Research Article

Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset

Table 3

Comparing the proposed system with related works on accuracy.

Method
ClassGV-SVM [7]RF [8]CNN [9]ELM [12]LCC-MI-SVM-FS [17]RF [18]The proposed system

Normal97.4599.5099.791.2675.898.16
Analysis2.00098.9699.184.6799.44
Backdoors5.00099.1199.283.5399.06
DoS91.2420.00094.7594.992.1298.14
Exploits79.1999.5061.889.1384.279.2193.91
Fuzzers96.396.891.3091.693.4398.92
Generic97.5197.0097.798.1691.596.3798.34
Reconnaissance91.5186.00094.6095.789.4598.74
Shellcode99.4580.00099.4099.592.7999.92
Worms70.00099.9299.965.3197.28