Table 10 The presentation of deep learning tactics relative to normal and many categories of attacks in TON_IoT dataset.
Attack type | RNN | LSTM | Proposed |
|---|---|---|---|
Normals | 93 | 94 | 96 |
DDoSs | 94 | 95 | 98 |
Injections | 92 | 91 | 94 |
Passwords | 91 | 92 | 93 |
Backdoors | 93 | 95 | 96 |
Ransomwares | 94 | 96 | 97 |
XSS | 94 | 96 | 97 |
Scannings | 94 | 95 | 97 |