Intrusion Detection Systems (IDS) are essential for protecting wireless networks against an increasingly complex range of cyber threats. This study evaluates and compares the effectiveness of Naïve Bayes, Weighted Naïve Bayes, and Convolutional Neural Network (CNN) using the Network Security Laboratory-Knowledge Discovery and Data Mining (NSL-KDD) dataset. The Naïve Bayes model was used as a baseline due to its simplicity and computational efficiency, delivering consistent results across multiple iterations. The Weighted Naïve Bayes model, which incorporated a feature-weighting mechanism was used to improve precision and Receiver Operating Characteristics-Area Under Curve (ROC-AUC) scores while striking a balance between performance and interpretability. These qualities make it well-suited for real-time intrusion detection in wireless environments, where both transparency and resource efficiency are crucial. The Naïve Bayes model was used as a baseline for offering a straightforward and efficient classification approach with moderate overall performance while the Weighted Naïve Bayes model was used to enhance the standard version by introducing a feature-weighting mechanism, which improved precision and reduced false positives. The CNN model outperformed the Naïve Bayes-based approaches across all evaluation metrics, underscoring its ability to learn complex patterns in network traffic. The Weighted Naïve Bayes model was also used to strike a practical balance between accuracy and efficiency, making it especially suitable for wireless networks. The CNN model was used to deliver the highest scores across all evaluation metrics, including accuracy, precision, recall, F1-score, and ROC-AUC, reflecting its ability to learn complex patterns in the data. Experimental results demonstrated the potential of the Weighted Naïve Bayes model to support online learning and dynamic feature weighting, which is necessary for boosting adaptability to new and evolving attacks while preserving simplicity and transparency.
Published in | American Journal of Networks and Communications (Volume 14, Issue 2) |
DOI | 10.11648/j.ajnc.20251402.14 |
Page(s) | 59-70 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2025. Published by Science Publishing Group |
Intrusion Detection System, Naïve Bayes, Weighted Naïve Bayes, Convolution Neural Networks, Wireless Networks
Precision | Recall | F1-score | |
---|---|---|---|
0 | 0.6376 | 0.9380 | 0.7591 |
1 | 0.9271 | 0.5965 | 0.7259 |
Accuracy | 0.7436 | 0.7436 | 0.7436 |
Macro average | 0.7823 | 0.7673 | 0.7425 |
Weighted average | 0.8024 | 0.7436 | 0.7402 |
Iteration | Accuracy | Precision | Recall | F1 Score | ROC_AUC |
---|---|---|---|---|---|
1 | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
2 | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
3 | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
4 | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
5 | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
6 | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
7 | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
8 | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
9 | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
10 | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
Average Accuracy | Average Precision | Average Recall | Average F1-score | Average ROC_AUC |
---|---|---|---|---|
0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
Precision | Recall | F1-score | |
---|---|---|---|
0 | 0.6343 | 0.9766 | 0.7691 |
1 | 0.9701 | 0.5740 | 0.7212 |
Accuracy | 0.7474 | 0.7474 | 0.7474 |
Macro average | 0.8022 | 0.7753 | 0.7452 |
Weighted average | 0.8255 | 0.7474 | 0.7419 |
Iteration | Accuracy | Precision | Recall | F1 Score | ROC_AUC |
---|---|---|---|---|---|
1 | 0.7651 | 0.9232 | 0.6406 | 0.7564 | 0.9131 |
2 | 0.7635 | 0.9228 | 0.6379 | 0.7543 | 0.8529 |
3 | 0.7634 | 0.9244 | 0.6363 | 0.7538 | 0.9142 |
4 | 0.7623 | 0.9244 | 0.6343 | 0.7523 | 0.8844 |
5 | 0.7631 | 0.9240 | 0.6363 | 0.7536 | 0.8778 |
6 | 0.7639 | 0.9234 | 0.6382 | 0.7548 | 0.8775 |
7 | 0.7623 | 0.9245 | 0.6342 | 0.7523 | 0.8783 |
8 | 0.7623 | 0.9243 | 0.6344 | 0.7524 | 0.8841 |
9 | 0.7605 | 0.9254 | 0.6300 | 0.7497 | 0.9156 |
10 | 0.7627 | 0.9246 | 0.6349 | 0.7529 | 0.9150 |
AverAcc | Average Precision | Average Recall | Average F1-score | Average ROC_AUC |
---|---|---|---|---|
0.7629 | 0.9241 | 0.6357 | 0.7532 | 0.8913 |
Model | Accuracy | Precision | Recall | F1-Score | ROC_AUC Curve |
---|---|---|---|---|---|
Naïve Bayes | 0.7708 | 0.9160 | 0.6578 | 0.7657 | 0.8397 |
Weighted Naïve Bayes | 0.7629 | 0.9241 | 0.6357 | 0.7532 | 0.8913 |
CNN | 0.9720 | 0.9810 | 0.9906 | 0.9858 | 0.8848 |
IDS | Intrusion Detection Systems |
CNN | Convolutional Neural Network |
ROC-AUC | Receiver Operating Characteristics-Area Under Curve |
NSL-KDD | Network Security Laboratory-Knowledge Discovery and Data Mining |
BiLSTM | Bidirectional Long Short-Term Memory |
IoT | Internet of Things |
BiLSTM | Directional Long Short-Term memory |
UAVs | Unmanned Aerial Vehicles |
GNB | Gaussian Naïve Bayes |
MI | Mutual Information |
WNB | Weighted Naive Bayes |
[1] | IDC. (2024, October). Worldwide connected devices forecast grows to 17 billion. International Data Corporation. Available from |
[2] |
Cybersecurity Ventures. (2020, November 13). Cybercrime to cost the world $10.5 trillion annually by 2025.
https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/ |
[3] | Riggs, H., Tufail, S., Parvez, I., Tariq, M., & Khan, M. (2023). Impact, vulnerabilities, and mitigation strategies for cyber‑secure critical infrastructure. Sensors, 23(8), 4060. |
[4] | Momen, H., Essam, M., Bahaa, M., Mohamed, A., Gomaa, M., Hany, M., & Elsersy, W. (2024, July 8). Evaluating predictive models in cybersecurity: A comparative analysis of machine and deep learning techniques for threat detection [Preprint]. arXiv. |
[5] | Nazre, A., Singh, P., & Kumar, S. (2024). Machine Learning Approaches for Enhancing Cybersecurity in Networked Systems. Journal of Emerging Cybersecurity Technologies, 18(1), 12-27. |
[6] | Muthusubramanian, M., Mohamed, I. A., & Pakalapati, N. (2024). Machine learning for cybersecurity threat detection and prevention. International Journal of Innovative Science and Research Technology, 9(2). |
[7] | Cybersecurity and Infrastructure Security Agency (2024). Artificial Intelligence Use Cases. Retrieved from |
[8] | Mukkamala, S., Sung, A. H., & Abraham, A. (2005). Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications, 28(2), 167-182. |
[9] | Almosti, A. M., & Rahman, M. M. H. (2025). Analysis of Data Privacy Breaches Using Deep Learning in Cloud Environments: A Review. Electronics, 14(13), 2727. |
[10] | Hammad, M. A., & Abd El‑Latif, A. A. (2024). Artificial intelligence for biometrics and cybersecurity: Technology and applications (Eds.). Institution of Engineering and Technology. |
[11] | Alfahaid, A., Alalwany, E., Almars, A. M., Alharbi, F., Atlam, E., & Mahgoub, I. (2025). Machine learning-based security solutions for IoT networks: A comprehensive survey. Sensors, 25(11), 3341. |
[12] | Sarker, I. H. (2020). Cyberlearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks. arXiv preprint arXiv: 2104.08080. |
[13] | Dhameliya, N., Patel, B., & Patel, K. B. (2024). Machine learning in cybersecurity: A comprehensive analysis of intrusion detection systems. Journal of Sustainable Solutions, 1(4), 38-42. |
[14] | Joubari, A., & Guizani, M. (2024). Enhancing Cyber Security through Artificial Intelligence and Machine Learning: A Literature Review. Journal of Cyber Security, 6(1), 89-116. |
[15] | Alshuaibi, A., Almaayah, M., & Ali, A. (2025). Machine learning for cybersecurity issues: A systematic review. Journal of Cyber Security and Risk Auditing, 2025(1), 36-46. |
[16] |
Thomas, M. A. (2023). Machine Learning Applications for Cybersecurity. The Cyber Defense Review, 8(1), 87-99. Retrieved from
https://cyberdefensereview.army.mil/Portals/6/Documents/2023_Spring/Thomas_CDRV8N1-Spring-2023.pdf |
[17] | Kamal, H., & Mashaly, M. (2025). Enhanced Hybrid Deep Learning Models-Based Anomaly Detection Method for Two-Stage Binary and Multi-Class Classification of Attacks in Intrusion Detection Systems. Algorithms, 18(2), 69. |
[18] | Parker, D. (2023). The role of firewalls in modern network security. International Journal of Informatics Technology, 3(2), 45-52. |
[19] | Ojo, A. O. (2024). A review on the effectiveness of artificial intelligence and machine learning on cybersecurity. Journal of Knowledge, Logic, and Systems Theory, 4(1), 1-15. |
[20] | Singh, A., & Jang‑Jaccard, J. (2022). Autoencoder‑based unsupervised intrusion detection using multi‑scale convolutional recurrent networks. arXiv preprint arXiv: 2204.03779. |
[21] | Hartono, B., Silalahi, F. D., & Muthohir, M. (2024). Transformers in cybersecurity: Advancing threat detection and response through machine learning architectures. Journal of Technology Informatics and Engineering, 3(3), 382-396. |
[22] | Muniyandi, R. C., Rajeswari, R., & Rajaram, R. (2023). A lightweight Gaussian Naive Bayes classifier for intrusion detection in wireless sensor networks using the NSL-KDD dataset. International Journal of Cybersecurity Research, 15(2), 45-58. |
[23] | Okdem, S., & Okdem, S. (2024). Artificial Intelligence in Cybersecurity: A Review and a Case Study. Applied Sciences, 14(22), 10487. |
[24] | Iwendi, C., Rehman, S. U., Javed, A. R., Khan, S., & Srivastava, G. (2021). Sustainable security for the Internet of Things using artificial intelligence architectures. ACM Transactions on Internet Technology, 21(3), Article 73. |
[25] | Adegoke, M. A. (2021). Adaptive spam filtering system using complement Naïve Bayes model. International Journal of Adaptive and Innovative Systems, 3(1), 45-57. |
APA Style
Olagunju, O. A., Adegoke, M. A., Iwasokun, G. B., Adeyiga, A. J., Aderibigbe, S. O. (2025). A Practical Study of Naive Bayes and Weighted Naive Bayes Cybersecurity Models for Wireless Networks. American Journal of Networks and Communications, 14(2), 59-70. https://doi.org/10.11648/j.ajnc.20251402.14
ACS Style
Olagunju, O. A.; Adegoke, M. A.; Iwasokun, G. B.; Adeyiga, A. J.; Aderibigbe, S. O. A Practical Study of Naive Bayes and Weighted Naive Bayes Cybersecurity Models for Wireless Networks. Am. J. Netw. Commun. 2025, 14(2), 59-70. doi: 10.11648/j.ajnc.20251402.14
AMA Style
Olagunju OA, Adegoke MA, Iwasokun GB, Adeyiga AJ, Aderibigbe SO. A Practical Study of Naive Bayes and Weighted Naive Bayes Cybersecurity Models for Wireless Networks. Am J Netw Commun. 2025;14(2):59-70. doi: 10.11648/j.ajnc.20251402.14
@article{10.11648/j.ajnc.20251402.14, author = {Oyinkansola Anuoluwapo Olagunju and Michael Abejide Adegoke and Gabriel Babatunde Iwasokun and Adeleke Johnson Adeyiga and Stephen Ojo Aderibigbe}, title = {A Practical Study of Naive Bayes and Weighted Naive Bayes Cybersecurity Models for Wireless Networks }, journal = {American Journal of Networks and Communications}, volume = {14}, number = {2}, pages = {59-70}, doi = {10.11648/j.ajnc.20251402.14}, url = {https://doi.org/10.11648/j.ajnc.20251402.14}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20251402.14}, abstract = {Intrusion Detection Systems (IDS) are essential for protecting wireless networks against an increasingly complex range of cyber threats. This study evaluates and compares the effectiveness of Naïve Bayes, Weighted Naïve Bayes, and Convolutional Neural Network (CNN) using the Network Security Laboratory-Knowledge Discovery and Data Mining (NSL-KDD) dataset. The Naïve Bayes model was used as a baseline due to its simplicity and computational efficiency, delivering consistent results across multiple iterations. The Weighted Naïve Bayes model, which incorporated a feature-weighting mechanism was used to improve precision and Receiver Operating Characteristics-Area Under Curve (ROC-AUC) scores while striking a balance between performance and interpretability. These qualities make it well-suited for real-time intrusion detection in wireless environments, where both transparency and resource efficiency are crucial. The Naïve Bayes model was used as a baseline for offering a straightforward and efficient classification approach with moderate overall performance while the Weighted Naïve Bayes model was used to enhance the standard version by introducing a feature-weighting mechanism, which improved precision and reduced false positives. The CNN model outperformed the Naïve Bayes-based approaches across all evaluation metrics, underscoring its ability to learn complex patterns in network traffic. The Weighted Naïve Bayes model was also used to strike a practical balance between accuracy and efficiency, making it especially suitable for wireless networks. The CNN model was used to deliver the highest scores across all evaluation metrics, including accuracy, precision, recall, F1-score, and ROC-AUC, reflecting its ability to learn complex patterns in the data. Experimental results demonstrated the potential of the Weighted Naïve Bayes model to support online learning and dynamic feature weighting, which is necessary for boosting adaptability to new and evolving attacks while preserving simplicity and transparency. }, year = {2025} }
TY - JOUR T1 - A Practical Study of Naive Bayes and Weighted Naive Bayes Cybersecurity Models for Wireless Networks AU - Oyinkansola Anuoluwapo Olagunju AU - Michael Abejide Adegoke AU - Gabriel Babatunde Iwasokun AU - Adeleke Johnson Adeyiga AU - Stephen Ojo Aderibigbe Y1 - 2025/09/15 PY - 2025 N1 - https://doi.org/10.11648/j.ajnc.20251402.14 DO - 10.11648/j.ajnc.20251402.14 T2 - American Journal of Networks and Communications JF - American Journal of Networks and Communications JO - American Journal of Networks and Communications SP - 59 EP - 70 PB - Science Publishing Group SN - 2326-8964 UR - https://doi.org/10.11648/j.ajnc.20251402.14 AB - Intrusion Detection Systems (IDS) are essential for protecting wireless networks against an increasingly complex range of cyber threats. This study evaluates and compares the effectiveness of Naïve Bayes, Weighted Naïve Bayes, and Convolutional Neural Network (CNN) using the Network Security Laboratory-Knowledge Discovery and Data Mining (NSL-KDD) dataset. The Naïve Bayes model was used as a baseline due to its simplicity and computational efficiency, delivering consistent results across multiple iterations. The Weighted Naïve Bayes model, which incorporated a feature-weighting mechanism was used to improve precision and Receiver Operating Characteristics-Area Under Curve (ROC-AUC) scores while striking a balance between performance and interpretability. These qualities make it well-suited for real-time intrusion detection in wireless environments, where both transparency and resource efficiency are crucial. The Naïve Bayes model was used as a baseline for offering a straightforward and efficient classification approach with moderate overall performance while the Weighted Naïve Bayes model was used to enhance the standard version by introducing a feature-weighting mechanism, which improved precision and reduced false positives. The CNN model outperformed the Naïve Bayes-based approaches across all evaluation metrics, underscoring its ability to learn complex patterns in network traffic. The Weighted Naïve Bayes model was also used to strike a practical balance between accuracy and efficiency, making it especially suitable for wireless networks. The CNN model was used to deliver the highest scores across all evaluation metrics, including accuracy, precision, recall, F1-score, and ROC-AUC, reflecting its ability to learn complex patterns in the data. Experimental results demonstrated the potential of the Weighted Naïve Bayes model to support online learning and dynamic feature weighting, which is necessary for boosting adaptability to new and evolving attacks while preserving simplicity and transparency. VL - 14 IS - 2 ER -