Research Article

Network Intrusion Anomaly Detection Model Based on Multiclassifier Fusion Technology

Table 4

Anomaly detection algorithm performance comparison (anomaly ratio of 0.1).

DatasetPerformance metricsLODAAEPCAHBOSiForestWVWMVNB

CICIDS2017AUC0.6290.6430.6830.5130.7530.7890.8190.842
RECALL0.3890.4210.5690.4920.6280.8530.8530.896
Time (seconds)0.4416.6490.4840.1977.3913.7243.6213.604

UNSW-NB 15AUC0.7210.6910.7830.6890.9270.9190.9240.943
RECALL0.7520.8030.9020.7620.9320.9340.9510.958
Time (seconds)0.5298.2360.6920.3849.2424.0454.5784.248

KDDCUP 99AUC0.9280.9560.9310.9280.9540.8940.9270.961
RECALL0.9520.9690.9500.9550.9850.9610.9850.993
Time (seconds)0.5027.9230.6690.3288.9273.9284.0294.293