Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

IoT deployment.

More »

Fig 1 Expand

Fig 2.

Accuracy comparison by attack type.

More »

Fig 2 Expand

Fig 3.

Correlation heatmap of selected features.

More »

Fig 3 Expand

Fig 4.

Enhanced intrusion detection framework: Proposed model.

More »

Fig 4 Expand

Table 1.

Labels of normal and attack classes in the CICIDS-2017 dataset.

More »

Table 1 Expand

Table 2.

Summary of attack instances and detection accuracy.

More »

Table 2 Expand

Fig 5.

Distribution of attack types in dataset.

More »

Fig 5 Expand

Table 3.

Number of features selected.

More »

Table 3 Expand

Table 4.

Comparison of performance metrics with other models.

More »

Table 4 Expand

Fig 6.

Confusion Matrix – PSO-GA+ ELM-BA Model.

More »

Fig 6 Expand

Fig 7.

ROC Curve – PSO-GA+ELM-BA vs. baseline models.

More »

Fig 7 Expand

Table 5.

Comparison of performance metrics with other models.

More »

Table 5 Expand

Table 6.

Accuracy against each attack (class-wise performance).

More »

Table 6 Expand

Fig 8.

Normal vs abnormal traffic.

More »

Fig 8 Expand

Table 7.

Comparison with recent studies: Comparison with recent studies.

More »

Table 7 Expand