Research Article
Deep Learning-Based Network Security Data Sampling and Anomaly Prediction in Future Network
Table 2
Defender’s detection success rate of attack and score of the attacker.
| Experimental method | Defensive detection success rate | Attacker score |
| Topology 1 | Attack strategy 1 vs. defensive strategy 1 | 0.41 | 7.2 | Attack strategy 1 vs. defensive strategy 2 | 0.75 | 6.8 | Attack strategy 2 vs. defensive strategy 1 | 0.75 | 6.3 | Attack strategy 2 vs. defensive strategy 2 | 0.98 | 5.7 |
| Topology 2 | Attack strategy 1 vs. defensive strategy 1 | 0.62 | 3.1 | Attack strategy 1 vs. defensive strategy 2 | 0.96 | 2.1 | Attack strategy 2 vs. defensive strategy 1 | 0.96 | 2.2 | Attack strategy 2 vs. defensive strategy 2 | 0.99 | 2.4 |
| Topology 3 | Attack strategy 1 vs. defensive strategy 1 | 0.19 | 16.1 | Attack strategy 1 vs. defensive strategy 2 | 0.29 | 17.1 | Attack strategy 2 vs. defensive strategy 1 | 0.29 | 17.1 | Attack strategy 2 vs. defensive strategy 2 | 0.39 | 13.7 |
| Topology 4 | Attack strategy 1 vs. defensive strategy 1 | 0.41 | 8.5 | Attack strategy 1 vs. defensive strategy 2 | 0.75 | 7.3 | Attack strategy 2 vs. defensive strategy 1 | 0.75 | 7.3 | Attack strategy 2 vs. defensive strategy 2 | 0.98 | 6.1 |
|
|