Table 3 The cost matrix for analyzing the NSL-KDD dataset.
From: Using machine learning algorithms to enhance IoT system security
U2L | U2R | Probe | DoS | Normal | |
|---|---|---|---|---|---|
U2L | 0 | 1 | 1 | 1 | 4 |
U2R | 1 | 0 | 2 | 2 | 2 |
Probe | 2 | 1 | 0 | 2 | 1 |
DoS | 1 | 2 | 2 | 0 | 2 |
Normal | 2 | 2 | 1 | 2 | 0 |
From: Using machine learning algorithms to enhance IoT system security
U2L | U2R | Probe | DoS | Normal | |
|---|---|---|---|---|---|
U2L | 0 | 1 | 1 | 1 | 4 |
U2R | 1 | 0 | 2 | 2 | 2 |
Probe | 2 | 1 | 0 | 2 | 1 |
DoS | 1 | 2 | 2 | 0 | 2 |
Normal | 2 | 2 | 1 | 2 | 0 |