Testing. Proceedings of the 2016 European Conference on Networks and Communications (EuCNC), Athens, Greece.","DOI":"10.1109\/EuCNC.2016.7561054"}],"container-title":["Network"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2673-8732\/5\/1\/6\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:36:00Z","timestamp":1760027760000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2673-8732\/5\/1\/6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,17]]},"references-count":84,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["network5010006"],"URL":"https:\/\/doi.org\/10.3390\/network5010006","relation":{},"ISSN":["2673-8732"],"issn-type":[{"value":"2673-8732","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,17]]}}}