Research Article
[Retracted] IOT and Blockchain-Based Cloud Model for Secure Data Transmission for Smart City
Table 2
Comparison of machine learning based intrusion detection systems.
| Machine learning | Data set | Confusion matrix | ACC | TPR | FPR |
| DNN + LSTM [5] | KDD99 | 0.85 | 0.86 | 0.81 | BP + LM [6] | KDD99 | 0.92 | 0.91 | 0.86 | DBN + GA [9] | NSL-KDD | 0.93 | 0.92 | 0.89 | CNN + WDLSTM [14] | UNSW-NB15 | 0.91 | 0.92 | 0.94 | HKELM + KPCA + DEGSA [15] | KDD99 | 0.89 | 0.86 | 0.85 | DFNN + RRS-K–means [16] | UNSW-NB15 | 0.88 | 0.86 | 0.85 | DT + PIO [17] | KDD99 UNSW-NB15 TE | 0.92 | 0.94 | 0.91 | SVM [20] | NSL-KDD | 0.89 | 0.91 | 0.78 | Proposed model | KDD99 NSL-KDD UNSW-NB15 | 0.94 | 0.93 | 0.95 |
|
|