Research Article
Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment
Table 3
Four kinds of attack classification are marked.
| Normal = 0 | normal = 0 |
| DOS = 1 | back = 1 land = 1 neptune = 1 pod = 1 smurf = 1 teardrop = 1 |
| Probing = 2 | ipsweep = 2 nmap = 2 portsweep = 2 satan = 2 |
| R2L = 3 | ftp_write = 3 guess_passwd = 3 imap = 3 multihop = 3 phf = 3 spy = 3 warezclient = 3 warezmaster = 3 |
| U2R = 4 | buffer_overflow = 4 loadmodule = 4 perl = 4 rootkit = 4 |
|
|