Research Article
Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment
Table 4
Twenty-two kinds of attack classification are marked.
| normal = 0 | buffer_overflow = 1 | pod = 2 | teardrop = 3 | guess_passwd = 4 | portsweep = 5 | ipsweep = 6 | land = 7 | back = 8 | neptune = 9 | smurf = 10 | teard = 11 | satan = 12 | ftp_write = 13 | imap = 14 | multihop = 15 | phf = 16 | spy = 17 | warezclient = 18 | warezmaster = 19 | loadmodule = 20 | perl = 21 | rootkit = 22 |
|
|