Research Article
Design of an Evolutionary Approach for Intrusion Detection
Table 8
Percentage improvement of the results of the proposed technique using NB as a base classifier.
| Classifier | NB | | | Boosted | NB | | Boosted | NB | | Dataset | DR | FPR | CID | DR | FPR | CID | DR | FPR | CID |
| KDD 1 | 18.90 | 25.00 | 27.91 | 13.06 | 18.72 | 17.86 | 18.90 | 25.00 | 27.91 | KDD 2 | 12.20 | 7.06 | 23.57 | 0.12 | 0.07 | 0.24 | 12.20 | 7.06 | 23.57 | ITFS 41 | 35.43 | −50.00 | 166.22 | 36.65 | −50.82 | 177.46 | 35.43 | −50.00 | 166.22 | ITFS 10 | 24.20 | −54.94 | 237.31 | 30.19 | −55.70 | 318.52 | 24.20 | −54.94 | 237.31 | ISCX 2012 | 118.75 | −24.73 | 454.21 | 108.61 | −22.22 | 390.08 | 118.75 | −24.73 | 454.21 |
|
|