Research Article

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models

Table 2

Type of malicious attacks in KDD Cup 99.

No.Types of attackAttacks in datasetQuantity

1DOSBack, land, Neptune, pod, smurf, teardrop391458
2R2LFtpwrite, guesspasswd, imap, multihop, phf, spy, warezclient, warezmaster1126
3ProbingIpsweep, nmap, portsweep, Satan4107
4U2RBufferoverflow, loadmodule, perl, rootkit22