Research Article
Smart Congestion Control in 5G/6G Networks Using Hybrid Deep Learning Techniques
Table 7
Fusion results of the proposed cyber-attack detection model.
| S. NO. | Naïve Bayes | SVM | The proposed cyber-attack detection model | The human expert decision of the cyber-attack detection model | Probability of correctness | Probability of errors |
| 1 | 19.1 (no) | 24.1 (no) | 17.4 (no) | No | 1 | 0 | 2 | 3.5 (no) | 71.1 (yes) | 22.6 (no) | No | 1 | 0 | 3 | 27.1 (no) | 24.1 (no) | 22.6 (no) | No | 1 | 0 | 4 | 27.1 (no) | 24.1 (no) | 22.6 (no) | No | 1 | 0 | 5 | 27.1 (no) | 24.1 (no) | 22.6 (no) | No | 1 | 0 | 6 | 27.1 (no) | 24.1 (no) | 22.6 (no) | No | 1 | 0 | 7 | 76.1 (yes) | 71.1 (yes) | 72.5 (yes) | Yes | 1 | 0 | 8 | 78.1 (yes) | 71.1 (yes) | 72.5 (yes) | Yes | 1 | 0 | 9 | 28.1 (no) | 71.1 (yes) | 22.6 (no) | No | 1 | 0 | 10 | 90.5 (yes) | 71.1 (yes) | 72.5 (yes) | Yes | 1 | 0 | 11 | 76.1 (yes) | 71.1 (yes) | 72.5 (yes) | Yes | 1 | 0 | 12 | 91.3 (yes) | 71.1 (yes) | 22.6 (yes) | Yes | 1 | 0 | 13 | 19.1 (no) | 24.1 (no) | 17.4 (no) | No | 1 | 0 | 14 | 27.1 (no) | 24.1 (no) | 22.6 (no) | No | 1 | 0 | 15 | 19.1 (no) | 24.1 (no) | 22.6 (no) | Yes | 0 | 1 |
|
|