Review Article
Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection
Table 6
Detail of KDD dataset attributes with different classes.
| S. no. | Dataset feature name | Classes |
| 1 | Duration | Basic | 2 | protocol_type | Basic | 3 | Service | Basic | 4 | src_bytes | Basic | 5 | dst_bytes | Basic | 6 | Flag | Basic | 7 | Land | Basic | 8 | wrong_fragme nt | Basic | 9 | Urgent | Basic | 10 | Hot | Content | 11 | num_failed_lo gins | Content | 12 | logged_in | Content | 13 | num_compro missed | Content | 14 | root_shell | Content | 15 | su_attempted | Content | 16 | num_root | Content | 17 | num_file_crea tions | Content | 18 | num_shells | Content | 19 | num_access_fi less | Content | 20 | num_outboun d_cmds | Content | 21 | is_hot_login | Content | 22 | is_guest_login | Content | 23 | Count | Traffic | 24 | serror_rate | Traffic | 25 | rerror_rate | Traffic | 26 | same_srv_ rate | Traffic | 27 | diff_srv_r ate | Traffic | 28 | srv_count | Traffic | 29 | srv_serror_rate | Traffic | 30 | srv_rerror_rate | Traffic | 31 | srv_diff_h ost_rate | Traffic | 32 | dst_host_count | Host | 33 | dst_host_srv_co unt | Host | 34 | dst_host_same_ srv_rate | Host | 35 | dst_host_diff_sr v_rate | Host | 36 | dst_host_same_src_port_rate | Host | 37 | dst_host_count | Host | 38 | dst_host_srv_co unt | Host | 39 | dst_host_same_ srv_rate | Host | 40 | dst_host_diff_sr v_rate | Host | 41 | dst_host_srv_re rror_rate | Host | 42 | Class | Host |
|
|