Fig. 7From: Network intrusion detection using data dimensions reduction techniquesThe overall KDD dataset structureBack to article page