Research Article

Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment

Table 3

Four kinds of attack classification are marked.

Normal = 0normal = 0

DOS = 1back = 1 land = 1 neptune = 1
pod = 1 smurf = 1 teardrop = 1

Probing = 2ipsweep = 2 nmap = 2
portsweep = 2 satan = 2

R2L = 3ftp_write = 3 guess_passwd = 3
imap = 3 multihop = 3 phf = 3
spy = 3 warezclient = 3
warezmaster = 3

U2R = 4buffer_overflow = 4
loadmodule = 4 perl = 4
rootkit = 4