Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2021
/
Article
/
Tab 13
/
Research Article
An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM
Table 13
Attack categories and subtypes of attacks in the NSL-KDD dataset.
Categories of attack
Subtype
DoS
apache2, back, land, mailbomb, neptune, pod, processtable, smurf, teardrop, udpstorm, worm
U2R
buffer_overflow, loadmodule, perl, ps, sqlattack, rootkit, xterm
R2L
ftp_write, guess_passwd, httptunnel, phf, imap, multihop, named, sendmail, snmpgetattack, snmpguess, spy, warezclient, warezmaster, xlock, xsnoop
Probe
ipsweep, portsweep, mscan, nmap, saint, satan