Research Article
Integrating Traffics with Network Device Logs for Anomaly Detection
Table 3
The collection details for traffic data.
| Type | Traffic Amount | Name |
| Normal | 30 | N/A | XSS | 6 | N/A | Phishing | 5 | N/A | HTTP botnets[20] | 7 | Virut, Sogou | P2P botnets [21] | 13 | NSIS.ay, SMTP Spam, Zeus (C&C), UDP Storm, Zeus, Zero access, Weasel |
|
|