From: Apply machine learning techniques to detect malicious network traffic in cloud computing
ML model | Splitting (%) | Accuracy (%) |
---|---|---|
ANN | 90 | 96 |
ANN | 80 | 93 |
ANN | 70 | 97 |
KNN | 90 | 100 |
KNN | 80 | 99 |
KNN | 70 | 100 |
DTREE | 90 | 100 |
DTREE | 80 | 100 |
DTREE | 70 | 100 |
SVM | 90 | 68 |
SVM | 80 | 81 |
SVM | 70 | 84 |
Naïve Bayes | 90 | 60 |
Naïve Bayes | 80 | 60 |
Naïve Bayes | 70 | 60 |
Random Forest | 90 | 100 |
Random Forest | 80 | 100 |
Random Forest | 70 | 100 |