Research Article
Feature-Weighted Naive Bayesian Classifier for Wireless Network Intrusion Detection
Figure 3
ROC diagram using five methods under different types of attacks. (a) Normal detection. (b) DoS attack. (c) Probe attack. (d) R2L attack. (e) U2R attack.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |