Research Article
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms
Table 4
Optimal sampling ratio for each class of anomalous behaviors.
| Class name | Sampling Ratio | Normal | Generic | Exploits | Fuzzers | Reconnaissance | DoS |
| Normal | 1.0 | 1.0 | 0.9 | 0.9 | 0.8 | 0.9 | Generic | 1.0 | 0.8 | 1.0 | 1.0 | 1.0 | 1.0 | Exploits | 1.0 | 1.0 | 1.0 | 1.0 | 0.9 | 1.0 | Fuzzers | 0.9 | 0.9 | 1.0 | 0.8 | 0.9 | 0.8 | Reconnaissance | 0.9 | 0.9 | 1.0 | 1.0 | 1.0 | 1.0 | DoS | 1.0 | 0.7 | 1.0 | 0.8 | 1.0 | 1.0 | Analysis | 0.9 | 1.0 | 0.8 | 0.7 | 0.9 | 0.9 | Backdoor | 1.0 | 0.9 | 1.0 | 0.7 | 1.0 | 0.9 | Shellcode | 0.9 | 0.6 | 0.9 | 1.0 | 1.0 | 0.9 | Worms | 1.0 | 0.7 | 1.0 | 0.7 | 0.8 | 1.0 |
|
|