Research Article

Using Graph Representation in Host-Based Intrusion Detection

Table 2

Classification result of different embedding methods.

Embedding methodsClassifierAUCRecallAccuracy

Bag-of-wordsKNN0.91720.89830.9352
TF-IDFKNN0.89170.86440.9172
N-gramKNN0.90360.87290.9327
Word2VecKNN0.90790.88140.9329
GRSEKNN0.92070.89830.9419
Bag-of-wordsMLP0.94831.00.8993
TF-IDFMLP0.94950.99150.9097
N-gramMLP0.94451.00.8919
Word2VecMLP0.94550.98300.9100
GRSEMLP0.95550.99150.9213