Optimizing Cybersecurity in 5G-Enabled IoT Networks via a Resource-Efficient Random Forest Model

Main Article Content

Zainab Ali Abbood
Aysar Hadi Oleiwi
Raghad Tariq Al-Hassani
Jenan Ayad

Abstract

With the widespread deployment of 5G networks together with many Internets of Things (IoT) devices, the demand for secure space has grown substantially. The proposed research focuses on improving the existing cybersecurity solutions in 5G based IoT networks through resource-efficient implementation of the random forest (RF) model. This study evaluated an IDPS based on a completely simulated 5G-era IoT scenario. The study evaluated an IDPS using a simulated 5G-era IoT environment replicating real-world device interactions. Synthetic datasets representing normal and malicious traffic, including distributed denial-of-service (DDoS) attacks, were used for model training and testing. The performance of the RF model was assessed via important metrics, including accuracy, recall, precision, and the F-measure. The RF model achieved a high F-measure of 77%, reflecting a strong ability to identify and mitigate threats. Additionally, the model performs exceptionally well in terms of essential characteristics such as the identification of anomalies, the ability to respond in real time, the management of resources, and the protection of privacy. Within the context of a 5G network, the findings demonstrate that is random forest an acceptable and effective method for securing resource-constrained Internet of Things networks. Future work may explore hybrid AI models to enhance security capabilities


 

Article Details

Section

Articles

How to Cite

Optimizing Cybersecurity in 5G-Enabled IoT Networks via a Resource-Efficient Random Forest Model (Z. . Ali Abbood, A. . Hadi Oleiwi, R. . Tariq Al-Hassani, & J. . Ayad , Trans.). (2025). Mesopotamian Journal of CyberSecurity, 5(2), 886–898. https://doi.org/10.58496/

References

[1] S. J. Mohammed and B. M. Nema, “Threat Detection Based on Explainable AI (XAI) and Hybrid Learning,” Mesopotamian Journal of CyberSecurity, vol. 5, no. 2, pp. 477–490, 2025.

[2] Z. A. Abbood, D. Ç. Atilla, Ç. Aydin, and M. S. Mahmoud, “A survey on intrusion detection system in ad hoc networks based on machine learning,” in Proc. Int. Conf. Modern Trends in Information and Communication Technology Industry (MTICTI), Dec. 2021, pp. 1–8.

[3] A. Abeshu and N. Chilamkurti, “Deep learning: The frontier for distributed attack detection in fog-to-things computing,” IEEE Commun. Mag., vol. 56, no. 2, pp. 169–175, 2018.

[4] Z. A. Abbood, D. Ç. Atilla, and Ç. Aydin, “Intrusion Detection System through deep learning in routing MANET networks,” Intell. Autom. Soft Comput., vol. 37, no. 1, 2023.

[5] A. D. Aguru and S. B. Erukala, “A lightweight multivector DDoS detection framework for IoT-enabled mobile health informatics systems using deep learning,” Inf. Sci., vol. 662, p. 120209, 2024.

[6] M. A. Almaiah, R. Shehab, T. Alkhdour, M. Obeidat, and T. H. Aldhyani, “Cybersecurity risk assessment for identifying threats, vulnerabilities and countermeasures in the IoT,” Mesopotamian Journal of CyberSecurity, vol. 5, no. 2, pp. 514–537, 2025.

[7] M. A. F. Al-Husainy, B. Al-Shargabi, and S. Aljawarneh, “Lightweight cryptography system for IoT devices using DNA,” Comput. Electr. Eng., vol. 95, p. 107418, 2021. doi: 10.1016/j.compeleceng.2021.107418

[8] F. Hazzaa, A. Qashou, I. I. Al Barazanchi, R. Sekhar, P. Shah, M. Bachute, and A. S. Abdulbaqi, “Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns,” Int. J. Safety Secur. Eng., vol. 14, no. 5, pp. 1439–1446, 2024. doi: 10.18280/ijsse.140511

[9] S. S. Bhavanasi, L. Pappone, and F. Esposito, “Routing with Graph Convolutional Networks and Multi-Agent Deep Reinforcement Learning,” in Proc. IEEE Conf. Network Function Virtualization and Software Defined Networks (NFV-SDN), 2022, pp. 72–77. doi: 10.1109/nfv-sdn56302.2022.9974607

[10] H. S. R. Alzubaidy and H. Jabber, “A survey of software-defined networking (SDN) controllers for Internet of Things (IoT) applications,” Babylonian J. Netw., pp. 15–20, 2023.

[11] O. A. Alkhudaydi, M. Krichen, and A. D. Alghamdi, “A deep learning methodology for predicting cybersecurity attacks on the internet of things,” Information, vol. 14, no. 10, p. 550, 2023.

[12] F. Shokoor, W. Shafik, and S. M. Matinkhah, “Overview of 5G & beyond security,” EAI Endorsed Trans. Internet Things, vol. 8, no. 30, p. e2, 2022.

[13] W. Robert, M. Bounabi, and A. Badr, “Leveraging AI in Mixed Hierarchical Topologies to Improve WSN: A Survey,” Babylonian J. Netw., pp. 59–69, 2025. doi: 10.58496/bjn/2025/005

[14] M. M. Mijwil, I. E. Salem, and M. M. Ismaeel, “The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review,” Iraqi J. Comput. Sci. Math., vol. 4, no. 1, p. 10, 2023.

[15] R. Aljohani, A. Bushnag, and A. Alessa, “AI-based intrusion detection for a secure internet of things (IoT),” J. Netw. Syst. Manage., vol. 32, no. 3, p. 56, 2024.

[16] T. S. Mohamed, S. M. Khalifah, R. Marqas, S. M. Almufti, and R. R. Asaad, “Evaluation of Information Security through Networks traffic traces for machine learning classification,” Babylonian J. Netw., pp. 25–42, 2025. doi: 10.58496/bjn/2025/003

[17] R. S. Tiwari, D. Lakshmi, T. K. Das, A. K. Tripathy, and K. C. Li, “A lightweight optimized intrusion detection system using machine learning for edge-based IIoT security,” Telecommun. Syst., pp. 1–20, 2024.

[18] I. Ullah and Q. H. Mahmoud, “Design and development of a deep learning-based model for anomaly detection in IoT networks,” IEEE Access, vol. 9, pp. 103906–103926, 2021.

[19] I. H. Sarker, A. I. Khan, Y. B. Abushark, and F. Alsolami, “Internet of things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions,” Mobile Netw. Appl., vol. 28, no. 1, pp. 296–312, 2023.

[20] S. A. Talib, “The Importance of Cryptography in Cloud Computing,” Al-Esraa Univ. Coll. J. Eng. Sci., vol. 6, no. 10, pp. 59–80, Jan. 2024. doi: 10.70080/2790-7732.1054

[21] B. Li, Y. Feng, Z. Xiong, W. Yang, and G. Liu, “Research on AI security enhanced encryption algorithm of autonomous IoT systems,” Inf. Sci., vol. 575, pp. 379–398, 2021.

[22] I. J. Hawi, “Unveiling the Hidden Threat: How Wireless Networks Fuel Serious Cyber Attacks,” Al-Esraa Univ. Coll. J. Eng. Sci., vol. 6, no. 9, pp. 88–100, Dec. 2024. doi: 10.70080/2790-7732.1007

[23] G. S. Nadella and H. Gonaygunta, “Enhancing cybersecurity with artificial intelligence: Predictive techniques and challenges in the age of IoT,” Int. J. Sci. Eng. Appl., vol. 13, no. 04, pp. 30–33, 2024.

[24] M. Asif, S. Naz, F. Ali, A. Alabrah, A. Salam, F. Amin, and F. Ullah, “Advanced Zero-Shot Learning (AZSL) Framework for Secure Model Generalization in Federated Learning,” IEEE Access, vol. 12, pp. 184393–184407, 2024. doi: 10.1109/access.2024.3510756

[25] A. Salam, M. Abrar, F. Amin, F. Ullah, I. A. Khan, B. F. Alkhamees, and H. AlSalman, “Securing Smart Manufacturing by Integrating Anomaly Detection With Zero-Knowledge Proofs,” IEEE Access, vol. 12, pp. 36346–36360, 2024. doi: 10.1109/access.2024.3373697

Similar Articles

You may also start an advanced similarity search for this article.