Research Article

Lightweight Intrusion Detection Model of the Internet of Things with Hybrid Cloud-Fog Computing

Table 5

Statistics of various types of samples in the training set and test set.

DatasetsSample typesNumber of samplesProportion of each type (%)

TON-IoT training setBackdoor(0)182654.34
DDoS(1)182654.34
DoS(2)182644.34
Injection(3)182654.34
MITM(4)9520.23
Normal(5)27397265.07
Password(6)182654.34
Ransomware(7)182654.34
Scanning(8)182654.34
XSS(9)182654.34

TON-IoT test setBackdoor(0)17354.34
DDoS(1)17354.34
DoS(2)17364.34
Injection(3)17354.34
MITM(4)910.23
Normal(5)2602865.07
Password(6)17354.34
Ransomware(7)17354.34
Scanning(8)17354.34
XSS(9)17354.34

BoT-IoT training setDoS(0)171655352.518
DDoS(1)147032344.984
Recon(2)4250.013
Normal(3)811512.483
Theft(4)700.002

BoT-IoT test setDoS(0)21007152.518
DDoS(1)17993744.984
Recon(2)520.013
Normal(3)99312.483
Theft(4)90.002