Research Article
Computer Network Intrusion Anomaly Detection with Recurrent Neural Network
Table 2
Comparison with other methods.
| Methos | IADA | IADB | Precision | Recall | F1 | Precision | Recall | F1 |
| GA-LR | 84.9 | 81.5 | 83.2 | 85.7 | 82.8 | 84.1 | PCA-LSTM | 88.2 | 83.6 | 86.4 | 89.4 | 85.7 | 88.3 | NDAE | 91.7 | 87.8 | 90.1 | 93.4 | 89.9 | 91.4 | AMSOM | 93.5 | 89.8 | 91.7 | 95.7 | 91.2 | 93.6 | BiLSTM-DNN | 95.6 | 92.7 | 94.5 | 97.2 | 93.9 | 95.8 |
|
|