Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Comparative analysis of selected IDS studies.

More »

Table 1 Expand

Fig 1.

Proposed system architecture.

More »

Fig 1 Expand

Table 2.

Class distribution before merging.

More »

Table 2 Expand

Table 3.

Attack category distribution (pre-binarization).

More »

Table 3 Expand

Table 4.

Cross-dataset feature harmonization.

More »

Table 4 Expand

Table 5.

Hyperparameter configuration and search space for evaluated models.

More »

Table 5 Expand

Table 6.

Class distribution of cybersecurity datasets.

More »

Table 6 Expand

Table 7.

Class-wise metrics and confusion matrix (random forest, merged dataset).

More »

Table 7 Expand

Table 8.

Weighted average metrics for top models (merged dataset).

More »

Table 8 Expand

Table 9.

Training time and efficiency trade-offs.

More »

Table 9 Expand

Table 10.

Class distribution in merged dataset (before and after SMOTE).

More »

Table 10 Expand

Fig 2.

Training vs validation accuracy across folds.

More »

Fig 2 Expand

Table 11.

Cross-dataset generalization.

More »

Table 11 Expand

Table 12.

Cross-validation results on individual datasets.

More »

Table 12 Expand

Table 13.

Cross-dataset performance drop.

More »

Table 13 Expand

Table 14.

Confusion matrix (aggregated) – Random forest (on harmonized merged dataset).

More »

Table 14 Expand

Fig 3.

Cross-dataset ROC curves.

More »

Fig 3 Expand

Fig 4.

Performance comparison bar chart (within vs cross dataset).

More »

Fig 4 Expand

Table 15.

Ablation study (merged dataset, random forest).

More »

Table 15 Expand

Fig 5.

Performance impact of each pipeline component.

More »

Fig 5 Expand

Table 16.

Tamper-evident hash log structure.

More »

Table 16 Expand

Fig 6.

Tamper-evident blockchain-style prediction log (cryptographic hash trace).

More »

Fig 6 Expand

Table 17.

Statistical significance test results.

More »

Table 17 Expand

Fig 7.

Statistical significance test (Mc Nemer/Wilcoxon).

More »

Fig 7 Expand

Table 18.

Average performance across all settings (NSL_ONLY, CIC_ONLY, MERGED).

More »

Table 18 Expand

Table 19.

Evaluation metrics reporting summary.

More »

Table 19 Expand

Table 20.

Performance metrics and efficiency trade-offs.

More »

Table 20 Expand

Table 21.

Recent State-of-the-Art Intrusion Detection System (IDS) approaches.

More »

Table 21 Expand