Research Article
Balancing Data Privacy and 5G VNFs Security Monitoring: Federated Learning with CNN + BiLSTM + LSTM Model
Table 12
Comparison with previous studies that used FL for intrusion detection.
| | 
 |  | Reference | Year | Technique used | Dataset utilized | Accuracy (%) | Precision (%) | Encryption technique |  | 
 |  | [36] | 2022 | Multi-layer perceptron (MLP) | Private dataset | 95 | — | None |  | [37] | 2020 | Transfer learning | CICIDS2017 | 91.93 | — | None |  | [39] | 2022 | ANN based-FL | UNSW-NB15 | 93.6 | — | None |  | [40] | 2022 | Neural network that uses transformer | NSL-KDD | 99.48 | 99.49 | None |  | [41] | 2023 | Gower dissimilarity matrices | TON_IOT | 95.5 | 96 | None |  | [54] | 2020 | MLP | NSL-KDD | 98.11 | — | None |  | [55] | 2021 | CNN + GRU | Industrial CPS | 99.20 | 98.86 | None |  | Our model | CNN + BiLSTM + LSTM | InSDN CICIDS2017
 | 99.98 99.58
 | 99.98 99.38
 | TLS V 1.3 |  | 
 | 
 |