Research Article | | Peer-Reviewed

Slice-Specific Machine Learning Models for Intrusion Detection in 5G Telecommunication Networks

Received: 26 September 2025     Accepted: 9 October 2025     Published: 26 November 2025
Views:       Downloads:
Abstract

The security challenges introduced by 5G network slicing demand tailored intrusion detection systems (IDS). Traditional intrusion detection systems (IDS) and intrusion detection and prevention systems (IDPS) frameworks, built for static network configurations, are inadequate for the dynamic and heterogeneous nature of 5G networks. To address this gap, this study develops and evaluates slice-specific machine learning models to enhance intrusion detection across different 5G slices, namely: enhanced Mobile Broadband (eMBB), massive Machine-Type Communication (mMTC), and Ultra-Reliable Low-Latency Communication (URLLC). Random Forest, Support Vector Machine (SVM), and Long Short-Term Memory (LSTM) models were applied to publicly available datasets representing each slice. These models are assessed based on their accuracy, precision, recall, F1-score, area under the receiver operating characteristic curve (AUC-ROC), confusion matrix and execution time. The results reveal that the LSTM model achieved the highest accuracy and AUC-ROC scores for the eMBB and mMTC slices, making it suitable for applications where detection accuracy is critical despite higher computational demands. In contrast, Random Forest demonstrated superior computational efficiency, making it the most preferred model for latency-sensitive URLLC slice, where real-time detection is essential. While the SVM model performed well in terms of accuracy, its high computational cost renders it less practical for real-time applications, particularly in URLLC environments. This research provides insights for enhancing 5G network security through the deployment of slice-specific machine learning models, thereby addressing the critical need for adaptable and efficient IDS frameworks.

Published in International Journal of Wireless Communications and Mobile Computing (Volume 12, Issue 2)
DOI 10.11648/j.wcmc.20251202.14
Page(s) 93-118
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2025. Published by Science Publishing Group

Keywords

Fifth Generation (5G) Networks, Intrusion Detection System (IDS), Machine Learning Algorithms, Massive Machine-Type Communication (mMTC), Mobile Broadband (eMBB), Ultra-Reliable Low-Latency Communication (URLLC)

References
[1] W. Lee, T. Na and J. Kim, “How to Create a Network Slice? - A 5G Core Network Perspective,” In the Proceedings of the IEEE 2019 21st International Conference on Advanced Communication Technology (ICACT), 17 - 20 February, 2019, PyeongChang, Korea, pp. 616 - 619, 2019.
[2] M. Minardi, Y. Drif, T. X. Vu and S. Chatzinotas, “SAST-VNE: A Flexible Framework for Network Slicing in 6G Integrated Satellite-Terrestrial Networks,” IEEE Journal on Selected Areas in Communications, vol. 43, no. 1, pp. 234 - 244, 2024.
[3] W. Patel and P. Tripathy, “eMBB, URLLC, and mMTC 5G Wireless Network Slicing: A Communication-Theoretic View,” In the Proceedings of the 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), 27 - 29 January, 2023, Greater Nolda, India, pp. 1291 - 1296, 2023.
[4] P. Pal, O. Misra and M. Shahid, “Network Slicing In 5G Architecture: Applications and Services,” NIET Journal of Engineering and Technology, vol. 12, no. 1, pp. 34 - 40, 2023.
[5] P. Popovski, K. F. Trillingsgaard, O. Simeone and G. Durisi, “5G Wireless Network Slicing for eMBB, URLLC, and mMTC: A Communication-Theoretic View,” IEEE Access, vol. 6, pp. 55765 - 55779, 2018.
[6] I. A. Bartsiokas, P. K. Gkonis, D. I. Kaklamani and I. S. Venieris, “A Federated Learning-Based Resource Allocation Scheme for Relaying-Assisted Communications in Multicellular Next Generation Network Topologies,” Electronics, vol. 13, no. 390, pp. 1 - 18, 2024.
[7] J. Cunha, P. Ferreira, E. M. Castro, P. C. Oliveira, M. J. Nicolau, I. Nunez, X. R. Sousa and C. Serodio, “Enhancing network slicing security: Machine learning, software-defined networking, and network functions virtualization-driven strategies,” Future Internet, vol. 16, no. 7, Article Number 226, pp. 1 - 36, 2024.
[8] C. D. Alwis, P. Porambage, K. Dev, T. R. Gadekallu and M. Liyanage, “A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions,” IEEE Communications Surveys and Tutorials, vol. 26, no. 1, pp. 534 - 570, 2024.
[9] R. Pries, H. D. Morper, N. Galambosi and M. Jarschel, “Network as a Service - A Demo on 5G Network Slicing,” In the Proceedings of the 2016 28th International Teletraffic Congress (ITC 28), vol. 1, pp. 209 - 211, 2016.
[10] A. Fahmin, Y. C. Lai, M. S. hassain and Y. D. Lin, “Performance Modeling and Comparison of NFV Integrated with SDN: Under or Aside,” Journal of Network and Computer Applications, vol. 113, pp. 119 - 129, 2018.
[11] A. A. Barakabitze, A. Ahmad, R. Mijumbi and A. Hines, “5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges,” Computer Networks, vol. 167, no. 10698, pp. 1 - 19, 2020.
[12] P. C. Amogh, A. Vashistha, Y. S. Rao, P. Yiyang and S. Sumei, “Defending 5G Networks Against DDoS Attacks Using Quarantine Slice Manager Architecture,” In the Proceedings of the 2024 IEEE VTS Asia Pacific Wireless Communication Symposium (APWCS), 21 - 23 August, 2024, Singapore, pp. 1 - 5, 2024.
[13] A. Pc, A. Vashistha, Y. S. Rao, Y. Pei and S. Sumei, S. (2024). Defending 5G Networks Against DDoS Attacks Using Quarantine Slice Manager Architecture. In the Proceedings of the 2024 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS), pp. 1 - 5, 2024.
[14] S. Gao, R. Lin, Y. Fu, H. Li and J. Cao, “Security threats, requirements, and recommendations on creating 5G network slicing system: A survey,” Electronics, vol. 13, no. 10, Article Number 1860, pp. 1 - 32, 2024.
[15] Z. Awada, M. E. Helou, K. Khawam and S. Lahoud, “Dynamic Multi-Tenant RAN Slicing for eMBB, URLLC, and mMTC in 5G Networks,” In the Proceedings of the 2023 26th International Symposium on Wireless Personal Multimedia Communications (WPMC), 19 - 22 November, 2023, Tampa, FL, USA, pp. 1 - 7, 2023.
[16] I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, “5G security: Analysis of threats and solutions,” 2017 IEEE Conference on Standards for Communications and Networking (CSCN), 18 - 20 September, 2017, Helsinki, Finland, 2017, pp. 193 - 199,
[17] S. Park, D. Kim, Y. Park, D. Kim and S. Kwon, 5G Security Threat Assessment in Real Networks,” Sensors, vol. 21, no. 16, Article Number: 5524, pp. 1 - 22, 2021.
[18] A. K. M. B. Haque, T. Nausheen, A. M. Shaan and S. A. Murad, “Security Attacks and Countermeasures in 5G Enabled Internet of Things,” In: Bhushan, B., Sharma, S. K., Kumar, R., Priyadarshini, I. (eds) 5G and Beyond. Springer Tracts in Electrical and Electronics Engineering, Springer, pp. 1 - 311, 2023. Singapore. Available::
[19] V. P. Singh, M. P. Singh, S. Hedge and M. Gupta, Security in 5G Network Slices: Concerns and Opportunities,” IEEE Access, vol. 12, pp. 52727 - 52743, 2024.
[20] M. Humayun, B. Hamid, N. Z. Jhanjhi, G. Suseendran and M. N. Talib, “5G Network Security Issues, Challenges, Opportunities and Future Directions: A Survey,” Journal of Physics: Conference Series - International Conference on Recent Trends in Computing (ICRTCE-2021), 20 - 22 May, 2021, Maharashtra, India, pp. 1 - 11, 2021.
[21] C. I. Fan, Y. T. Shih, J. J. Huang and W. R. Chiu, “Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System,” IEEE Transactions on Network and Service Management, vol. 14, no. 8, pp. 1 - 12, 2021.
[22] A. B. Sabastian, W. K. B. Mikkel and A. Birger, “5% Attacks and Countermeasures,” In the Proceedings of the 25th International Conference on Wireless Personal Multimedia Communications, pp. 1 - 7, 2023.
[23] A. Bajpai and S. Bhargava, “A comprehensive review on security threats and countermeasures in 5G network systems,” AIP Conference Proceedings, vol. 3327, no. 020024, 2025.
[24] H. Jmila and G. Blanc, “Towards Security-Aware 5G Slice Embedding,” Computer and Security, vol. 100, no. 102075, 2021.
[25] M. Mahyoub, A. AbdulGhaffar, E. Alalade, A. Matrawy, “Security-Aware Network Function Sharing Model for 5G Slicing,” Security and Privacy, vol. 8, no. 3, pp. 1 - 13, 2025.
[26] H. Cao, Y. Hu, S. Wu and Y. Guo, “Dynamic and Secure Resource Allocation Framework of Slices for 5G-Enabled Cyber Physical Systems,” In the Proceedings of the IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2 - 5 May, 2022, New York, USA, pp. 1 - 6, 2022.
[27] D. Sattar and A. Matrawy, “Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices,” In the Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), pp. 82 - 90, 2019.
[28] H. Sharma, P. Kumar and K. Sharma, “Recurrent Neural Network based Incremental model for Intrusion Detection System in IoT,” Scalable Comput. Pract. Exp., vol. 25, pp. 3778 - 3795, 2024.
[29] M. S. Bhelkar, “Network Intrusion Detection System,” International Journal of Scientific Research in Engineering and Management, vol. 8, no. 4, pp. 1 - 5, 2024.
[30] S. Ouiazzane, M. Addou and F. Barramou, “A Suricata and Machine Learning Based Hybrid Network Intrusion Detection System,” In: Maleh, Y., Alazab, M., Gherabi, N., Tawalbeh, L., Abd El-Latif, A. A. (eds) Advances in Information, Communication and Cybersecurity (ICI2C 2021). Lecture Notes in Networks and Systems, vol 357, pp. 474 - 485, 2022.
[31] E. Gyamfi and A. D. Jurcut, “Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning and Datasets,” Sensors, vol. 22, no. 10, Article Number 3744, pp. 1 - 33, 2022.
[32] A. Almazroi, N. Moustafa and S. Alsharif, “A Framework for Network Intrusion Detection Systems in 5G Networks,” IEEE Access., 2020.
[33] A. Almurshedi, A. V. Vasilakos and Z. Li, “A comprehensive survey on artificial intelligence for network intrusion detection: Challenges and solutions,” Computer Networks, vol. 196, no. 108244, 2021.
[34] P. Radoglou-Grammatikis, G. Naks, G. Amponis, S. Giannakidou, T. Lagkas and V. Argyriou, “5GCIDS: An Intrusion Detection System for 5G Core with AI and Explainability Mechanisms,” In the proceedings of the 2023 IEEE GlobecomWorkshops (GC Wkshps), 4 - 8 December, 2023, Kuala Lumpur, Malaysia, pp. 353 - 358, 2023.
[35] V. Adat, I. Politis, C. Tselios, P. Galiotos and S. Kotsopoulos, “On Blockchain Enhanced Secure Network Coding for 5G Deployments,” In the Proceddings of the 2018 IEEE Global Communication Conference (GLOBECOM), 9 - 13 December, 2018, Abu Dubai, United Arab Emirates, pp. 1 - 7, 2018.
[36] M. S. Peelam, V. Chamola and B. K. Chaurasia, “Blockchain-Enabled Intrusion Detection Systems for Real-Time Vehicle Monitoring,” Vehicular Communications, vol. 55, no. 100961, 2025.
[37] P. V. A. Alves, M. A. S. S. Goldbarg, W. K. P. Barros, I. D. Rego, V. J. M. T. Filho, A. M. Martins, V. A. D. Sousa, R. D. R. Fontes, E. H. D. S. Aranha, A. V. Neto and M. A. C. Fernandes, “Machine Learning Applied to Anomaly Detectio on 5G O-RAN Architecture,” Procedia Computer Science, vol. 222, pp. 81 - 93, 2023.
[38] G. K. Pavani and B. Veeramallu, “Hybrid Machine Learning Framework for Anomaly Detection in 5G Networks,” Journal of Information Systems Engineering and Management, vol. 10, no 32s, pp. 733 - 739, 2025.
[39] Z. Lv, A. K. Singh and J. Li, “Deep Learning for Security Problems in 5G Heterogeneous Networks,” IEEE Networks, vol. 35, no. 2, 67 - 73, 2021.
[40] T. Saha, N. Aaraj and N. Jha, “Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems,” IEEE Transactions on Emerging Topics in Computing, vol. 10, no. 4, pp. 2006 - 2024, 2022.
[41] X. Y. Gong, Y. Yang, Y. Zhang, N. Li, Y. Guan and R. Jiang, “Feature Selection Method for Network Intrusion based on Hybrid Meta-Heuristic Dynamic Optimization Algorithm,” Computer & Security, vol. 156, no. 104512, 2025.
[42] Y. Liu, Y. Chen and X. Zhang, “Adaptive Intrusion Detection System Based on Machine Learning Algorithms for 5G Wireless Networks,” Sensors, vol. 21, no. 3, Article Number: 807, 2021.
[43] K. Uszko, M. Kasprzyk, M. Natkaniec and P. Cholda, “Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs,” Electronics, vol. 12, no. 11, Article Number: 2355, pp. 1 - 28, 2023.
[44] C. Hamroun, A. Fladenmuller, M. Pariente and A. G. Pujolle, “Intrusion Detection in 5G and WiFi Networks: A Survey of Current Methods, Challenges, and Perspectives,” IEEE Access, vol. 13, pp. 40950 - 40976, 2025.
[45] Y. Li, Y. Chen, H. Zhang and Y. Wang, “Federated Learning for Edge Computing: A Review,” IEEE Access, vol. 8, pp. 179835 - 179845, 2020.
[46] N. Latif, W. Ma and H. B. Ahmad, “Advancements in securing federated learning with IDS: a comprehensive review of neural networks and feature engineering techniques for malicious client detection,” Artificial Intelligence Review, vo. 58, no. 91, pp. 1 - 63, 2025.
[47] R. Bocu and M. Lavich, “Real-Time Intrusion Detection and Prevention System for 5G and Beyond Software-Defined Networks,” Symmetry, vol. 15, no. 110, pp. 1 - 15, 2023.
[48] R. A. Khan, H. U. Khan, H. S. Alwageed, H. A. Hashimi and I. Keshta, “5G Network Security Mitigation Model: An ANN-ISM Hybrid Approach,” IEEE Open Journal of the Communication Society, vol. 6, pp. 881 - 925, 2025.
[49] B. Bousalem, V. F. Silva, R. Langar and S. Cherrier, “Deep Learning-based Approach for DDoS Attacks Detection and Mitigation in 5G and Beyond Mobile Networks,” In the Proceedings of the 8th International Conference on Network Softwarization (NetSoft 2022), Jun 2022, Milan, Italy. pp. 228-230, 2022.
[50] B. Farzaneh, N. Shahriar, A. H. A. Muktadir, M. S. Towhid and M. S. Khosravani, “DTL-5G: Deep transfer learning-based DDoS attack detection in 5G and beyond networks,” Computer Communications, vol. 228, no. 107927, pp. 1 - 14, 2024. Available:
[51] S. M. Kasongo and Y. Sun, “A deep learning method with wrapper based feature extraction for wireless intrusion detection system,” Computer & Security, vol. 92, no. 101752, pp. 1 - 15, 2020. Available:
[52] G. Agrafiotis, E. Makri, I. Flionis, A. Lalas, K. Votis and D. Tzovaras, “Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion,” In the Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES’22), 23 - 26 August, 2022, Vienna, Austria, pp. 1 - 7, 2022. Available:
[53] G. Agrafiotis, E. Makri, A. Lalas, K. Votis, D. Tzovaras and N. Tsampieris, “A Deep Learning-based Malware Traffic Classifier for 5G Networks Employing Protocol-Agnostic and PCAP-to-Embeddings Techniques,” In the Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference (EICC’23), 14 - 15 June, 2023, Stavanger, Norway, pp. 193 - 194. Available:
[54] C. Park, K. Park, J. Song and J. Kin, “Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks,”, In the Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 6 - 9 June, 2023, Gothenburg, Sweden, pp. 490 - 495, 2023. Available:
[55] M. Alazab and S. Fong, “Feature selection for intrusion detection systems: A comparative study,” Information Systems, vol. 103, no. 101825, 2021.
[56] M. Hussain and R. Mahmod, “A hybrid feature selection approach for intrusion detection using machine learning,” Journal of Information Security and Applications, vol. 66, no. 103072, 2022.
[57] N. Moustafa and J. Slay, “A Hybrid Feature Selection for Network Intrusion Detection Systems: Central Points and Association Rules,” In the proceedings of the 16th Australian Information Warfare and Security Conference, 30 November, - 2 December, 2015, Edith Cpwan University, Joodalup Campus, Perth, Western Australia, pp. 5 - 13, 2015.
[58] K. G. R. Narayan, R. Ganesula, T. S. Somasekhar, S. Mookherji, V. Odelu, R. Prasath and A. G. Reddy, “Attenuating majority attack class bias using hybrid deep learning based IDS framework,” Journal of Network and Computer Applications, vol. 230, no. 103954, pp. 1 - 11, 2024. Available:
[59] M. A. Khan and M. Sadiq, “An ensemble feature selection approach for intrusion detection in IoT environments,” Sensors, vol. 23, no. 2, pp. 1050, 2023.
[60] A. A. Salama and F. A. Ghaleb, “Optimized feature selection for network intrusion detection using genetic algorithm. Computer Networks, vol. 203, no. 108674, 2022.
[61] W. Zhou and S. Liu, “Deep feature selection: A novel approach for intrusion detection systems,” ACM Transactions on Intelligent Systems and Technology, vol. 12, no. 4, Article 44, 2021.
[62] M. A. Bouke and A. Abdullah, “An empirical assessment of ML models for 5G network intrusion detection: A data leakage-free approach,” e-Prime - Advances in Electrical Engineering, Electronics and Energy, vol. 8, no. 100590, pp. 1 - 9, 2024. Available:
[63] Y. Zhang, W. Li, Z. Xu and H. Zhou, “A Secured Data Sharing Framework in 5G Network for Machine Learning-Based Intrusion Detection,” IEEE Access, vol. 8, pp. 200001-200015, 2020.
[64] M. S. Khan, B. Farzaneh, N. Shahriar, N. Saha and R. Boutaba, “Slice Secure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices,” In the Proceedings of the 2022 IEEE Future Networks World Forum (FNWF), pp. 639 - 642, 2022.
[65] L. U. Khan, I. Yaqoob, N. H. Tran, Z. Han and C. S. Hong, “Network slicing: Recent Advances, Taxonomy, Requirements, and Open Research Challenges,” IEEE Access, vol. 8, pp. 36009 - 36028, 2020.
[66] S. Samarakoon, Y. Siriwardhana, P. Porambage, M. Liyanage, S. Y. Chang, J. Kim, J. Kim and M. Ylianttila, “5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network,”, IEEE Dataport, 2nd December, 2022,
[67] E. C. P. Neto, H. Taslimasa, S. Dadkhah, S. Iqbal, P. Xiong, T. Rahmanb, and A. A. Ghorbani, "CICIoV2024: Advancing Realistic IDS Approaches against DoS and Spoofing Attack in IoV CAN bus," Internet of Things, vol. 26, no. 101209, 2024.
[68] M. Rabbani, J. Gui, F. Nejati, Z. Zhou, A. Kaniyamattam, M. Mirani, G. Piya, I. Opushnyev, R. Lu, A. A. Ghorbani. "Device Identification and Anomaly Detection in IoT Environments," IEEE Internet of Things Journal, vol. 12, no. 10, pp. 13625 - 13643, 2024. Available:
[69] M. S. Akbar, Z. Hussain, M. Ikram, Q. Z. Sheng and S. C. Mukhopadhyay, “On Challenges of Sixth-Generation (6G) Wireless Networks: A Comprehensive Survey of Requirements, Applications, and Security Issues,” Journal of Network and Computer Applications, vol. 233, no. 104040, 2025. Available:
[70] P. Kamble and A. N. Shaikh, “6G Wireless Networks: Vision, Requirements, Applications and Challenges,” In the Proceedings of the 2022 5th International Conferences on Advances in Science and Technology (ICAST), 2 - 3 December, 2022, Mumbai, India, pp. 577 - 581, 2022.
[71] V. A. Akpan, “Hard and soft embedded FPGA processor systems design: Design considerations and performance comparisons,” International Journal of Engineering and Technology, 3(11): 1000 - 1020, 2013. Available:
[72] V. A. Akpan, D. Chasapis and G. D. Hassapis, “FPGA Implementation of Neural Network-Based AGPC for Nonlinear F-16 Aircraft Auto-Pilot Control: Part 1 - Modeling, Synthesis, Verification and FPGA-in-the-Loop Co-Sim,” American Journal of Embedded Systems and Applications, vol. 9, no. 1, pp. 6 - 36, 2022. Available:
[73] V. A. Akpan, D. Chasapis and G. D. Hassapis, “FPGA Implementation of Neural Network-Based AGPC for Nonlinear F-16 Aircraft Auto-Pilot Control: Part 2 - Implementation of Embedded PowerPC™440 with AGPC,” American Journal of Embedded Systems and Applications, vol. 9, no. 2, pp. 37 - 65, 2022. Available:
Cite This Article
  • APA Style

    Akpan, V. A., Njoku, E. C., Obi, E. I. (2025). Slice-Specific Machine Learning Models for Intrusion Detection in 5G Telecommunication Networks. International Journal of Wireless Communications and Mobile Computing, 12(2), 93-118. https://doi.org/10.11648/j.wcmc.20251202.14

    Copy | Download

    ACS Style

    Akpan, V. A.; Njoku, E. C.; Obi, E. I. Slice-Specific Machine Learning Models for Intrusion Detection in 5G Telecommunication Networks. Int. J. Wirel. Commun. Mobile Comput. 2025, 12(2), 93-118. doi: 10.11648/j.wcmc.20251202.14

    Copy | Download

    AMA Style

    Akpan VA, Njoku EC, Obi EI. Slice-Specific Machine Learning Models for Intrusion Detection in 5G Telecommunication Networks. Int J Wirel Commun Mobile Comput. 2025;12(2):93-118. doi: 10.11648/j.wcmc.20251202.14

    Copy | Download

  • @article{10.11648/j.wcmc.20251202.14,
      author = {Vincent Andrew Akpan and Emmanuel Chinenye Njoku and Ebubechukwu Ifeoluwa Obi},
      title = {Slice-Specific Machine Learning Models for Intrusion Detection in 5G Telecommunication Networks
    },
      journal = {International Journal of Wireless Communications and Mobile Computing},
      volume = {12},
      number = {2},
      pages = {93-118},
      doi = {10.11648/j.wcmc.20251202.14},
      url = {https://doi.org/10.11648/j.wcmc.20251202.14},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.wcmc.20251202.14},
      abstract = {The security challenges introduced by 5G network slicing demand tailored intrusion detection systems (IDS). Traditional intrusion detection systems (IDS) and intrusion detection and prevention systems (IDPS) frameworks, built for static network configurations, are inadequate for the dynamic and heterogeneous nature of 5G networks. To address this gap, this study develops and evaluates slice-specific machine learning models to enhance intrusion detection across different 5G slices, namely: enhanced Mobile Broadband (eMBB), massive Machine-Type Communication (mMTC), and Ultra-Reliable Low-Latency Communication (URLLC). Random Forest, Support Vector Machine (SVM), and Long Short-Term Memory (LSTM) models were applied to publicly available datasets representing each slice. These models are assessed based on their accuracy, precision, recall, F1-score, area under the receiver operating characteristic curve (AUC-ROC), confusion matrix and execution time. The results reveal that the LSTM model achieved the highest accuracy and AUC-ROC scores for the eMBB and mMTC slices, making it suitable for applications where detection accuracy is critical despite higher computational demands. In contrast, Random Forest demonstrated superior computational efficiency, making it the most preferred model for latency-sensitive URLLC slice, where real-time detection is essential. While the SVM model performed well in terms of accuracy, its high computational cost renders it less practical for real-time applications, particularly in URLLC environments. This research provides insights for enhancing 5G network security through the deployment of slice-specific machine learning models, thereby addressing the critical need for adaptable and efficient IDS frameworks.
    },
     year = {2025}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Slice-Specific Machine Learning Models for Intrusion Detection in 5G Telecommunication Networks
    
    AU  - Vincent Andrew Akpan
    AU  - Emmanuel Chinenye Njoku
    AU  - Ebubechukwu Ifeoluwa Obi
    Y1  - 2025/11/26
    PY  - 2025
    N1  - https://doi.org/10.11648/j.wcmc.20251202.14
    DO  - 10.11648/j.wcmc.20251202.14
    T2  - International Journal of Wireless Communications and Mobile Computing
    JF  - International Journal of Wireless Communications and Mobile Computing
    JO  - International Journal of Wireless Communications and Mobile Computing
    SP  - 93
    EP  - 118
    PB  - Science Publishing Group
    SN  - 2330-1015
    UR  - https://doi.org/10.11648/j.wcmc.20251202.14
    AB  - The security challenges introduced by 5G network slicing demand tailored intrusion detection systems (IDS). Traditional intrusion detection systems (IDS) and intrusion detection and prevention systems (IDPS) frameworks, built for static network configurations, are inadequate for the dynamic and heterogeneous nature of 5G networks. To address this gap, this study develops and evaluates slice-specific machine learning models to enhance intrusion detection across different 5G slices, namely: enhanced Mobile Broadband (eMBB), massive Machine-Type Communication (mMTC), and Ultra-Reliable Low-Latency Communication (URLLC). Random Forest, Support Vector Machine (SVM), and Long Short-Term Memory (LSTM) models were applied to publicly available datasets representing each slice. These models are assessed based on their accuracy, precision, recall, F1-score, area under the receiver operating characteristic curve (AUC-ROC), confusion matrix and execution time. The results reveal that the LSTM model achieved the highest accuracy and AUC-ROC scores for the eMBB and mMTC slices, making it suitable for applications where detection accuracy is critical despite higher computational demands. In contrast, Random Forest demonstrated superior computational efficiency, making it the most preferred model for latency-sensitive URLLC slice, where real-time detection is essential. While the SVM model performed well in terms of accuracy, its high computational cost renders it less practical for real-time applications, particularly in URLLC environments. This research provides insights for enhancing 5G network security through the deployment of slice-specific machine learning models, thereby addressing the critical need for adaptable and efficient IDS frameworks.
    
    VL  - 12
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Sections