Research Article
E-minBatch GraphSAGE: An Industrial Internet Attack Detection Model
Table 1
UNSW-NB15 flow type, quantity and profile.
| Flow type | Quantity | Introduction |
| Normal | 2,218,761 | Normal data traffic | Fuzzers | 24,246 | Send randomly generated fuzzy data to the target to cause the target to error into a pause state | Analysis | 2,677 | Port scanning, spam, and html file infiltration | Exploits | 44,525 | Attacks that exploit vulnerabilities known to exist in the system or software | Worms | 174 | Attack initiators such as viruses replicate themselves and try to infect other hosts on the network | Shellcode | 1,511 | A piece of code that exploits a software vulnerability | DoS | 16,353 | Launch a flooding attack on the target so that it cannot accept new requests | Generic | 215,481 | Attack against any type of group password | Reconnaissance | 13,987 | Simulation of information-gathering attacks | Backdoor | 2,329 | Bypass system defense mechanisms to access sensitive locations and sensitive information |
|
|