Advances, Systems and Applications
From: A Transformer-based network intrusion detection approach for cloud security
 | Indicators | Benign | Botnet | Infilteration | DDoS | Web Attacks | Brute-force | DoS |
---|---|---|---|---|---|---|---|---|
Our | Accuracy | 0.9357 | 0.9998 | 0.9879 | 0.9477 | 0.9988 | 0.9997 | 0.9982 |
Precision | 0.9465 | 0.9971 | 0.4427 | 0.6441 | 0.8557 | 0.1724 | 0.9929 | |
Recall | 0.9833 | 0.9936 | 0.1178 | 0.3944 | 0.996 | 0.3698 | 0.8916 | |
F1-score | 0.9645 | 0.9954 | 0.1323 | 0.4892 | 0.9205 | 0.1211 | 0.9395 | |
CNN-LSTM | Accuracy | 0.9457 | 0.9997 | 0.9476 | 0.9985 | 0.9988 | 0.9992 | 0.9993 |
Precision | 0.9074 | 0.9952 | 0.6373 | 0.9953 | 0.0165 | 0.9837 | 0.9912 | |
Recall | 0.9816 | 0.9986 | 0.1747 | 0.9986 | 0.7143 | 0.9944 | 0.9996 | |
F1-score | 0.9452 | 0.9992 | 0.2722 | 0.9975 | 0.0323 | 0.989 | 0.9953 |