Review Article

Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection

Table 5

Complexities of various machine learning techniques.

AlgorithmComplexityCapabilityReferences

ANNO (emnk)Lowe = no. of epoch, k = no. of neuron
Naive BayesianO (mn)Highm = no. of training, n = no. of feature
SVMR3 & nSHighR = no. of free support vector
Decision treeO (mn2)MediumM = no. of features
Clustering k-meansO (kmni)HighI = no. of iteration, k = no. of cluster
Clustering hierarchicalO (n3)HighN = no. of data points
Association rulesO (n2)LowN = no. of input transactions