Review Article

Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection

Table 4

Performance comparison of different machine learning techniques.

ParametersANNNBSVMKNNDTRFDL
AccuracyHighHighHighLowLowHighHigh

Training timeHigh training time due to complexityLow training time due to simplicityHigh trainingHigh training timeHigh training time due to complex structuringHigh training timeHigh training time complex structuring

Execution timeAverageHighHighLowLowLowHigh

Large attributesDealing well with large attributesDealing well with large attributesDealing good with large attributes but speed will be very slowDealing well with large attributesAverage dealing with larger attributesDealing well with large attributesDealing good with large attributes but speed will be very slow

Lots of missing attributesContradictoryGood performedGood performedLow performedGood performedGood performedGood performed

Lots of noisy dataContradictoryBetter dealing with noiseBetter dealing with noiseLow capability dealing with noisy dataAverage dealing with noiseAverage dealing with noiseBetter dealing with noise but the overall process is time-consuming

Large datasetsCannot handle large dataset and speed of processing will be very slowBetter while handling large datasetAverage performed while handling large dataset but processing speed will be very slowBetter while handling large datasetAverage performedAverage performedBetter while handling large dataset but processing speed will be very slow due to complex structure

Detection rateHighHighHighLowHighLowHigh

Datasets suitableKDD99 and NSL-KDDKDD99 and NSL-KDDNSL-KDD, KDDCUP99, and DARPANSL-KDD, KDDCUP99, and DARPAKDDCUP99KDDCUP99KDD99 and NSL-KDD