Research Article

Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment

Table 4

Twenty-two kinds of attack classification are marked.

normal = 0
buffer_overflow = 1
pod = 2
teardrop = 3
guess_passwd = 4
portsweep = 5
ipsweep = 6
land = 7
back = 8
neptune = 9
smurf = 10
teard = 11
satan = 12
ftp_write = 13
imap = 14
multihop = 15
phf = 16
spy = 17
warezclient = 18
warezmaster = 19
loadmodule = 20
perl = 21
rootkit = 22