Review Article

Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection

Table 3

Comparative study among different machine learning techniques.

TechniquePrincipleParametersAdvantagesLimitations

k-meansFind out k points called centers that are evaluated as the sum of the distances of all points to their respective cluster centersCluster center locationHigh computation, produce closet clustersCalculation of K is a very tough task for a fixed number of clusters. The dissimilarity, the initial and final cluster partition

K-nearest neighborThe input consists of k-closest training of the feature space by using instance-based learningClass of nearest neighborIt is easy to implement, less complexDifficult to deal with arbitrary attributes

Support vector machineThe mapping of input data to the high-dimension space and also dealing with linearly separated data for classificationFeatures of high dimensionHaving high accuracy, flexible and robust in dealing with errorsTakes large time for training, complex to handle learned function (weights)

Hidden Markov modelIt is a statistical or sequence-based model that consists set of states, transitions represent the set of possible positionsPixels in a vision-based inputHigh-scalable model and easy to understandMany assumptions about the data. A large number of parameters required to be set. Highly needed training data