Research Article

LNNLS-KH: A Feature Selection Method for Network Intrusion Detection

Table 5

The distribution of sample categories.

Attack typesAttack names

DoSNeptune, back, land, pod, smurf, teardrop, mailbomb, Apache2, processtable, udpstorm, worm
ProbeIpsweep, nmap, portsweep, Satan, mscan, saint
R2Lftp_write, guess_passwd, imap, multihop, phf, spy, warezclient, warezmaster, sendmail, named, snmpgetattack, snmpguess, xlock, xsnoop, httptunnel
U2Rbuffer_overflow, loadmodule, perl, rootkit, ps, sqlattack, xterm