Research Article

Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering

Table 3

Traffic features computed using a two-second time window.

Feature nameDescriptionType

countAmount of connections to the same host as the existing link in the last two seconds
Note: these same host connections apply to the following functions
Continuous
serror_ratePercent of links with “SYN” errorsContinuous
rerror_ratePercent of connections with “REJ” errorsContinuous
same_srv_ratePercent of connections with the same serviceContinuous
diff_srv_ratePercent of links to various networksContinuous
srv_countAmount of connections to the same service as the existing link in the last two seconds
Note: these same service links are referred to as the following functions
Continuous
srv_serror_ratePercent of links with “SYN” errorsContinuous
srv_rerror_ratePercent of connections with “REJ” errorsContinuous
srv_diff_host_ratePercent of connections between different hostsContinuous