Research Article

Improving the Accuracy of Network Intrusion Detection with Causal Machine Learning

Figure 12

The accuracy and the number of training samples required for the four methods (there are multiple types of cyberattacks). (a) Z-score. (b) SMOTE. (c) CFS. (d) CRFS.
(a)
(b)
(c)
(d)