Research Article
Feature-Weighted Naive Bayesian Classifier for Wireless Network Intrusion Detection
Figure 3
ROC diagram using five methods under different types of attacks. (a) Normal detection. (b) DoS attack. (c) Probe attack. (d) R2L attack. (e) U2R attack.
(a) |
(b) |
(c) |
(d) |
(e) |