Research Article

Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset

Table 4

Comparing the proposed system with related works on TPR.

Method
ClassGV-SVM [7]CFS-ABC-AFS [10]BMM-ADS [11]5-DNN [13]RFE-SMOTE [14]SOM-GA [15]DO-IDS [16]The proposed system

Normal98.4792.893.492.810088.396.797.41
Analysis80.1183.401858.86.198.89
Backdoors63.463.834.41164.740.398.11
DoS91.2283.389.697.73266.946.182.47
Exploits67.3163.779.41.38279.166.386.05
Fuzzers94.3960.352.808957.538.195.08
Generic96.6987.386.357.19989.196.997.05
Reconnaissance87.1549.355.61.87678.182.093.16
Shellcode10070.948.708855.078.099.86
Worms55.347.801665.979.599.91