Research Article
A Novel Method for Network Intrusion Detection
Table 2
Experimental results of five datasets of FCTA algorithm.
| ā | (percent) | (percent) | (percent) | A | B | C | D | A | B | C | D | A | B | C | D |
| T1 | 84.07 | 91.13 | 92.40 | 93.87 | 3.75 | 2.03 | 3.04 | 2.19 | 81.03 | 89.42 | 91.26 | 92.89 | T2 | 84.47 | 93.01 | 93.50 | 94.02 | 2.25 | 1.73 | 1.58 | 1.94 | 81.15 | 91.70 | 92.27 | 93.01 | T3 | 82.80 | 94.06 | 93.64 | 94.31 | 3.20 | 1.84 | 1.40 | 1.99 | 79.30 | 93.04 | 92.40 | 93.39 | T4 | 81.33 | 93.70 | 94.43 | 94.58 | 2.70 | 1.82 | 1.91 | 1.70 | 77.34 | 92.58 | 93.51 | 93.65 | T5 | 82.26 | 93.02 | 94.61 | 95.51 | 2.40 | 1.98 | 1.99 | 0.98 | 78.43 | 91.77 | 93.76 | 94.63 |
|
|