Review Article

Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey

Table 2

Feature set for each instance in KDDCup 99 dataset.

No.FeaturesTypes

1DurationContinuous
2protocol_typeSymbolic
3ServiceSymbolic
4FlagSymbolic
5src_bytesContinuous
6dst_bytesContinuous
7LandSymbolic
8wrong_fragmentContinuous
9UrgentContinuous
10HotContinuous
11num_failed_loginsContinuous
12logged_inSymbolic
13num_compromisedContinuous
14root_shellContinuous
15su_attemptedContinuous
16num_rootContinuous
17num_file_creationsContinuous
18num_shellsContinuous
19num_access_filesContinuous
20num_outbound_cmdsContinuous
21is_hosts_loginSymbolic
22is_guest_loginSymbolic
23CountContinuous
24srv_countContinuous
25serror_rateContinuous
26srv_serror_rateContinuous
27rerror_rateContinuous
28srv_rerror_rateContinuous
29same_srv_rateContinuous
30diff_srv_rateContinuous
31drv_diff_host_rateContinuous
32dst_host_countContinuous
33dst_host_srv_countContinuous
34dst_host_same_srv_countContinuous
35dst_host_diff_srv_rateContinuous
36dst_host_same_src_port_countContinuous
37dst_host_srv_diff_host_rateContinuous
38dst_host_serror_rateContinuous
39dst_host_srv_serror_rateContinuous
40dst_host_serror_rateContinuous
41dst_host_srv_rerror_rateContinuous