Research Article
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection
Table 8
Attack time and attack types of the CICIDS2017 dataset.
| Time | Type | Label | Amount | Total |
| Monday | Normal | BENIGN | 529918 | 529918 |
| Tuesday | Normal | BENIGN | 432074 | 445909 | Brute force | FTP patator | 7938 | SSH patator | 5897 |
| Wednesday | Normal | BENIGN | 440031 | 692703 | DoS | DoS GoldenEye | 10293 | DoS slowhttptest | 5499 | Dos slowloris | 5796 | Heart bleed | 11 |
| Thursday morning | Normal | BENIGN | 168186 | 170366 | Web attack | Web attack brute force | 1507 | Web attack sql injection | 21 | Web attack XSS | 652 |
| Thursday afternoon | Normal | BENIGN | 288566 | 288602 | Infiltration | Infiltrationdnt | 36 |
| Friday morning | Normal | BENIGN | 189067 | 191033 | Botnet | Bot | 1966 |
| Friday afternoon (1) | Normal | BENIGN | 97718 | 225745 | DDoS | DDoS | 128027 |
| Friday afternoon (2) | Normal | BENIGN | 127537 | 286467 | PortScan | PortScan | 158930 |
|
|