Review Article

Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection

Table 6

Detail of KDD dataset attributes with different classes.

S. no.Dataset feature nameClasses

1DurationBasic
2protocol_typeBasic
3ServiceBasic
4src_bytesBasic
5dst_bytesBasic
6FlagBasic
7LandBasic
8wrong_fragme ntBasic
9UrgentBasic
10HotContent
11num_failed_lo ginsContent
12logged_inContent
13num_compro missedContent
14root_shellContent
15su_attemptedContent
16num_rootContent
17num_file_crea tionsContent
18num_shellsContent
19num_access_fi lessContent
20num_outboun d_cmdsContent
21is_hot_loginContent
22is_guest_loginContent
23CountTraffic
24serror_rateTraffic
25rerror_rateTraffic
26same_srv_ rateTraffic
27diff_srv_r ateTraffic
28srv_countTraffic
29srv_serror_rateTraffic
30srv_rerror_rateTraffic
31srv_diff_h ost_rateTraffic
32dst_host_countHost
33dst_host_srv_co untHost
34dst_host_same_ srv_rateHost
35dst_host_diff_sr v_rateHost
36dst_host_same_src_port_rateHost
37dst_host_countHost
38dst_host_srv_co untHost
39dst_host_same_ srv_rateHost
40dst_host_diff_sr v_rateHost
41dst_host_srv_re rror_rateHost
42ClassHost