Review Article
Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection
Table 5
Complexities of various machine learning techniques.
| Algorithm | Complexity | Capability | References |
| ANN | O (emnk) | Low | e = no. of epoch, k = no. of neuron | Naive Bayesian | O (mn) | High | m = no. of training, n = no. of feature | SVM | R∧3 & nS | High | R = no. of free support vector | Decision tree | O (mn∧2) | Medium | M = no. of features | Clustering k-means | O (kmni) | High | I = no. of iteration, k = no. of cluster | Clustering hierarchical | O (n∧3) | High | N = no. of data points | Association rules | O (n∧2) | Low | N = no. of input transactions |
|
|