Research Article

The Abnormal Detection for Network Traffic of Power IoT Based on Device Portrait

Table 4

Comparison of the accuracy of different attack types and different algorithms.

AlgorithmTCP port scan (%)SYN denial (%)IP sharding attack (%)

Cluster analysis91.290.390.9
Logistic regression89.590.590.5
Decision tree89.188.380.3
Random forest88.778.585.8