Research Article

Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering

Table 2

Content features within a connection suggested by domain knowledge.

Feature nameDescriptionType

hotNumber of “hot” indicatorsContinuous
num_failed_loginsAmount of unsuccessful login attemptsContinuous
logged_in1 if signed in successfully; 0 otherwiseDiscrete
num_compromisedAmount of “committed” conditionsContinuous
root_shell1 if root shell has been obtained; 0 otherwiseDiscrete
su_attempted1 if the “your root” command was attempted; 0 otherwiseDiscrete
num_rootNumber of kinds of “root” accessContinuous
num_file_creationsNumber of file generation operationsContinuous
num_shellsRange of prompts for shellContinuous
num_access_filesAmount of access control files operationsContinuous
num_outbound_cmdsNumber of outbound commands in the ftp sessionContinuous
is_hot_login1 if the username is a “hot” login; 0 otherwiseDiscrete
is_guest_login 1 if the username is a “guest” login; 0 otherwiseDiscrete