Table 7 Comparative analysis of TTOCDM-XAIRNN approach under the CICIDS 2017 dataset22,23,36,37,38.

From: Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things

CICIDS 2017

Methods

\(\:\varvec{A}\varvec{c}\varvec{c}{\varvec{u}}_{\varvec{y}}\)

\(\:\varvec{P}\varvec{r}\varvec{e}{\varvec{c}}_{\varvec{n}}\)

\(\:\varvec{R}\varvec{e}\varvec{c}{\varvec{a}}_{\varvec{l}}\)

\(\:{\varvec{F}}_{\varvec{m}\varvec{e}\varvec{a}\varvec{n}\varvec{s}}\)

FURIA Method

98.14

97.57

96.93

98.26

Forest-PA

96.72

96.97

97.32

98.13

BLDSVM

90.41

95.25

95.37

96.08

BBPM Algorithm

97.71

95.27

94.37

98.29

BLR Model

91.97

98.12

97.77

92.12

GSAE Method

97.63

95.97

98.29

98.19

LIB-SVM

96.57

96.96

96.83

97.92

OC-SVM

96.77

97.03

97.37

98.20

DT

90.49

95.33

95.44

96.15

GWO-LOARF

97.76

95.35

94.44

98.35

TTOCDM-XAIRNN

98.87

98.87

98.87

98.87