Research Article

Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach

Table 5

Network traffic packet labelling for the binary detection engine.

Packet typePrevious valueNew value

Normal trafficNormal0
Intrusion (malicious) trafficDoS, U2R, R2L, probe1