Research Article
Research on Network Behavior Risk Measurement Method Based on Traffic Analysis
Table 6
Comparison table of various network security measurement methods.
| Common methods | Pr | Rc | F1 | Execution time (s) |
| KNN | 0.96 | 0.96 | 0.96 | 1908.23 | RF | 0.98 | 0.97 | 0.97 | 74.39 | AdaBoost | 0.77 | 0.84 | 0.77 | 1126.24 | MLP | 0.77 | 0.83 | 0.76 | 575.73 | Naïve Bayes | 0.88 | 0.04 | 0.04 | 14.77 | QDA | 0.97 | 0.88 | 0.92 | 18.79 | ID3 | 0.98 | 0.98 | 0.98 | 235.02 | BRM | 0.85 | 0.85 | 0.85 | 226 |
|
|