Research Article
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms
Table 8
Comparison between DO_IDS and RF on accuracy and FAR.
| ā | Accuracy | FAR | RF | DO_IDS | RF | DO_IDS |
| Normal | 0.865 | 0.935 | 0.124 | 0.033 | Generic | 0.989 | 1.0 | 0.033 | 0.031 | Exploits | 0.902 | 0.926 | 0.303 | 0.337 | Fuzzers | 0.876 | 0.953 | 0.971 | 0.619 | Reconnaissance | 0.984 | 0.988 | 0.849 | 0.180 | DoS | 0.915 | 0.931 | 0.583 | 0.539 | Analysis | 0.972 | 0.982 | 0.997 | 0.939 | Backdoor | 0.978 | 0.980 | 0.937 | 0.597 | Shellcode | 0.984 | 0.992 | 0.183 | 0.220 | Worms | 0.999 | 1.0 | 0.218 | 0.205 |
|
|