Research Article

LNNLS-KH: A Feature Selection Method for Network Intrusion Detection

Table 8

Attack time and attack types of the CICIDS2017 dataset.

TimeTypeLabelAmountTotal

MondayNormalBENIGN529918529918

TuesdayNormalBENIGN432074445909
Brute forceFTP patator7938
SSH patator5897

WednesdayNormalBENIGN440031692703
DoSDoS GoldenEye10293
DoS slowhttptest5499
Dos slowloris5796
Heart bleed11

Thursday morningNormalBENIGN168186170366
Web attackWeb attack brute force1507
Web attack sql injection21
Web attack XSS652

Thursday afternoonNormalBENIGN288566288602
InfiltrationInfiltrationdnt36

Friday morningNormalBENIGN189067191033
BotnetBot1966

Friday afternoon (1)NormalBENIGN97718225745
DDoSDDoS128027

Friday afternoon (2)NormalBENIGN127537286467
PortScanPortScan158930