Research Article

Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets

Table 4

The distribution of the network traffic between different categories before and after noise filtering in both the training and the testing portion of the UNSW-NB15.

Traffic categoriesThe training portionThe testing portion
Before noise filteringAfter noise filteringBefore noise filteringAfter noise filtering
No. of instancesDistribution (%)No. of instancesDistribution (%)No. of instancesDistribution (%)No. of instancesDistribution (%)

Normal56,00031.93777,50313.709337,00044.939910,04531.9213
Analysis20001.14061,2752.32966770.82225341.6969
Reconnaissance104915.98317,31313.36223,4964.24622,8018.9011
Shellcode11330.64618011.46353780.45912920.9279
Fuzzers1818410.37068,25315.07976,0627.36283,85112.2378
Worm1300.0741100.0182440.0534110.0349
Generic4000022.81265,65010.323518,87122.92067,05222.4100
DoS122646.99438,86816.20344,0894.96642,4427.7602
Exploits3339319.044613,67224.899011,13213.52083,98112.6509
Backdoors17460.99571,3842.52885830.70814591.4586