Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

Function of signature-based and anomaly-based IDS.

More »

Fig 1 Expand

Table 1.

Literature review comprising main studies.

More »

Table 1 Expand

Fig 2.

Proposed solution of IDS.

More »

Fig 2 Expand

Fig 3.

Flow chart of the proposed methodology.

More »

Fig 3 Expand

Fig 4.

Depicts attacks on CIC-IDS2017.

More »

Fig 4 Expand

Fig 5.

Depicts attacks on NSL-KDD.

More »

Fig 5 Expand

Table 2.

Accuracy results on the CIC-IDS2017 dataset.

More »

Table 2 Expand

Table 3.

Using the CIC dataset, accuracy comparison with other literature.

More »

Table 3 Expand

Fig 6.

Confusion matrix of DT.

More »

Fig 6 Expand

Fig 7.

Confusion matrix of RF.

More »

Fig 7 Expand

Fig 8.

Confusion matrix of XGboost.

More »

Fig 8 Expand

Fig 9.

Confusuion matrix of AdaBoost.

More »

Fig 9 Expand

Fig 10.

Confusion matrix of CataBoost.

More »

Fig 10 Expand

Table 4.

The accuracy result on NSL-KDD dataset.

More »

Table 4 Expand

Fig 11.

Confusion matrix of DT.

More »

Fig 11 Expand

Fig 12.

Confusion matrix of RF.

More »

Fig 12 Expand

Fig 13.

Confusion matrix of XGboost.

More »

Fig 13 Expand

Fig 14.

Confusuion matrix of AdaBoost.

More »

Fig 14 Expand

Fig 15.

Confusuion matrix of CataBoost.

More »

Fig 15 Expand

Table 5.

Using the NSL dataset to compare accuracy to other research.

More »

Table 5 Expand

Fig 16.

Models’ F1-score and accuracy on the NSL-KDD dataset and CIC207.

More »

Fig 16 Expand

Fig 17.

CIC-2017 dataset training period.

More »

Fig 17 Expand

Fig 18.

NSLKDD dataset training period.

More »

Fig 18 Expand

Table 6.

NSL-KDD dataset results.

More »

Table 6 Expand

Table 7.

CIC-IDS2017 result.

More »

Table 7 Expand