Research Article

Network Intrusion Anomaly Detection Model Based on Multiclassifier Fusion Technology

Table 3

Anomaly detection algorithm performance comparison (anomaly ratio of 0.05).

DatasetPerformance metricsLODAAEPCAHBOSiForestMVWMVNB

CICIDS2017AUC0.6350.5760.5380.6320.6570.7630.7490.852
RECALL0.4970.4380.4010.5310.4920.7940.8210.886
Time (seconds)0.5118.3690.7320.9027.4367.0828.1988.073

UNSW-NB 15AUC0.6750.7390.8520.7240.9130.8710.9120.925
RECALL0.7240.7910.8930.8520.9370.8970.9430.961
Time (seconds)0.86710.0230.9921.9428.2416.9248.2458.128

KDDCUP 99AUC0.9420.9230.9240.9380.9530.9100.9280.956
RECALL0.9640.9570.9400.9640.9830.9240.9650.995
Time (seconds)0.7359.7101.3241.6728.0927.9428.1248.206