Research Article
A Mechanism for Detecting the Intruder in the Network through a Stacking Dilated CNN Model
Table 2
Recall,
-measure, and precision of some DL approaches.
| Type of traffic | Precision | SAE | -measure | Precision | DBN | -measure | Precision | DCAE | -measure | Recall | Recall | Recall |
| Standard | 97.1 | 96.7 | 96.4 | 96.2 | 96.3 | 96.4 | 98.6 | 99.7 | 98.7 | Scan | 99.5 | 98.5 | 98.5 | 98.6 | 98.4 | 98.7 | 99.3 | 99.7 | 99.8 | Exploit | 97.7 | 96.3 | 95.9 | 96.38 | 95.9 | 97.2 | 98.94 | 99.8 | 99.9 | Botnet | 97.4 | 98.8 | 98.10 | 97.4 | 98.7 | 97.2 | 99.7 | 99.8 | 99.2 | APT | 96.6 | 94.5 | 95.6 | 98.4 | 93.4 | 95.9 | 99.3 | 95.10 | 98.2 | Web-based | 98.9 | 98.6 | 98.8 | 97.8 | 98.7 | 98.8 | 99.3 | 99.6 | 99.04 | Total | 97.97 | 97.96 | 97.99 | 97.95 | 97.95 | 97.96 | 99.99 | 99.99 | 99.99 |
|
|