Table 7 Analysis of the computational complexity of suggested methodology and the current methodologies within the study’s domain .

From: Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection

Study

Dataset

Computation Time (ms)

Imrana et al.57,

IoTID20

153

Kareem et al.58,

IoTID20

154

Soleymanzadeh et al.59,

IoTID20

122

Cao et al.55,

NSLKDD

138

Fu et al.56,

NSLKDD

168

Proposed IDS59

IoTID20

62

Proposed

NSLKDD

46