Research Article

Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing

Table 7

Example of a simplified session.

Field nameFeature valueCount number

EDST0x0000c0100
0x00105a100
ESRC0x0000c0100
0x00105a100
TOS0x00200
IL38199
1711
FF0x0000200
TTL255200
SRC172.16.112.10100
172.16.112.50100
DST172.16.112.10100
172.16.112.50100
SPNull200
TFNull200
TUNull200
TCNull200
TONull200
UCNull200
IC0xffff199
0xabcd1
PS60199
1851