Research Article

Feature-Weighted Naive Bayesian Classifier for Wireless Network Intrusion Detection

Figure 3

ROC diagram using five methods under different types of attacks. (a) Normal detection. (b) DoS attack. (c) Probe attack. (d) R2L attack. (e) U2R attack.
(a)
(b)
(c)
(d)
(e)