Table 4 CT assessment of the EIDCDR-XAIADL approach under the NSLKDD dataset.

From: Enhanced intrusion detection in cybersecurity through dimensionality reduction and explainable artificial intelligence

NSLKDD dataset

Methods

CT (sec)

EIDCDR-XAIADL

8.78

ATFDNN

18.30

IPSO

10.81

E-LSTM

17.54

XAIID-SCPS

10.03

LIB-SVM

19.33

Supervised NIDS

11.41

MCA-LSTM

17.98

GRU method

11.83

Simple RNN

15.10

FFDNN

16.47