Research Article
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments
Table 1
The CIDDS dataset attributes [
34].
| No. | Feature name | Feature description |
| 1 | Src IP | IP address of the source node | 2 | Src port | Port of the source node | 3 | Dest IP | IP address of the destination node | 4 | Dest port | Port of the destination node | 5 | Proto | Protocol | 6 | Data are first seen | Start time flow is first seen | 7 | Duration | Flow period | 8 | Bytes | Conveyed bytes | 9 | Packets | Conveyed packets | 10 | Flags | TCP flags | 11 | Attack description | Additional information about the attack | 12 | Attack type | Type of attack | 13 | Attack ID | Unique attack ID | 14 | Class | Category or label of the instance |
|
|