Research Article
Design of an Evolutionary Approach for Intrusion Detection
Table 1
Statistics of subsets of KDD cup 1999 dataset as training and test dataset.
| Dataset | Mode | #F | Class | #I | Total |
| KDD 1
| Training
| 41
| Normal | 1000 | | Probe | 100 | | DoS | 100 | | U2R | 11 | | R2L | 100 | 1311 | Test
| 41
| Normal | 500 | | Probe | 75 | | DoS | 75 | | U2R | 50 | | R2L | 50 | 750 |
| KDD 2
| Training
| 41
| Normal | 13449 | | Probe | 2289 | | DoS | 9234 | | U2R | 11 | | R2L | 209 | 25192 | Test
| 41
| Normal | 2152 | | Probe | 2402 | | DoS | 4342 | | U2R | 200 | | R2L | 2754 | 11850 |
| ITFS KDD
| Training
| 41, 10
| Normal | 10000 | | Probe | 32316 | | DoS | 23467 | | U2R | 52 | | R2L | 1126 | 66961 | Test
| 41, 10
| Normal | 5000 | | Probe | 4166 | | DoS | 17761 | | U2R | 228 | | R2L | 13448 | 40603 |
|
|