Research Article
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering
Table 5
Comparison table with the state-of-the-art literature works.
| Authors | Techniques | Accuracy (%) | Outcome |
| Hemalatha et al. [14] | ANN | 89 | Intrusion | Debar et al. [28] | ANN | 87 | Anomaly | Yassin et al. [29] | Decision trees | 78 | Anomaly | Gandhi et al. [30] | Decision trees | 89 | Anomaly | Our approach | Convolutional Neural Networks | 99 | Anomaly, outlier, and inlier |
|
|