Research Article

Network Intrusion Detection Method Based on FCWGAN and BiLSTM

Figure 5

Distribution of NSL-KDD training set types.