Research Article

Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering

Table 5

Comparison table with the state-of-the-art literature works.

AuthorsTechniquesAccuracy (%)Outcome

Hemalatha et al. [14]ANN89Intrusion
Debar et al. [28]ANN87Anomaly
Yassin et al. [29]Decision trees78Anomaly
Gandhi et al. [30]Decision trees89Anomaly
Our approachConvolutional Neural Networks99Anomaly, outlier, and inlier