Fig 1.
Function of signature-based and anomaly-based IDS.
Table 1.
Literature review comprising main studies.
Fig 2.
Proposed solution of IDS.
Fig 3.
Flow chart of the proposed methodology.
Fig 4.
Depicts attacks on CIC-IDS2017.
Fig 5.
Depicts attacks on NSL-KDD.
Table 2.
Accuracy results on the CIC-IDS2017 dataset.
Table 3.
Using the CIC dataset, accuracy comparison with other literature.
Fig 6.
Confusion matrix of DT.
Fig 7.
Confusion matrix of RF.
Fig 8.
Confusion matrix of XGboost.
Fig 9.
Confusuion matrix of AdaBoost.
Fig 10.
Confusion matrix of CataBoost.
Table 4.
The accuracy result on NSL-KDD dataset.
Fig 11.
Confusion matrix of DT.
Fig 12.
Confusion matrix of RF.
Fig 13.
Confusion matrix of XGboost.
Fig 14.
Confusuion matrix of AdaBoost.
Fig 15.
Confusuion matrix of CataBoost.
Table 5.
Using the NSL dataset to compare accuracy to other research.
Fig 16.
Models’ F1-score and accuracy on the NSL-KDD dataset and CIC207.
Fig 17.
CIC-2017 dataset training period.
Fig 18.
NSLKDD dataset training period.
Table 6.
NSL-KDD dataset results.
Table 7.
CIC-IDS2017 result.