Research Article
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models
Table 2
Type of malicious attacks in KDD Cup 99.
| No. | Types of attack | Attacks in dataset | Quantity |
| 1 | DOS | Back, land, Neptune, pod, smurf, teardrop | 391458 | 2 | R2L | Ftpwrite, guesspasswd, imap, multihop, phf, spy, warezclient, warezmaster | 1126 | 3 | Probing | Ipsweep, nmap, portsweep, Satan | 4107 | 4 | U2R | Bufferoverflow, loadmodule, perl, rootkit | 22 |
|
|