Review Article

Data Fusion for Network Intrusion Detection: A Review

Table 3

The performance of different decision reduction algorithms.

Decision fusion techniquesMetrics
ArticleDatasetNumber of training/testing dataClassifierIdentified attack typesValidityData securityScalability
ACCPRRRF-ScoreFPRFNR

D-S Evidence Theory [31]KDD99Multiclass SVMAttack/normal95.10%0.19%4.74%××
[32]KDD99RBF-NNDos99.08%0.71%××
[33]KDD9930000/30000C4.5Attack/normal98.90%××
BN96.70%××
NN99.20%××
MDT86.30%××
D-S fusion99.10%××

RF [15]KDD99_10%16919/49838RFAttack/normal94.20%1.10%××

Adaboost [34]KDD99494021/311029Decision stumpsAttack/normal90.02%1.68%××

NN [35] DARPA99PHAD All99%35%28.00%31%××
ALAD99%38%32.00%35%××
Snort99%9%51.00%15%××
Data-dependent fusion99%39%68.00%50%××

RBF-NN [32]KDD99RBF-NNDos99.59%0.63%××

Majority voting rule [36]NSL_KDD8105/11695BNAttack/normal93.10%91.90%92.20%××
IBK99.60%99.60%99.60%××
J4898.50%98.50%98.50%××
SVM98.50%92.90%92.60%××
Classifier fusion99.10%99.40%99.20%××

MLP [37] KDD99 833/7436MLP-4 intrinsic features Attack/normal3.19%××
MLP-7 content features2.25%××
MLP-19 traffic features23.94%××
MLP-30 features3.57%××

PHAD: packet header anomaly detection system; ALAD: application layer anomaly detector; MDT: Multirandom Decision Tree; and IBK: lazy classifier. given. mentioned. Number of features (): and represent the number of features before and after fusion, respectively.