Research Article

An Adaptive Protection of Flooding Attacks Model for Complex Network Environments

Table 1

The CIDDS dataset attributes [34].

No.Feature nameFeature description

1Src IPIP address of the source node
2Src portPort of the source node
3Dest IPIP address of the destination node
4Dest portPort of the destination node
5ProtoProtocol
6Data are first seenStart time flow is first seen
7DurationFlow period
8BytesConveyed bytes
9PacketsConveyed packets
10FlagsTCP flags
11Attack descriptionAdditional information about the attack
12Attack typeType of attack
13Attack IDUnique attack ID
14ClassCategory or label of the instance