Research Article
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing
Table 7
Example of a simplified session.
| Field name | Feature value | Count number |
| EDST | 0x0000c0 | 100 | 0x00105a | 100 | ESRC | 0x0000c0 | 100 | 0x00105a | 100 | TOS | 0x00 | 200 | IL | 38 | 199 | 171 | 1 | FF | 0x0000 | 200 | TTL | 255 | 200 | SRC | 172.16.112.10 | 100 | 172.16.112.50 | 100 | DST | 172.16.112.10 | 100 | 172.16.112.50 | 100 | SP | Null | 200 | TF | Null | 200 | TU | Null | 200 | TC | Null | 200 | TO | Null | 200 | UC | Null | 200 | IC | 0xffff | 199 | 0xabcd | 1 | PS | 60 | 199 | 185 | 1 |
|
|