Research Article

Multistage System-Based Machine Learning Techniques for Intrusion Detection in WiFi Network

Table 4

The parameters used in data sets.

MethodsO-AWID1O-AWID2O-AWID3O-AWID4O-AWID5

FLDS (k, nc, θ)(25, 30, 6)(25, 30, 6)(25, 30, 6)(25, 45, 6)(25, 45, 6)
LOF (MinPts, η)(27, 1.2)(27, 1.2)(25, 1.2)(25, 1.2)(27, 1.2)

k: the number of nearest neighbors; nc: number of cluster used; θ: the threshold.