From: A novel two-phase cycle algorithm for effective cyber intrusion detection in edge computing
Type | DATASUBSET1 | DATASUBSET2 | DATASUBSET3 | ||||||
---|---|---|---|---|---|---|---|---|---|
Training | Validation | Test | Training | Validation | Test | Training | Validation | Test | |
Normal | 1000 | 1000 | 1000 | 4000 | 2000 | 2000 | 70,266 | 8783 | 8783 |
Probe | 1000 | 1000 | 1000 | 3000 | 1500 | 1500 | 1705 | 213 | 213 |
DoS | 1000 | 1000 | 1000 | 4000 | 2000 | 2000 | 43,658 | 5457 | 5457 |
U2R | 100 | 50 | 100 | 100 | 70 | 90 | 42 | 5 | 5 |
R2L | 1000 | 1000 | 1000 | 2000 | 600 | 1300 | 799 | 100 | 100 |
Total | 4100 | 4050 | 4100 | 13,100 | 6170 | 6890 | 116,470 | 14,558 | 14,558 |