Figures index

From

A Data Analytics System for Network Intrusion Detection Using Decision Tree

Terungwa Simon Yange, Oluoha Onyekwere, Yakubu Musa Abdulmuminu

Journal of Computer Sciences and Applications. 2020, 8(1), 21-29 doi:10.12691/jcsa-8-1-4
  • Figure 1. Sample of KDD’99 Dataset
  • Figure 2. Architectural Representation of the System
  • Figure 3. Confusion Matrix of the DoS and Probe attack
  • Figure 4. Confusion metrics of the DoS and Probe Attacks
  • Figure 5. U2R Attack
  • Figure 6. Denial of Service
  • Figure 7. Graphical representation of the U2R Attack Category
  • Figure 8. Graphical Representation of the Probe Attack Category