Research Article

Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques

Figure 18

Precision of the normal and attack types evaluated by the NID-Shield NIDS on U2R attack.