Research Article

Deep Learning-Based Network Security Data Sampling and Anomaly Prediction in Future Network

Table 2

Defender’s detection success rate of attack and score of the attacker.

Experimental methodDefensive detection success rateAttacker score

Topology 1Attack strategy 1 vs. defensive strategy 10.417.2
Attack strategy 1 vs. defensive strategy 20.756.8
Attack strategy 2 vs. defensive strategy 10.756.3
Attack strategy 2 vs. defensive strategy 20.985.7

Topology 2Attack strategy 1 vs. defensive strategy 10.623.1
Attack strategy 1 vs. defensive strategy 20.962.1
Attack strategy 2 vs. defensive strategy 10.962.2
Attack strategy 2 vs. defensive strategy 20.992.4

Topology 3Attack strategy 1 vs. defensive strategy 10.1916.1
Attack strategy 1 vs. defensive strategy 20.2917.1
Attack strategy 2 vs. defensive strategy 10.2917.1
Attack strategy 2 vs. defensive strategy 20.3913.7

Topology 4Attack strategy 1 vs. defensive strategy 10.418.5
Attack strategy 1 vs. defensive strategy 20.757.3
Attack strategy 2 vs. defensive strategy 10.757.3
Attack strategy 2 vs. defensive strategy 20.986.1