Research Article

An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic

Table 1

Extracted feature attributes.

Feature nameFeature description

origin_ipSource IP address
destination_ipDestination IP address
port_numberPort number
durationConnection duration
protocol_typeProtocol type
serviceType of network service of the destination host
flagConnection normal or error state, and this field is discrete type
src_bytesNumber of bytes of data from the source host to the destination host
dst_bytesNumber of bytes of data from the destination host to the source host
wrong_fragmentNumber of wrong fragments, and this field is continuous type
urgentNumber of urgent packages, and this field is continuous type
dst_host_srv_error_ratePercentage of connections with SYN errors
hotNumber of accesses to sensitive files and directories on the system
mark_statusMark status
packet_ratePacket sending rate
max_pktLensMaximum message length
min_pktLensMinimum message length
num_compromisedNumber of occurrences of compromised condition
num_access_filesNumber of access control files
same_srv_ratePercentage of connections with the same service as the current connection
dst_host_srv_countNumber of connections with the same destination host service as the current connection