Research Article
Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning
Table 6
Description of traffic characteristics.
| Name | Description |
| Protocol | Type of the protocol used | Flow duration | Length of connection | Flow Bytes (s) | Number of data bytes | Flow Packets (s) | Number of data packets | Flow IAT | Packets flow interarrival time | Fwd IAT | Forward interarrival time | Bwd IAT | Backward interarrival time | Active time | The amount of time a flow was active before becoming idle | Idle | The amount of time a flow was idle before becoming active |
|
|