Review Article

Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection

Table 7

Comparative study of the performance of different research citations.

ReferencesDetection rate (%)Accuracy (%)FarTechniqueDatasets

[20]98.7095.60%SVM, naïve BayesianMIT Lincoln Lab, IDS
[21]96.1124.88PSO, SVMKDDCUP99
[23]AISnit DARPA LLDOS 1.0
[24]98MPSOKDDCUP
[26]98.530.0374PSO, SVMNSL-KDD
[27]9595BARTD, cuckooKDDCUP
[28]98.2/99.551.19/0.21MLP, PSO, GSA, cuckooDARPA and WINTER
[72]98.4/96GADARPA and WINTER
[25]96.7PSOKDDCUP
[69]85.13PSOLLDOS
[83]93.250.02ABCKDDCUP
[46]99.4PSO, SVMKDDCUP
[32]99.250.75PSO, SVMPMU2015
[55]84.29Multiple ELMNSL-KDD
[71]97.64MSVM, PSOKDDCUP
[21]97.70.002Hybrid PSOKDDCUP
[77]96.113.89PSO-SVMKDDCUP99
[74]99.920.029PSO RFKDDCUP99
[84]89.6RNNNSL-KDD
[84]92LSTMNSL-KDD
[85]93.20, 78.1, 66, 96.6DNNKDDCUP99, NSL-KDD, UNSW-NB15, WSN-DS
[86]81.8SVM RBFKDDCUP