Research Article
Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing
Table 7
BP network detection rate comparison with other optimization methods [
30].
| Detection method | Connection record | Normal record | Attack record | Detection rate (%) | Detection time (s) | Dos | Probe | U2R | R2L | ā | 835 | 500 | 200 | 15 | 100 | Rc | Rw | Rl |
| BP | 789 | 462 | 169 | 8 | 76 | 91.15 | 5.51 | 12.23 | 19.84 | POS-BP | 817 | 491 | 178 | 10 | 87 | 95.94 | 2.23 | 6.01 | 21.09 | GA-BP | 823 | 487 | 185 | 11 | 89 | 96.67 | 1.47 | 5.33 | 20.18 | DBN-BP | 826 | 496 | 189 | 10 | 93 | 97.82 | 1.13 | 3.36 | 21.25 |
|
|