Research Article
Intrusion Detection System for IoT Based on Deep Learning and Modified Reptile Search Algorithm
Table 2
Attack types in KDDCup-99 and NSL-KDD.
| Dataset | Split | U2R | DoS | R2L | Probe | Normal |
| NSL-KDD | Train | 52 | 45,927 | 995 | 11,656 | 67,343 | Test | 67 | 7458 | 2887 | 2422 | 9710 |
| KDDCup-99 | Train | 52 | 391,458 | 1126 | 4107 | 97,278 | Test | 228 | 229,853 | 16,189 | 4166 | 60,593 |
|
|