Research Article
Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication
Table 5
Availability attacks on Kitsune network.
| S/no. | Algorithms | Threshold value | Kitsune score (%) | Lp distances | L0 | L1 | L2 | L∞ |
| (1) | FGSM | 1.0 | 4 | 100 | 76.53 | 7.03 | 0.69 | (2) | JSMA | 1.0 | 0 | — | — | — | — | (3) | C&W | 1.0 | 100 | 100 | 21.32 | 7.98 | 5.46 | (4) | ENM | 1.0 | 100 | 7.85 | 20.09 | 7.48 | 3.68 | (5) | Our algorithm | 1.0 | 100 | 5.87 | 13.33 | 6.09 | 2.45 |
|
|