Research Article

Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning

Table 6

Description of traffic characteristics.

NameDescription

ProtocolType of the protocol used
Flow durationLength of connection
Flow Bytes (s)Number of data bytes
Flow Packets (s)Number of data packets
Flow IATPackets flow interarrival time
Fwd IATForward interarrival time
Bwd IATBackward interarrival time
Active timeThe amount of time a flow was active before becoming idle
IdleThe amount of time a flow was idle before becoming active